Diese Präsentation wurde erfolgreich gemeldet.

Data protection services lifecycle approach to critical information protection

1

Teilen

Wird geladen in …3
×
1 von 2
1 von 2

Data protection services lifecycle approach to critical information protection

1

Teilen

Herunterladen, um offline zu lesen

Beschreibung

Data protection lifecycle service addressing business concerns from strategizing to identifying data flow and optimizing technology solutions.

Transkript

  1. 1. Data Protection Services Information Risk Advisory Services Business Challenges & Key Questions Business Challenges 1. 2. 3. 4. 5. 6. Proliferation of privacy and data protection laws Defining the scope for data protection Visibility into data flow throughout and beyond the organization Selecting the right data protection solutions Integrating solutions with other technologies and existing infrastructure Optimizing solutions for real world accuracy Key Questions? 1. 2. 3. 4. 5. 6. Data Classification? DLP/ERM/DAM? Business alignment of policies? Inter-operability with enterprise & business apps? Incident and consequence management? Support for country specific regulations? Lifecycle approach to critical information protection Our Solution Data protection lifecycle service addressing business concerns from strategizing to identifying data flow and optimizing technology solutions Our six phase approach helps our customers to: • Establish data protection organization, implement governance framework, develop data protection strategy & implementation roadmap. • Identify high level data leakage risk vectors and high risk processes within the organization. • Identify sensitive data flow across entities, business processes and exchange with external parties. Conduct data element analysis. • Evaluate appropriate data protection solutions, select and develop an integrated architecture design for implementation. • Implement identified solutions, configure data protection policies and create custom rules. • Optimize solution operations for real world accuracy (e.g. reducing incident volume and false positives) and perform sustenance activities.
  2. 2. Data Protection Services Information Risk Advisory Services Our Value Enablers (Tools & Processes) Lifecycle approach to critical information protection Health Check Tool Data Classification Repository Moderators Timer Awards Document Classification Tool Aujas Value Proposition & Thought Leadership: • Health check tool allows organizations to get a high-level view of their data protection program • Data Classification Repository allows the business community to directly identify business sensitive data and keep the library updated. • Gamification allows us to collect the critical data within 8-10 business processes that can cause significant impact within a matter of hours • Our data classification tool enforces the user to classify MS office files before they are saved. The classification is entered into the meta data so that the DLP/ERM tools can ‘see’ it. BINGO Template NG E Template Gamification Template CH AL LE Template Template Biz. teams Template Biz. teams Aujas Experience DP solution architecture for stock exchange Developed technical requirements and use cases for DLP, IRM and DAM product evaluation. Created a roadmap for mass classification, DLP rollout, and access control management. Provided DLP, IRM and DAM technology implementation assistance comprising of architecture definition, rule base creation, creation of custom patterns and integrating it with AD, Proxy, email, DB, SIEM etc. Data flow analysis and IRM setup for financial client Conducted data flow analysis to identify the sensitive data and its path within the processes, across departments and with third parties. Identified sensitive documents for fingerprinting and classified for IRM with appropriate distribution rights. Sustenance phase for data protection included incident management, rule base audit and fine tuning, managing change in DLP and IRM policies DLP optimization for a large telecom company The client already had implemented a leading DLP solution. But lack of a strong incident management process hampered the effectiveness of the project. Aujas implemented a well- defined incident management process that helped the client to detect, analyze, escalate and close incidents to ensure deterrence and compliance. Aujas was able to show substantial reduction in incidents. . Data flow analysis and DLP IM for a banking client Aujas performed data flow assessment, designed the DLP rules, implemented and tested them for accuracy. Aujas also developed the governance and incident management (IM) process for consistency that helped the client to detect, analyze, escalate and close incidents to ensure deterrence and compliance.

Beschreibung

Data protection lifecycle service addressing business concerns from strategizing to identifying data flow and optimizing technology solutions.

Transkript

  1. 1. Data Protection Services Information Risk Advisory Services Business Challenges & Key Questions Business Challenges 1. 2. 3. 4. 5. 6. Proliferation of privacy and data protection laws Defining the scope for data protection Visibility into data flow throughout and beyond the organization Selecting the right data protection solutions Integrating solutions with other technologies and existing infrastructure Optimizing solutions for real world accuracy Key Questions? 1. 2. 3. 4. 5. 6. Data Classification? DLP/ERM/DAM? Business alignment of policies? Inter-operability with enterprise & business apps? Incident and consequence management? Support for country specific regulations? Lifecycle approach to critical information protection Our Solution Data protection lifecycle service addressing business concerns from strategizing to identifying data flow and optimizing technology solutions Our six phase approach helps our customers to: • Establish data protection organization, implement governance framework, develop data protection strategy & implementation roadmap. • Identify high level data leakage risk vectors and high risk processes within the organization. • Identify sensitive data flow across entities, business processes and exchange with external parties. Conduct data element analysis. • Evaluate appropriate data protection solutions, select and develop an integrated architecture design for implementation. • Implement identified solutions, configure data protection policies and create custom rules. • Optimize solution operations for real world accuracy (e.g. reducing incident volume and false positives) and perform sustenance activities.
  2. 2. Data Protection Services Information Risk Advisory Services Our Value Enablers (Tools & Processes) Lifecycle approach to critical information protection Health Check Tool Data Classification Repository Moderators Timer Awards Document Classification Tool Aujas Value Proposition & Thought Leadership: • Health check tool allows organizations to get a high-level view of their data protection program • Data Classification Repository allows the business community to directly identify business sensitive data and keep the library updated. • Gamification allows us to collect the critical data within 8-10 business processes that can cause significant impact within a matter of hours • Our data classification tool enforces the user to classify MS office files before they are saved. The classification is entered into the meta data so that the DLP/ERM tools can ‘see’ it. BINGO Template NG E Template Gamification Template CH AL LE Template Template Biz. teams Template Biz. teams Aujas Experience DP solution architecture for stock exchange Developed technical requirements and use cases for DLP, IRM and DAM product evaluation. Created a roadmap for mass classification, DLP rollout, and access control management. Provided DLP, IRM and DAM technology implementation assistance comprising of architecture definition, rule base creation, creation of custom patterns and integrating it with AD, Proxy, email, DB, SIEM etc. Data flow analysis and IRM setup for financial client Conducted data flow analysis to identify the sensitive data and its path within the processes, across departments and with third parties. Identified sensitive documents for fingerprinting and classified for IRM with appropriate distribution rights. Sustenance phase for data protection included incident management, rule base audit and fine tuning, managing change in DLP and IRM policies DLP optimization for a large telecom company The client already had implemented a leading DLP solution. But lack of a strong incident management process hampered the effectiveness of the project. Aujas implemented a well- defined incident management process that helped the client to detect, analyze, escalate and close incidents to ensure deterrence and compliance. Aujas was able to show substantial reduction in incidents. . Data flow analysis and DLP IM for a banking client Aujas performed data flow assessment, designed the DLP rules, implemented and tested them for accuracy. Aujas also developed the governance and incident management (IM) process for consistency that helped the client to detect, analyze, escalate and close incidents to ensure deterrence and compliance.

Weitere Verwandte Inhalte

Ähnlich wie Data protection services lifecycle approach to critical information protection

×