In November, Europol announced that an employee took a hard disk and uploaded the information it contained to a cloud-connected server. In October, the U.S. Navy announced that names and social security numbers of almost 150,000 current and former sailors were compromised after a notebook computer from a contractor was breached.
If you were to poll your employees, how many of them would confess to losing a mobile device – even temporarily? We all talk about protecting data on the cloud, at the endpoints, using firewalls, and advanced threat detection. What about data protection in the physical world – old fashioned theft and loss of hard drives, mobile devices, tablets, and disks on key?
No matter how good your network’s cyber protection is, it ends when the data leaves in someone’s device. What’s confidential should remain confidential, even if it isn’t in your possession any more.
We believe that protecting your data is critical to ensuring your long-term business operations, whether your data is intellectual property, customer information, healthcare records, or financial transactions. If you cannot protect your information wherever it is, your business is at risk. Our focus is on universally protecting data no matter where it travels.
That’s why it’s time to focus on data-centric security. Data-centric security protects the information itself, not the network, not the device, but each individual file. It protects private information while ensuring it is accessible to only authorized individuals.
Real-time management lets you automatically enforce policies based on pre-defined access parameters, with permissions based on individual, company, location, time, day, and/or range of IP addresses. Our run-time context classification engine allows data access only by the right person at the right time from the right location – which is especially critical when the storage device is no longer in the organization’s control.