Enterprise Data Protection

Cover from Enterprise Data Protection

Date: 22nd April, 2008
By: Nigel Stanley
Format: Bullseye Report

Download (subject to terms)
To access this paper you must first register and then login

In the past, IT security had been focused on securing organisational perimeters until it was realised that these were quickly breaking down due to the increasing demands of mobile workers, closer business relationships, outsourcing and other organisational challenges.

This led to what is now known as IT security de-perimeterisation.

At the same time, public awareness and the global regulatory environment have made the consequences of data breaches a significant business issue. Quickly, attention has moved to securing data itself by focusing on detecting and protecting data at risk.

This data security is delivered via two technologies:

  • Leak prevention solutions, which are used to detect if data is at risk of leaving an organisation's control, for example via email or a USB drive.
  • Loss protection using encryption to protect individual data whilst, for example, on laptops or in email.

Enterprise Data Protection is a new and evolving market place that represents the coming together of leak and loss prevention technologies.

Post a review?

We welcome constructive criticism on all of our published content. Your name will be published against this review after it has been moderated. We reserve the right to contact you by email if needed.

Star Rating 1-5 (low-high):

If you don't want to see the security question, please register and login.