SlideShare a Scribd company logo
1 of 12
Download to read offline
Business white paper
Making data
classification
work for you
HP Atalla Information Protection and Control
Business white paper | HP Atalla Information Protection
and Control
Table of contents
3	 Why data classification?
4	 Tip 1: Choose a hybrid
4	 Tip 2: Policy-driven classification analysis
5	 Tip 3: Any source
5	 Tip 4: Classification triggers
5	 Tip 5: Beyond Microsoft Office
5	 Tip 6: What about pre-existing content?
5	 Tip 7: Classification logic
6	 Tip 8: Not one-size-fits-all
6	 Tip 9: Dynamic classification matrix
6	 Tip 10: Reporting and analysis
6	 Tip 11: Leverage across multiple systems
6	 Tip 12: Flexible enforcement
7	 Tip 13: Persistent tagging
7	 Tip 14: Anti-tampering
7	 Tip 15: Esperanto not spoken here
7	 Tip 16: Branding
7	 Tip 17: SIEM/SOC compatibility
7	 Tip 18: Truly enterprise-grade
8	 The HP Atalla IPC solution
10	 HP Atalla Information Protection and Control
3
HP Atalla Information
Protection and Control
HP Atalla Information Protection and Control (IPC) Suite solves
the complex challenge of providing data classification and data
security by providing organizations the means to bring
protection to the data itself. HP Atalla IPC applies protection at
a point where information is created and makes that protection
persistent, so it follows the information wherever it goes.
This protects sensitive data no matter where it actually resides.
Why data classification?
If you are reading this, there is probably no need to explain the importance of data classification
in your enterprise information security toolbox. The question is likely not “Does my organization
need data classification?” but rather “Which data classification solution is right for us?”
Like any enterprise-level tool, data classification systems are complex and far-reaching. At the
same time, ease of implementation is mission critical since the system needs by definition to
interact with multiple other enterprise systems, and ease-of-use is even more important since
the solution is user facing.
To help cut through the confusion, our security experts have put together the following list of tips
and questions to ask when choosing a data classification and information protection solution.
Business white paper | HP Atalla Information Protection
and Control
4
Tip 1: Choose a hybrid
Much of your sensitive information can be deterministically classified with an intelligent,
learning, automatic classification engine with minimal end-user friction. At the same
time, much will always need to be classified manually.
Make sure you choose a hybrid solution that offers:
•	Automatic and transparent data classification
•	User-determined, manual data classification
•	A recommendation option, which suggests classification options for the end user to confirm
Moreover, selection of the data classification methodology for each instance (automatic, manual,
user prompt) should be itself automatic, based on data identification.
Tip 2: Policy-driven classification analysis
When classification is automatic, it should be based on real-time analysis of content
(phrases and patterns, thresholds, checksums, etc.), context (where is the information
from, where is it going, who created it, what geography location, etc.), and source.
For each type of analysis parameter, your classification solution should allow highly granular,
policy-driven control.
Business white paper | HP Atalla Information Protection
and Control
5
Tip 3: Any source
Sensitive information is everywhere in your organization, not just in commonly
protected applications.
Your data classification solution should intercept data and seamlessly classify content from
many different sources, including cloud solutions, enterprise content management (ECM)
software like Microsoft®
SharePoint, enterprise applications, storage networks, and all types
of user-generated content.
Tip 4: Classification triggers
To achieve the flexibility that complex business processes require, you need highly
granular control over the data interception events that trigger data classification.
For example, can your solution define where and when exactly classification occurs: on save, on
upload to a specific location or service like Dropbox or SharePoint, on file open, on attachment
to email via drag and drop, or on copy between folders in Windows®
Internet Explorer?
Make sure classification triggers are completely customizable, work in any application, and are
policy-driven, enterprise-wide.
Tip 5: Beyond Microsoft Office
Your organization runs on multiple applications from multiple vendors, not just on
Microsoft Office.
Make sure that the data classification solution you choose works smoothly and offers a
seamless and uniform user experience in any application—from Adobe®
Acrobat®
, through CAD/
computer-aided (or -assisted) manufacturing (CAM) software, and everything in-between—not just
Microsoft Office utilities.
Tip 6: What about pre-existing content?
There are millions of files in your repositories, many created long before you even
thought of data classification.
Your data classification solution should be able to find and classify content generated in the
past, as well newly generated content. More specifically, as part of the initial data classification
implementation, your solution should scan your entire data repository to identify and classify
valuable data—delivering immediate value to your enterprise.
Tip 7: Classification logic
Data classification does not exist in a vacuum. It is a critical part of your business
processes and is directly affected by evolving enterprise business strategy. Make sure
that data classification lifecycles and permissions are policy-driven, so they can remain
in-line with changing business logic.
For example, can your data classification policy specify who can increase or decrease the
sensitivity of a given document, declassify, and make classification mandatory or optional?
Business white paper | HP Atalla Information Protection
and Control
6
Tip 8: Not one-size-fits-all
Inlargeenterprises,differentorganizationalunitsrequiredifferentclassificationtaxonomies.
Your data classification solution should enable business units, regional offices, and other
semi-autonomous business entities to define their own classification policies.
Tip 9: Dynamic classification matrix
Data classification is a multi-layered, multi-faceted art. Do not settle for a rigid solution
that makes your organization adapt to preset classification attributes.
