Protecting PII, PCI & PHI Data in Today's Perimeter-less Collaborative Environment
Live Presentation, October 18, 2016 at Gartner Symposium / ITxpo
Enterprise Leaders today know that new digital channels are opening up daily thus rendering their current security tools useless. The breach of sensitive data / content is not solely a problem of the major Hollywood studios (e.g.. Sony) or Healthcare organizations (e.g.. Anthem) or Government (e.g. FDIC). These breaches effect all with digital and sensitive content.
Corporate board leaders are just starting to realize the need to embrace advanced, cutting edge technologies which will aid in the discovery, classification, protection and control of their digital property.
The key is the need to understand and require their systems have the ability to provide answers to questions such as:
“What data do I want to protect?” and
“Can my data protection system classify sensitive data correctly, in real-time?” Or
“Can I truly prevent a data breach?
This informative session will show how the next generation of data protection solutions are capable of inspecting and accurately detecting un-authorized transmissions (malware 'phoning home' your data), alerting administrators and preventing a breach, as soon as the violation occurs, even if the data is SSL encrypted, either online or offline ... without the need for a team of DLP Experts!
Peter Stephenson SC Magazine
What we liked: This product provides real granularity and reliability in catching data leakage. When using fingerprinted data, the catch rate is 100 percent, and no comparison data is saved.
What we didn't like: Nothing. This is a first rate product with some real innovations.