FEATURE
data as it moves across endpoints,
networks and applications.”
Within the Symantec Integrated Cyber
Defense Platform, DLP integrates with
many Symantec technologies to provide
data protection across control points. This
is accomplished with a single solution
and centralised policies for consistent
protection extended across endpoints,
network, IaaS, SaaS and email.
The integrated solution aims to lower
total cost of ownership, increase data
protection efficacy and minimise false
positives. Symantec DLP is integrated
with Proxy, CASB, email and user and
entity-based analytics (UEBA) solutions
to deliver end-to-end data security for
leading-edge enterprises worldwide.
Key steps for data
loss prevention
Adam Tamburini, International
SVP at e-shelter, offers some best
practice guidance to CIOs, CISOs
and security professionals on how to
prevent data loss.
Data security is a fundamental priority
for any modern-day business whose
significant volumes of data are at the
mercy of highly-skilled and resourceful
cybercriminals. One of the most
effective ways to combat this challenge
is through third-party data centres that
offer flexible space, colocation, security
and advisory services.
Choosing the right colocation provider
can prove to be the difference between
an effective data-management strategy
and suffering at the hands of costly data
breaches. So what are the main threats
that result in data losses and how can
they be effectively combated through a
third-party data centre provider?
Physical security breach
Firstly, it might sound obvious, but CIOs
need to know a high level of physical
security is protecting their prized key
data. With businesses falling prey
more and more to attacks and physical
threat, they now have to consider how
they can best deal with the threat of
physical attacks.
A highly professional security guard
presence, integrated alarm system and
around-the-clock video surveillance
is vital here, as well as the latest in ID
and video recognition to ensure only
accredited personnel gain physical
access to the data centre.
Cyberterrorism
It’s not only the physical security threat
that’s concerning CIOs. Businesses now
carry more sensitive and confidential
information than ever before and they
are inevitably finding that cybercriminals
will use any means possible to try and
gain access to this data.
Some of the most high-tech data
centres are able to limit access to
customer data by a range of controls,
such as role-based access control,
multifactor authentication and ensuring
only a limited number of employees
have constant access. Standing data
encryption can also be used to safeguard
against potential hacks and breaches,
for example, during times when data
is moving over networks between user
devices and the data centre.
No access
CIOs require instant and immediate
access to their data. They will not
tolerate any delays to accessing their
stored information and will rapidly move
on from any data centre that does not
grant them that access in a rapid and
convenient manner. Businesses should
look for a data centre partner that
finds the balance in keeping hackers
and cyberterrorists out, while making
immediate access for authorised
personnel as convenient as possible.
Power outage
CIOs must make sure that any data
centre they choose has clear and well-
defined plans in place for eventualities
such as power outages, cooling
failures (the heat generated by IT
equipment means an interruption of
cooling is almost as damaging as an
interruption of power) and any technical
communications issues.
Therefore, business continuity is another
consideration that CIOs must bear in
mind when thinking about their data
centre partner.
Data storage has undeniably
become a more complex challenge
in 2018. By finding a third-party
colocation provider that abides to these
requirements however, businesses will
be far more equipped to operate in the
modern climate. u
50
Issue 07
|
www.intelligentciso.com