Make sure that you choose a solution that is flexible enough to adapt to your way of doing
business. This can measurably affect both implementation and security.
Tip 10: Reporting and analysis
Like any mission-critical security solutions, an enterprise-level data classification
system must include extensive reporting, analysis, auditing, forensics, and risk
assessment functionality.
For example, can your data classification solution identify with high granularity where exactly
customer data is stored? Can it tell you where a given sensitive document was emailed most
recently? How it was used before it was sent and if it was reclassified?
Tip 11: Leverage across multiple systems
To preserve investment in strategic enterprise tools, it is a given that your data
classification tool should integrate seamlessly with your data loss prevention (DLP),
archiving, eDiscovery, and other enterprise solutions.
Moreover, make sure that these same enterprise systems can leverage data classification to
extend their own native capabilities—enriching information management strategies, archiving
and data retention, SharePoint categorization, search optimization, and more.
Tip 12: Flexible enforcement
Your data classification solution should have built-in, flexible, and extendable
enforcement capabilities, covering the entire sensitive information lifecycle.
For example, what happens exactly when information classified as sensitive is accessed or sent?
Does your solution allow you to define whether requests should be blocked, allowed with automatic
data encryption or apply information rights management (IRM) protection, or just warned?
Business white paper | HP Atalla Information Protection
and Control
7
Tip 13: Persistent tagging
Once classified, data needs to retain its classification no matter where it is in the data
lifecycle—in use, in motion, in storage, anywhere.
For example, does cutting and pasting a file from a local drive to a USB drive remove data
classification tags from sensitive information? Does sending a classified PDF file via Outlook
nullify classification? It should not!
Tip 14: Anti-tampering
Although this seems like a given for any data security solution, make sure that your
data classification solution prevents users from maliciously removing or changing
classification attributes without proper authorization.
Ensure that your data classification solution can provide alerts to a centralized auditing system,
if such malicious activities are identified.
Tip 15: Esperanto not spoken here
A multinational organization needs a multilingual data classification solution.
The solution you choose should not only classify multilingual data but also have a multilingual
user interface.
Tip 16: Branding
Your brand is who you are, both to the outside world and to your trusted internal users
and partners.
Like any end-user-facing system, the user interface of your data classification system should be
fully customizable to your brand’s look and feel.
Tip 17: SIEM/SOC compatibility
To avoid multiple points of control for key security systems, you have probably invested
in a security information and event management (SIEM) or security operations center
(SOC) solution.
Treat your data classification solution just like any other mission-critical security system, and
make sure it integrates seamlessly with your SIEM/SOC of choice.
Tip 18: Truly enterprise-grade
Does your data classification solution offer a truly enterprise-grade feature set, including
centralized classification policy management, seamless Active Directory integration
with multi-forest capabilities, role-based administration, and health and operational
monitoring components?
Does it meet high-availability standards, offer load balancing, and support
clustered deployment?
Business white paper | HP Atalla Information Protection
and Control
8
The HP Atalla IPC solution
In today’s tight data security climate, it is commonly agreed that effective data protection
requires encryption, and that access should be restricted “on a need-to-know basis.”
The IQProtector engine makes use of an innovative security paradigm: on creation or usage
classification, and enforcement. Capture, classification, enforcement, and discovery, all take
place at data creation, whether by applications or by users and at any user interaction with
data. At the moment, that data is created or manipulated, on user’s endpoints or on servers.
IQProtector intelligently identifies and classifies the data based on context and content
criteria (the Atalla IPC information classification prism) and according to a centrally governed
security policy.
The IQProtector leverages Microsoft Active Directory Rights Management Services (AD RMS)
to apply IRM protection to the data according to the policy.
Persistent file protection
IQProtector embeds protection within the data itself at the
moment of creation—instantly identifying, classifying, and
persistently tagging all new, modified, or accessed sensitive
data from any origin.
Context and content-sensitive IQProtector applies classification and AD RMS protection
to emails, documents, or other files tagged as sensitive—applying AD RMS according to a
customizable data security policy. Leveraging existing AD RMS and encryption frameworks,
Atalla IPC intelligently generates, applies, and enforces encryption policies enterprise-wide.
Business white paper | HP Atalla Information Protection
and Control
9
•	For example, early stages of a new design are classified as such, and the protection limits
the access to a limited group of authorized users. As the project develops to more advanced
stages, its classification is also adjusted, and due to that, its protection is adjusted to
include a larger and different group of authorized users. Such changes to classification and
protection are applied in a managed way by authorized personnel or automatic processes.
This enables an organization to achieve any desired balance between security needs and
business continuity.
•	All sensitive information and reports that are exported from any design, manufacturing, or
sketching application can be intercepted automatically—even before the end user gets hold
of it—according to the defined organization policy that is classified and encrypted with usage
rights enforced.
•	IQProtector data classification and protection policy is dynamic and adaptive, and may be
configured to change throughout the data’s information lifecycle according to changing
security risks and business needs.
