Is Mediocrity in SharePoint Good Enough?

News Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog
SharePoint - Concept Searching

Is Mediocrity in SharePoint Good Enough?

Many organizations now consider data leakage a fact of life. A ‘move on and get over it’ attitude is starting to prevail. Victims? Unfortunately, the victims’ issues still seem to get swept under the rug. Slightly off topic, I recently read an article about SharePoint Online as an enterprise content management (ECM) solution. The author stated that SharePoint will always be mediocre in this role. Mediocre but good enough for the masses, for lack of a better phrase.

Although ECM is in a state of transformation, as massive as Microsoft is, how can it be anything but mediocre? The same applies to securing corporate assets by nefarious actors and insiders. At the end of the day, for security, data discovery, classification, and remediation, SharePoint will be mediocre. I know, I have just shaken die-hard Microsoft aficionados to the core.

If we care at all about protecting our sensitive and privacy data, we need to step outside our comfort zones and look for alternatives that eliminate the fear and complacency about data breaches. We are becoming scaredy-cats. Companies can be reluctant to move data to the cloud for security issues. There are many reasons for this, several of which have nothing to do with security itself, such as poor planning, ineffective migration practices, questionable testing, and the list goes on.

We don’t want the bad guys to win, but they are becoming smarter than us and we don’t know what they will try next. Software solutions for risk analysis and cloud security are increasing by leaps and bounds. What are they missing? The ability to identify the context within content from all repositories, regardless of where they reside – think about the landfill of your file shares.

Most solutions still contain a hodgepodge of keywords, proximity, incessant rules, or frequency word counts to generate some semblance of meaning. This is haphazard and error prone, at best. Regular expressions are touted by some vendors as ‘machine learning’ and some have the audacity to call them artificial intelligence (AI). Cut me a break. Many still use Boolean expressions to write the rules.

With a few exceptions, the market falls back on mediocrity and a patchwork quilt of add-ons, as vendors try to keep up with the demands of the rapidly changing security landscape. Some, if not most, have sophisticated tools to address just about all aspects of cloud security. Overwhelmingly, they fall short on concept extraction.

One of the biggest drawbacks to these solutions is the lack of real-time capabilities and the inability to extract concepts, subjects, or topics that may be organizationally-defined, to protect not only privacy data but sensitive data. But a solution with easy-to-write workflow rules can protect content, route it to a secure repository, prevent download, and notify appropriate personnel, as well as delivering redaction capabilities on the fly.

Our technology offers the most advanced and all-inclusive solution on the market today – pretty powerful words – and does not fall under the category of mediocrity. Seeing is believing. Let us show you how it works at Ignite, Booth #212. Not going to Ignite? We would be happy to give you a customized demo.