Page 26 - AeM_Oct_2017_final
P. 26
TECHNOLOGIES & PRODUCTS
Symantec Data Loss Prevention 15
integrates with tagging, encryption and
access management to secure regulated
and sensitive data wherever it goes
policies that follow that data everywhere it goes, re-
gardless of channel,” commented Victor Law, Chief
Operating Officer, Enterprise Security, Greater China
Region, Symantec.
Symantec’s Information Centric Security solution allows
organizations to store, use and share sensitive data
outside their managed environment with external users
or cloud apps. Greater protection is ensured because
The cyber security leader Symantec Corp. just released data access is limited to authorized viewers, reducing
its Data Loss Prevention (DLP)version 15, that provides the risk of unwanted exposure. This Information Centric
increased data protection automation and product inte- Security approach helps ensure safe collaboration and
gration to strengthen the Information Centric Securi- helps to enable compliance for stringent regulations
ty solution. These major enhancements arrange for a such as GDPR. The release of Symantec DLP 15 ex-
greater ability to discover, monitor and protect sensitive tends this capability through enhanced integration with
or regulated data even in unmanaged environments. cloud access security broker, data classification, user-
entity behavioral analytics and information-centric en-
Organizations are losing visibility and control over sen- cryption to support a wider range of communication
sitive and regulated data as it is shared with a wide channels.
range of users across multiple organizations and stored
in various locations, including the cloud. Symantec DLP 15 highlights include:
Protects sensitive data in managed and unman-
Nearly 1 in 3 IT security executives believes data loss aged environments and when handled by third-
is the greatest internal threat to businesses this year parties
(Symantec CISO research 2016), with concerns about Helps to enable compliance with GDPR
shadow applications and malicious users. The problem
continues to grow, with data breaches in 2016 resulting Helps ensure sensitive data doesn't get leaked
through shadow applications
in 1.1 billion identities being exposed — double the
number in 2015 per the Internet Security Threat Report
volume 22 published in 2017. "The sheer volume of data and the speed at which it
moves around organizations has magnified the data
The upcoming General Data Protection Regulation loss problem. Sensitive data needs to be tracked every-
(GDPR) introduces new obligations for organizations where – even outside the organization – to ensure se-
and the information they handle, and comes with in- curity and maintain compliance with a growing roster of
creased penalties and heightened scrutiny for compli- industry regulations,” said Doug Cahill, Senior Analyst,
ance. Analysts believe that visibility and protection, Enterprise Strategy Group.
which can follow data, will become the new imperative. As IEEE explained spot on: “The concept of cloud con-
“With so much at stake, it is no longer possible to de- tinuum, that extends computing infrastructures beyond
pend on manual tagging or any other process that in- the data center boundary, will require new architectural
vites the possibility of human error. With Symantec paradigms that overcome the evident limitations.” Ef-
DLP 15, we’ve given IT managers the ability to auto- fective and efficient interaction between the cloud and
matically tag data as sensitive and automate security the physical environment is crucial. ◊
26 October 2017 - Programmatic & Native Advertising