The HP Atalla IPC concept is channel and medium agnostic, meaning you stop running after the
data that exists and perform plumbing-like activities, trying to stop sensitive data from leaving
the organization. When information is protected at creation, it reaches the end user already
protected without any chance of tampering with the data. You can gain the benefit of sensitive
data internal compartmentalization as a complementary tool for continuous data classification
and encryption.
Figure 1. Manufacturing application system data immunization
IQProtector agent in action
Usage data
IQProtector management server
Open
Save
Email
Upload
Download
Classify
content
Capture
events
Manage
permissions
Embed
policy
Apply
protection
Destination
Partner
Web
Storage
Devices
Source
SaaS
Web
Client apps
File repositories
User
Information is captured and analyzed from any source with Atalla IPC multi-source data interception system with optimized dataclassification
and protection mechanism.
Business white paper | HP Atalla Information Protection
and Control
10
HP Atalla Information Protection and Control
The HP Atalla IPC solutions provide the enterprise with:
•	File and mail classification: Classify file and email data items either automatically or
manually based on the Atalla IPC information classification prism for data originating from
any source (user, applications, cloud services, and more) according to corporate policy.
Classification also allows adding visual classification to Microsoft Office and emails in order to
raise users’ awareness on data sensitivity.
The classification policy can be configured to require user input to raise the automatically
assigned security level manually, where the data type, content, and context are insufficient
parameters for a meaningful classification.
•	File and mail automatic protection: IQProtector applies Microsoft AD RMS data protection
to files and mails based on the data item classification and according to the corporate
security policy.
Protection is applied automatically and transparently, with no operational disruption.
The AD RMS protection includes encryption and a security policy of permissions (such as
view, edit, print, extract), per user or user group, according to the organizational policy
for the specific data type. However, unlike traditional Access Control Lists (ACLs), which
are location-specific, AD RMS is embedded in the data itself and goes with the data. The
permissions policy may be subsequently changed by IQProtector itself—in accordance with
the organizational policy and the business process.
Business white paper | HP Atalla Information Protection
and Control
11
•	Secured mail collaboration: IQProtector collaboration rules are classification- and
protection-aware allowing the corporate to help ensure that only authorized users collaborate
authorized data to authorized recipients inside and outside the corporate. Such collaboration
rules may adapt the classification and protection of data items, block specific items from being
sent or accessed, or strip data item from its protection based on the corporate security policy
and business needs.
•	Application protection: IQProtector classifies and protects unstructured data in Web
applications applying AD RMS rights within the Web application page (copy, print, etc.).
IQProtector intercepts documents and reports generated and downloaded from any Web- or
client-based applications without any need for integration allowing continuous protection for
data beyond application boundaries.
•	Mobile support for AD RMS: Enables secure collaboration on RMS-protected emails and
attachments on all major mobile devices and operating systems (iOS, BlackBerry, and Android).
•	Non-intrusive data discovery: IQProtector tracking and logging capabilities can be used
to discover where the organization sensitive data is located. No data center deployment or
intrusive scanning is needed. Instead, IQProtector monitors data usage and locates the data
sources. The discovery results enable designing an effective and non-interruptive IQProtector
security policy.
•	Data usage discovery for granular policy design: IQProtector tracking and logging
capabilities can be used to discover how data is used in the organization: who is using which
data, to whom are they sending it, and where are they saving it. Differentiating between
legitimate business practices and usage, which should be prevented, enables organizational
security officers to formulate a granular policy meaningfully, defining who should be allowed
access and to what information.
•	Comprehensive data usage auditing: The entire information lifecycle, from creation through
distribution and storage, is fully audited to supply security officers with comprehensive
information about compliance to privacy, state, and industry regulations. Known security
breaches can be tracked by identifying the usage of the leaked data.
•	Transparent assimilation in IT environment: Trusted applications like DLP, antivirus (A/V),
or search engines can still access encrypted data seamlessly without integration efforts.
IQProtector enables ECM, DLP, antivirus, and other enterprise IT systems to inspect, index,
and classify encrypted content preserving investment in existing systems.
Business white paper | HP Atalla Information Protection
and Control
Rate this documentShare with colleagues
Sign up for updates
hp.com/go/getupdated
HP Atalla IPC key benefits
Delivers data classification and automated protection
•	Proven classification accuracy
–– Powered by content and context analysis
•	Multi-disciplinary classification mechanisms
–– User, system recommendation, automatic source-based between data source and destination
•	Optimized classification cycle
–– Triggered by captured events (open, close, save, upload, download, copy, etc.)
•	Full analytics of data usage events
–– For all classification attributes; for enforcement, reporting, and audit
•	Persistent protection wherever the data travels
–– Protection injected at the point of creation and travels with the data throughout its lifecycle
Learn more at
hp.com/go/AtallaIPC
© Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only
warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein
should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Adobe and Acrobat are trademarks of Adobe Systems Incorporated. Microsoft and Windows are trademarks of the Microsoft group of companies.
4AA5-7731ENW, April 2015
Business white paper | HP Atalla Information Protection
and Control

