Reduce Risk, Improve Security, Ensure Compliance, and Increase the Protection of Confidential Information

News Upcoming Webinars Trade Shows and Events Press Releases Newsletters Blog
Security

Reduce Risk, Improve Security, Ensure Compliance, and Increase the Protection of Confidential Information

Security has become the greatest inhibitor to cloud adoption, and still looms large as an unaddressed issue. Organizations have invested significant sums to protect their perimeters, but are not deploying mechanisms that can stop a security incident from occurring internally.

Again and again, statistics prove the end user is responsible, either accidently or deliberately, for the majority of data breaches. You can protect at the document level, but identifying a security violation that is contained within the content of a document when it is created, ingested, or even attached to an email provides a granular and safer approach, because all privacy and confidential content will be proactively identified and protected.

Attachments, faxes, scans, emails, may all contain confidential information that must also be protected. It only takes one person.

Proactive identification and prevention of data breaches

A metadata framework and conceptTaxonomyWorkflow provide the tools to proactively stop data breaches before they happen, and identify existing vulnerabilities.

Although most security software solutions provide standard descriptors, Concept Searching technologies also provide the ability to associate text with the descriptors. Organizations are not limited to standard descriptors, such as credit card number, PII, PHI, and social security number.

Using Concept Searching tools, an organization can define any content that is confidential to it, such as financial details, engineering drawings, or new product information. This flexibility allows rules to be designed to remove an item from search, send to a secure repository or application, prevent portability, and alert those responsible for the security of the content.

Why the Problem?

88% of security breaches are attributed to negligence
(Wharton Information Security Best Practices) 

80% of employees use unsecure file sharing methods, putting corporate data at risk
(Workshare)

Hidden data in documents accounts for the highest number of exposures

How Much Is it Costing?

The average cost of a data breach is $4 million, and 70% of data breaches are caused by internal employees
(Ponemon Institute and IBM)

The average cost of a record involved in a data breach is $158
(Ponemon Institute)

Brand loss averages $3.3M plus the cost of the breach
(Ponemon Institute)

Intelligent Content in Context

Elimination of manual tagging ensures content is shared by authorized staff

Eliminates helpdesk issues, inbound communications, investigations, remediation, legal costs, product discounts, to mitigate breach and loss of brand – average cost is $1.07 million
(IBM)

Our SharePoint and Office 365 State of the Market survey results showed that organizations are now more comfortable with cloud security than previously. I disagree. The inability to identify word strings from within content can open a Pandora’s box of problems. What do you think?