Intelligent CISO Issue 07 | Page 50

FEATURE data as it moves across endpoints, networks and applications.” Within the Symantec Integrated Cyber Defense Platform, DLP integrates with many Symantec technologies to provide data protection across control points. This is accomplished with a single solution and centralised policies for consistent protection extended across endpoints, network, IaaS, SaaS and email. The integrated solution aims to lower total cost of ownership, increase data protection efficacy and minimise false positives. Symantec DLP is integrated with Proxy, CASB, email and user and entity-based analytics (UEBA) solutions to deliver end-to-end data security for leading-edge enterprises worldwide. Key steps for data loss prevention Adam Tamburini, International SVP at e-shelter, offers some best practice guidance to CIOs, CISOs and security professionals on how to prevent data loss. Data security is a fundamental priority for any modern-day business whose significant volumes of data are at the mercy of highly-skilled and resourceful cybercriminals. One of the most effective ways to combat this challenge is through third-party data centres that offer flexible space, colocation, security and advisory services. Choosing the right colocation provider can prove to be the difference between an effective data-management strategy and suffering at the hands of costly data breaches. So what are the main threats that result in data losses and how can they be effectively combated through a third-party data centre provider? Physical security breach Firstly, it might sound obvious, but CIOs need to know a high level of physical security is protecting their prized key data. With businesses falling prey more and more to attacks and physical threat, they now have to consider how they can best deal with the threat of physical attacks. A highly professional security guard presence, integrated alarm system and around-the-clock video surveillance is vital here, as well as the latest in ID and video recognition to ensure only accredited personnel gain physical access to the data centre. Cyberterrorism It’s not only the physical security threat that’s concerning CIOs. Businesses now carry more sensitive and confidential information than ever before and they are inevitably finding that cybercriminals will use any means possible to try and gain access to this data. Some of the most high-tech data centres are able to limit access to customer data by a range of controls, such as role-based access control, multifactor authentication and ensuring only a limited number of employees have constant access. Standing data encryption can also be used to safeguard against potential hacks and breaches, for example, during times when data is moving over networks between user devices and the data centre. No access CIOs require instant and immediate access to their data. They will not tolerate any delays to accessing their stored information and will rapidly move on from any data centre that does not grant them that access in a rapid and convenient manner. Businesses should look for a data centre partner that finds the balance in keeping hackers and cyberterrorists out, while making immediate access for authorised personnel as convenient as possible. Power outage CIOs must make sure that any data centre they choose has clear and well- defined plans in place for eventualities such as power outages, cooling failures (the heat generated by IT equipment means an interruption of cooling is almost as damaging as an interruption of power) and any technical communications issues. Therefore, business continuity is another consideration that CIOs must bear in mind when thinking about their data centre partner. Data storage has undeniably become a more complex challenge in 2018. By finding a third-party colocation provider that abides to these requirements however, businesses will be far more equipped to operate in the modern climate. u 50 Issue 07 | www.intelligentciso.com