More Related Content

What's hot

Michael Jay Freer - Information Obfuscation
Michael Jay Freer - Information ObfuscationMichael Jay Freer - Information Obfuscation
Michael Jay Freer - Information Obfuscationiasaglobal
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplaceSiddick Elaheebocus
 
OpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationOpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationMarc St-Pierre
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsUL Transaction Security
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...UL Transaction Security
 
Introduction to the Query-driven Approach
Introduction to the Query-driven ApproachIntroduction to the Query-driven Approach
Introduction to the Query-driven ApproachTimothy Valihora
 
Maturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyMaturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyPrivacera
 
Using hadoop for enterprise data management
Using hadoop for enterprise data managementUsing hadoop for enterprise data management
Using hadoop for enterprise data managementEstuate, Inc.
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)Kirsty Donovan
 

What's hot (11)

Michael Jay Freer - Information Obfuscation
Michael Jay Freer - Information ObfuscationMichael Jay Freer - Information Obfuscation
Michael Jay Freer - Information Obfuscation
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Microsoft 365 | Modern workplace
Microsoft 365 | Modern workplaceMicrosoft 365 | Modern workplace
Microsoft 365 | Modern workplace
 
OpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document GenerationOpenText PowerDOCS: A Cloud Solution for Document Generation
OpenText PowerDOCS: A Cloud Solution for Document Generation
 
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security SolutionsWebinar: Eliminating Negative Impact on User Experience from Security Solutions
Webinar: Eliminating Negative Impact on User Experience from Security Solutions
 
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
Solving Security, Collaboration, and Mobility Challenges in SAP With Microsof...
 
Introduction to the Query-driven Approach
Introduction to the Query-driven ApproachIntroduction to the Query-driven Approach
Introduction to the Query-driven Approach
 
Maturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management StrategyMaturing Your Organization's Information Risk Management Strategy
Maturing Your Organization's Information Risk Management Strategy
 
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLPSecure Islands Case Study - Financial Firm Implements Enhanced DLP
Secure Islands Case Study - Financial Firm Implements Enhanced DLP
 
Using hadoop for enterprise data management
Using hadoop for enterprise data managementUsing hadoop for enterprise data management
Using hadoop for enterprise data management
 
The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)The 3 Phased Approach to Data Leakage Prevention (DLP)
The 3 Phased Approach to Data Leakage Prevention (DLP)
 

Viewers also liked

Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 
愛,是唯一的添加 - 鮮乳坊
愛,是唯一的添加 - 鮮乳坊愛,是唯一的添加 - 鮮乳坊
愛,是唯一的添加 - 鮮乳坊Baggio Chang
 
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...at MicroFocus Italy ❖✔
 
Ict Security per le nuove esigenze di business
Ict Security per le nuove esigenze di businessIct Security per le nuove esigenze di business
Ict Security per le nuove esigenze di businessat MicroFocus Italy ❖✔
 
Activité Espace de Fabrication Numérique - rentrée 2016
Activité Espace de Fabrication Numérique - rentrée 2016Activité Espace de Fabrication Numérique - rentrée 2016
Activité Espace de Fabrication Numérique - rentrée 2016STEPHANE GALAN
 
Tara J Walshe CV
Tara J Walshe CVTara J Walshe CV
Tara J Walshe CVTara walsh
 
CV Standard اخر تعديل)اورامكو
CV Standard اخر تعديل)اورامكوCV Standard اخر تعديل)اورامكو
CV Standard اخر تعديل)اورامكوFB HASHISH
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Businessat MicroFocus Italy ❖✔
 
Chelsea TropperFinalProjectVitaCocoIMCPlan
Chelsea TropperFinalProjectVitaCocoIMCPlanChelsea TropperFinalProjectVitaCocoIMCPlan
Chelsea TropperFinalProjectVitaCocoIMCPlanchelsea tropper
 

Viewers also liked (17)

Soluzioni per proteggere i dati nel cloud
Soluzioni per proteggere i dati nel cloudSoluzioni per proteggere i dati nel cloud
Soluzioni per proteggere i dati nel cloud
 
Cyberedge 2015 Defense Report
Cyberedge 2015 Defense Report Cyberedge 2015 Defense Report
Cyberedge 2015 Defense Report
 
Logo_print
Logo_printLogo_print
Logo_print
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
愛,是唯一的添加 - 鮮乳坊
愛,是唯一的添加 - 鮮乳坊愛,是唯一的添加 - 鮮乳坊
愛,是唯一的添加 - 鮮乳坊
 
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
Studio sul costo della criminalità informatica 2015: Studio globale. Studio d...
 
