• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • Our Solutions
    • Data Storage, Backup and Protect
    • Monitoring, Alerts and Insights
    • User, Cloud and Access Protection
    • IT & Project Services
  • Our Partners
    • Quantum
    • Solarwinds
    • Veeam Software
  • About Us
  • News
  • Contact Us
  • Search
Amidata Logo

Amidata

  • 365 Protect
  • Data Backup & Protect
  • Data Loss Prevention
  • Email Security

5 Habits of Highly Data-Secure Companies – Forcepoint

December 1, 2020 by Amidata Leave a Comment

With digital assets scattered across IT environments and data breaches still an everyday concern, organizations are faced with a daunting security challenge: how do you harmonize the security model to avoid having different best practices and tools for the traditional three-tier data center than you have for the cloud? 

A recent study conducted by IDG in May 2020 of over 100 IT leaders revealed that securing data moving between on-premises and the cloud was the number two data protection challenge (35%), after guarding against malicious damage/hacking (36%). 

“You’re trying to secure a moving target,” says Ravi Srinivasan, vice president, solutions and platform marketing, at Forcepoint. “Today you need a more programmatic approach that looks at all your data sources and channels and combines them into a [holistic] security strategy.”

Focus on User Behavior

Forcepoint recommends a more user-centric approach. In other words, your security policies should be applied to each user individually based on where they fall on a continuum of risk. Those risk assessments and the policy enforcement based on it should change dynamically based on an individual’s behavior. 

IDG’s findings support this notion. Enterprises deploying behavioral analytics, machine learning and cloud-based access controls were the least likely to have been breached in the past 12 months.

The 5 Habits:

Traditional security methods were designed to protect a traditional infrastructure with a defined perimeter. Now that the perimeter is all but gone, the organizations more likely to avoid breaches are the ones that understand data moves between data centers and the cloud and adopt policies that account for changing risk variables, such as device and network in use, as well as the user’s identity and job role. 

To adapt to the changing landscape and help keep your data more secure from breaches, we offer five recommendations: 

1. Deploy DLP systems integrated with machine learning, data analytics, and automation.

Companies that have added smart, automated DLP systems are able to rapidly identify usage patterns and learn from them to automatically grant or deny access based on the variables important to the company. According to the IDG survey, these are the organizations that reported fewer breach incidents.

2. Create user-centric policies.

With employees interacting with data on PCs, smartphones, USB sticks, email, and so on, it’s very difficult to protect each channel one by one. Especially when using different security products that don’t integrate. It’s better to control data based on user variables like device, network, and application. 

3. Be wary of protecting only subset of your entire data.

Some organizations run their DLP systems in audit-only mode or will take a black-and-white approach to blocking or allowing all data access. In addition, they protect data carefully but only for certain channels or avenues while leaving others wide open. These approaches leave organizations open to downtime, damaged reputation, fines, lawsuits, and data loss.

4. Avoid a concoction of unintegrated, point security products.

It seems like an obvious mistake, but many companies have made it. This mainly happens when organizations initially have a very specific requirement which then evolves in to adding security products as they grow. Frankenstein-ing security tools together creates disconnects, holes and inefficiencies when you want a more integrated, holistic and efficient solution. 

5. Evaluate emerging unified security platform which cover cloud and on-premises environment.
Newer, more unified platforms can deliver visibility across hybrid, private and public cloud infrastructure while automating security policies based on changing conditions.

Filed Under: Amidata News, Forcepoint Tagged With: companies, company, Data-secure, Study IDG

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Email Newsletter

Sign up to receive email updates monthly on our latest innovations.

Amidata Privacy Policy
  • LinkedIn
  • Twitter

Latest News

Microsoft and customer data responsibilities

Office 365 Backup Policies & How to Fully Protect Your Data

January 12, 2021 By Amidata

Microsoft Teams backup and recovery in NEW Veeam Backup for Microsoft Office 365 v5

February 1, 2021 By Amidata

Server Cluster

Considerations for Protecting Large Scale-Out NAS Clusters – Veeam Software

December 1, 2020 By Amidata

Data Security Veaam

Data security – Veeam Software

December 1, 2020 By Amidata

Cyber Risk

How Service Providers protect your data against common cybersecurity threats, Veeam Software

December 1, 2020 By Amidata

How Can We Help ?

access rights analyse audit best solution cloud apps cloud delivered Platform companies company Data Data-secure database delegation dynamic risk policy Environment Forcepoint Hybrid cloud infrastructure Multi-cloud performance monitoring Private cloud Protect Public cloud Re-Imagining Quantum risk SaaS SASE SASE and Zero Trust software-as-a-service solarwinds sql Study IDG What matters in storage work with your business Zero Trust Zero Trust as a Service ZTaaS

Footer

CONTACT US

Support: 1300 766 211
Phone: 1300 4 Amidata
1300 426 432
Address:
6/123 Chesterville Rd,
Highett VIC 3190

OUR SOLUTIONS

  • Data Storage, Backup and Protect
  • Monitoring, Alerts and Insights
  • User, Cloud and Access Protection
  • IT & Project Services
  • Amidata Privacy Policy
  • About Us
  • Amidata Sitemap

Copyright © 2021 Amidata · Site by WrenMaxwell