THE DATABERG REPORT SEE WHAT OTHERS DON’T
THE DATABERG REPORT SEE WHAT OTHERS DON’TTHE DATABERG REPORT SEE WHAT OTHERS DON’T
THE DATABERG REPORT SEE WHAT OTHERS DON’T
 
Ict Security per le nuove esigenze di business
Ict Security per le nuove esigenze di businessIct Security per le nuove esigenze di business
Ict Security per le nuove esigenze di business
 
Activité Espace de Fabrication Numérique - rentrée 2016
Activité Espace de Fabrication Numérique - rentrée 2016Activité Espace de Fabrication Numérique - rentrée 2016
Activité Espace de Fabrication Numérique - rentrée 2016
 
Tara J Walshe CV
Tara J Walshe CVTara J Walshe CV
Tara J Walshe CV
 
Hp secure file
Hp secure fileHp secure file
Hp secure file
 
Privacy e recupero crediti il vademecum
Privacy e recupero crediti   il vademecumPrivacy e recupero crediti   il vademecum
Privacy e recupero crediti il vademecum
 
Artechange
ArtechangeArtechange
Artechange
 
CV Standard اخر تعديل)اورامكو
CV Standard اخر تعديل)اورامكوCV Standard اخر تعديل)اورامكو
CV Standard اخر تعديل)اورامكو
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Business
 
Chelsea TropperFinalProjectVitaCocoIMCPlan
Chelsea TropperFinalProjectVitaCocoIMCPlanChelsea TropperFinalProjectVitaCocoIMCPlan
Chelsea TropperFinalProjectVitaCocoIMCPlan
 
Hp SecureData
Hp SecureDataHp SecureData
Hp SecureData
 

Similar to Soluzioni per la sicurezza aziendale di hp

One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceJoanne Klein
 
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Elemica
 
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid ITOptimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid ITSirius
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxmydrynan
 
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionAlbert Hoitingh
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfAgusto Sipahutar
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSonny Hashmi
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb esSonny Hashmi
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
5 Things You Should Know About Data Products
5 Things You Should Know About Data Products5 Things You Should Know About Data Products
5 Things You Should Know About Data ProductsScribble Data
 
Whitepaper on Master Data Management
Whitepaper on Master Data Management Whitepaper on Master Data Management
Whitepaper on Master Data Management Jagruti Dwibedi ITIL
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
 
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Eu gdpr technical workflow and productionalization   neccessary w privacy ass...Eu gdpr technical workflow and productionalization   neccessary w privacy ass...
Eu gdpr technical workflow and productionalization neccessary w privacy ass...Steven Meister
 
The top ten free and open-source tools for video analytics.pdf
The top ten free and open-source tools for video analytics.pdfThe top ten free and open-source tools for video analytics.pdf
The top ten free and open-source tools for video analytics.pdfVertexplus Technologies
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Harness the power of data
Harness the power of dataHarness the power of data
Harness the power of dataHarsha MV
 

Similar to Soluzioni per la sicurezza aziendale di hp (20)

18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
Microsoft Teams in the Modern Workplace
Microsoft Teams in the Modern WorkplaceMicrosoft Teams in the Modern Workplace
Microsoft Teams in the Modern Workplace
 
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
 
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid ITOptimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT
Optimizing Your IT Strategy: 5 Steps to Successfull Hybrid IT
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss PreventionaMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
aMS SouthEast Asia 2021 - Microsoft 365 Data Loss Prevention
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdf
 
Securing your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEsSecuring your digital world - Cybersecurity for SBEs
Securing your digital world - Cybersecurity for SBEs
 
Securing your digital world cybersecurity for sb es
Securing your digital world   cybersecurity for sb esSecuring your digital world   cybersecurity for sb es
Securing your digital world cybersecurity for sb es
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
5 Things You Should Know About Data Products
5 Things You Should Know About Data Products5 Things You Should Know About Data Products
5 Things You Should Know About Data Products
 
Whitepaper on Master Data Management
Whitepaper on Master Data Management Whitepaper on Master Data Management
Whitepaper on Master Data Management
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
 
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Eu gdpr technical workflow and productionalization   neccessary w privacy ass...Eu gdpr technical workflow and productionalization   neccessary w privacy ass...
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
 
The top ten free and open-source tools for video analytics.pdf
The top ten free and open-source tools for video analytics.pdfThe top ten free and open-source tools for video analytics.pdf
The top ten free and open-source tools for video analytics.pdf
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You18 Tips of IRM - Making IRM Work for You
18 Tips of IRM - Making IRM Work for You
 
Harness the power of data
Harness the power of dataHarness the power of data
Harness the power of data
 

More from at MicroFocus Italy ❖✔

Bper services Case Study Application Delivery Management
Bper services Case Study Application Delivery ManagementBper services Case Study Application Delivery Management
Bper services Case Study Application Delivery Managementat MicroFocus Italy ❖✔
 
Crittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyCrittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyat MicroFocus Italy ❖✔
 
Technology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationTechnology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationat MicroFocus Italy ❖✔
 
HPE Security – Data Security HPE Voltage SecureMail
HPE Security – Data Security HPE Voltage SecureMailHPE Security – Data Security HPE Voltage SecureMail
HPE Security – Data Security HPE Voltage SecureMailat MicroFocus Italy ❖✔
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...at MicroFocus Italy ❖✔
 
Hpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentHpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentat MicroFocus Italy ❖✔
 
HPE Software at Discover 2016 London 29 November—1 December
HPE Software at Discover 2016 London 29 November—1 DecemberHPE Software at Discover 2016 London 29 November—1 December
HPE Software at Discover 2016 London 29 November—1 Decemberat MicroFocus Italy ❖✔
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...at MicroFocus Italy ❖✔
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingat MicroFocus Italy ❖✔
 
Mobile app user_survey_failing_meet_user_expectations
Mobile app user_survey_failing_meet_user_expectationsMobile app user_survey_failing_meet_user_expectations
Mobile app user_survey_failing_meet_user_expectationsat MicroFocus Italy ❖✔
 
Sicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegatiSicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegatiat MicroFocus Italy ❖✔
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsat MicroFocus Italy ❖✔
 

More from at MicroFocus Italy ❖✔ (20)

Bper services Case Study Application Delivery Management
Bper services Case Study Application Delivery ManagementBper services Case Study Application Delivery Management
Bper services Case Study Application Delivery Management
 
Configuration Management in a Multi-Cloud Era
Configuration Management in a Multi-Cloud EraConfiguration Management in a Multi-Cloud Era
Configuration Management in a Multi-Cloud Era
 
Crittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economyCrittografia end to-end basata sui dati come volano della app economy
Crittografia end to-end basata sui dati come volano della app economy
 
Technology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformationTechnology’s role in data protection – the missing link in GDPR transformation
Technology’s role in data protection – the missing link in GDPR transformation
 
HPE Security – Data Security HPE Voltage SecureMail
HPE Security – Data Security HPE Voltage SecureMailHPE Security – Data Security HPE Voltage SecureMail
HPE Security – Data Security HPE Voltage SecureMail
 
Chationary
ChationaryChationary
Chationary
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
Hpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentHpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessment
 
HPE Software at Discover 2016 London 29 November—1 December
HPE Software at Discover 2016 London 29 November—1 DecemberHPE Software at Discover 2016 London 29 November—1 December
HPE Software at Discover 2016 London 29 November—1 December
 
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
The National Cyber Security Strategy 2016 to 2021 sets out the government's p...
 
Format preserving encryption bachelor thesis
Format preserving encryption bachelor thesisFormat preserving encryption bachelor thesis
Format preserving encryption bachelor thesis
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Mobile app user_survey_failing_meet_user_expectations
Mobile app user_survey_failing_meet_user_expectationsMobile app user_survey_failing_meet_user_expectations
Mobile app user_survey_failing_meet_user_expectations
 
Threat report 2015_v1
Threat report 2015_v1Threat report 2015_v1
Threat report 2015_v1
 
Sicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegatiSicurezza end-to-end-per-la-posta-e-documenti-allegati
Sicurezza end-to-end-per-la-posta-e-documenti-allegati
 
PCI COMPLIANCE REPORT
PCI COMPLIANCE REPORTPCI COMPLIANCE REPORT
PCI COMPLIANCE REPORT
 
Protecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environmentsProtecting your data against cyber attacks in big data environments
Protecting your data against cyber attacks in big data environments
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Hpe security research cyber risk report 2016
Hpe security research  cyber risk report 2016Hpe security research  cyber risk report 2016
Hpe security research cyber risk report 2016
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 

Recently uploaded

Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 

Recently uploaded (20)

Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 

Soluzioni per la sicurezza aziendale di hp

  • 1. Business white paper Making data classification work for you HP Atalla Information Protection and Control
  • 2. Business white paper | HP Atalla Information Protection and Control Table of contents 3 Why data classification? 4 Tip 1: Choose a hybrid 4 Tip 2: Policy-driven classification analysis 5 Tip 3: Any source 5 Tip 4: Classification triggers 5 Tip 5: Beyond Microsoft Office 5 Tip 6: What about pre-existing content? 5 Tip 7: Classification logic 6 Tip 8: Not one-size-fits-all 6 Tip 9: Dynamic classification matrix 6 Tip 10: Reporting and analysis 6 Tip 11: Leverage across multiple systems 6 Tip 12: Flexible enforcement 7 Tip 13: Persistent tagging 7 Tip 14: Anti-tampering 7 Tip 15: Esperanto not spoken here 7 Tip 16: Branding 7 Tip 17: SIEM/SOC compatibility 7 Tip 18: Truly enterprise-grade 8 The HP Atalla IPC solution 10 HP Atalla Information Protection and Control
  • 3. 3 HP Atalla Information Protection and Control HP Atalla Information Protection and Control (IPC) Suite solves the complex challenge of providing data classification and data security by providing organizations the means to bring protection to the data itself. HP Atalla IPC applies protection at a point where information is created and makes that protection persistent, so it follows the information wherever it goes. This protects sensitive data no matter where it actually resides. Why data classification? If you are reading this, there is probably no need to explain the importance of data classification in your enterprise information security toolbox. The question is likely not “Does my organization need data classification?” but rather “Which data classification solution is right for us?” Like any enterprise-level tool, data classification systems are complex and far-reaching. At the same time, ease of implementation is mission critical since the system needs by definition to interact with multiple other enterprise systems, and ease-of-use is even more important since the solution is user facing. To help cut through the confusion, our security experts have put together the following list of tips and questions to ask when choosing a data classification and information protection solution. Business white paper | HP Atalla Information Protection and Control
  • 4. 4 Tip 1: Choose a hybrid Much of your sensitive information can be deterministically classified with an intelligent, learning, automatic classification engine with minimal end-user friction. At the same time, much will always need to be classified manually. Make sure you choose a hybrid solution that offers: • Automatic and transparent data classification • User-determined, manual data classification • A recommendation option, which suggests classification options for the end user to confirm Moreover, selection of the data classification methodology for each instance (automatic, manual, user prompt) should be itself automatic, based on data identification. Tip 2: Policy-driven classification analysis When classification is automatic, it should be based on real-time analysis of content (phrases and patterns, thresholds, checksums, etc.), context (where is the information from, where is it going, who created it, what geography location, etc.), and source. For each type of analysis parameter, your classification solution should allow highly granular, policy-driven control. Business white paper | HP Atalla Information Protection and Control
  • 5. 5 Tip 3: Any source Sensitive information is everywhere in your organization, not just in commonly protected applications. Your data classification solution should intercept data and seamlessly classify content from many different sources, including cloud solutions, enterprise content management (ECM) software like Microsoft® SharePoint, enterprise applications, storage networks, and all types of user-generated content. Tip 4: Classification triggers To achieve the flexibility that complex business processes require, you need highly granular control over the data interception events that trigger data classification. For example, can your solution define where and when exactly classification occurs: on save, on upload to a specific location or service like Dropbox or SharePoint, on file open, on attachment to email via drag and drop, or on copy between folders in Windows® Internet Explorer? Make sure classification triggers are completely customizable, work in any application, and are policy-driven, enterprise-wide. Tip 5: Beyond Microsoft Office Your organization runs on multiple applications from multiple vendors, not just on Microsoft Office. Make sure that the data classification solution you choose works smoothly and offers a seamless and uniform user experience in any application—from Adobe® Acrobat® , through CAD/ computer-aided (or -assisted) manufacturing (CAM) software, and everything in-between—not just Microsoft Office utilities. Tip 6: What about pre-existing content? There are millions of files in your repositories, many created long before you even thought of data classification. Your data classification solution should be able to find and classify content generated in the past, as well newly generated content. More specifically, as part of the initial data classification implementation, your solution should scan your entire data repository to identify and classify valuable data—delivering immediate value to your enterprise. Tip 7: Classification logic Data classification does not exist in a vacuum. It is a critical part of your business processes and is directly affected by evolving enterprise business strategy. Make sure that data classification lifecycles and permissions are policy-driven, so they can remain in-line with changing business logic. For example, can your data classification policy specify who can increase or decrease the sensitivity of a given document, declassify, and make classification mandatory or optional? Business white paper | HP Atalla Information Protection and Control
  • 6. 6 Tip 8: Not one-size-fits-all Inlargeenterprises,differentorganizationalunitsrequiredifferentclassificationtaxonomies. Your data classification solution should enable business units, regional offices, and other semi-autonomous business entities to define their own classification policies. Tip 9: Dynamic classification matrix Data classification is a multi-layered, multi-faceted art. Do not settle for a rigid solution that makes your organization adapt to preset classification attributes. Make sure that you choose a solution that is flexible enough to adapt to your way of doing business. This can measurably affect both implementation and security. Tip 10: Reporting and analysis Like any mission-critical security solutions, an enterprise-level data classification system must include extensive reporting, analysis, auditing, forensics, and risk assessment functionality. For example, can your data classification solution identify with high granularity where exactly customer data is stored? Can it tell you where a given sensitive document was emailed most recently? How it was used before it was sent and if it was reclassified? Tip 11: Leverage across multiple systems To preserve investment in strategic enterprise tools, it is a given that your data classification tool should integrate seamlessly with your data loss prevention (DLP), archiving, eDiscovery, and other enterprise solutions. Moreover, make sure that these same enterprise systems can leverage data classification to extend their own native capabilities—enriching information management strategies, archiving and data retention, SharePoint categorization, search optimization, and more. Tip 12: Flexible enforcement Your data classification solution should have built-in, flexible, and extendable enforcement capabilities, covering the entire sensitive information lifecycle. For example, what happens exactly when information classified as sensitive is accessed or sent? Does your solution allow you to define whether requests should be blocked, allowed with automatic data encryption or apply information rights management (IRM) protection, or just warned? Business white paper | HP Atalla Information Protection and Control
  • 7. 7 Tip 13: Persistent tagging Once classified, data needs to retain its classification no matter where it is in the data lifecycle—in use, in motion, in storage, anywhere. For example, does cutting and pasting a file from a local drive to a USB drive remove data classification tags from sensitive information? Does sending a classified PDF file via Outlook nullify classification? It should not! Tip 14: Anti-tampering Although this seems like a given for any data security solution, make sure that your data classification solution prevents users from maliciously removing or changing classification attributes without proper authorization. Ensure that your data classification solution can provide alerts to a centralized auditing system, if such malicious activities are identified. Tip 15: Esperanto not spoken here A multinational organization needs a multilingual data classification solution. The solution you choose should not only classify multilingual data but also have a multilingual user interface. Tip 16: Branding Your brand is who you are, both to the outside world and to your trusted internal users and partners. Like any end-user-facing system, the user interface of your data classification system should be fully customizable to your brand’s look and feel. Tip 17: SIEM/SOC compatibility To avoid multiple points of control for key security systems, you have probably invested in a security information and event management (SIEM) or security operations center (SOC) solution. Treat your data classification solution just like any other mission-critical security system, and make sure it integrates seamlessly with your SIEM/SOC of choice. Tip 18: Truly enterprise-grade Does your data classification solution offer a truly enterprise-grade feature set, including centralized classification policy management, seamless Active Directory integration with multi-forest capabilities, role-based administration, and health and operational monitoring components? Does it meet high-availability standards, offer load balancing, and support clustered deployment? Business white paper | HP Atalla Information Protection and Control
  • 8. 8 The HP Atalla IPC solution In today’s tight data security climate, it is commonly agreed that effective data protection requires encryption, and that access should be restricted “on a need-to-know basis.” The IQProtector engine makes use of an innovative security paradigm: on creation or usage classification, and enforcement. Capture, classification, enforcement, and discovery, all take place at data creation, whether by applications or by users and at any user interaction with data. At the moment, that data is created or manipulated, on user’s endpoints or on servers. IQProtector intelligently identifies and classifies the data based on context and content criteria (the Atalla IPC information classification prism) and according to a centrally governed security policy. The IQProtector leverages Microsoft Active Directory Rights Management Services (AD RMS) to apply IRM protection to the data according to the policy. Persistent file protection IQProtector embeds protection within the data itself at the moment of creation—instantly identifying, classifying, and persistently tagging all new, modified, or accessed sensitive data from any origin. Context and content-sensitive IQProtector applies classification and AD RMS protection to emails, documents, or other files tagged as sensitive—applying AD RMS according to a customizable data security policy. Leveraging existing AD RMS and encryption frameworks, Atalla IPC intelligently generates, applies, and enforces encryption policies enterprise-wide. Business white paper | HP Atalla Information Protection and Control
  • 9. 9 • For example, early stages of a new design are classified as such, and the protection limits the access to a limited group of authorized users. As the project develops to more advanced stages, its classification is also adjusted, and due to that, its protection is adjusted to include a larger and different group of authorized users. Such changes to classification and protection are applied in a managed way by authorized personnel or automatic processes. This enables an organization to achieve any desired balance between security needs and business continuity. • All sensitive information and reports that are exported from any design, manufacturing, or sketching application can be intercepted automatically—even before the end user gets hold of it—according to the defined organization policy that is classified and encrypted with usage rights enforced. • IQProtector data classification and protection policy is dynamic and adaptive, and may be configured to change throughout the data’s information lifecycle according to changing security risks and business needs. The HP Atalla IPC concept is channel and medium agnostic, meaning you stop running after the data that exists and perform plumbing-like activities, trying to stop sensitive data from leaving the organization. When information is protected at creation, it reaches the end user already protected without any chance of tampering with the data. You can gain the benefit of sensitive data internal compartmentalization as a complementary tool for continuous data classification and encryption. Figure 1. Manufacturing application system data immunization IQProtector agent in action Usage data IQProtector management server Open Save Email Upload Download Classify content Capture events Manage permissions Embed policy Apply protection Destination Partner Web Storage Devices Source SaaS Web Client apps File repositories User Information is captured and analyzed from any source with Atalla IPC multi-source data interception system with optimized dataclassification and protection mechanism. Business white paper | HP Atalla Information Protection and Control
  • 10. 10 HP Atalla Information Protection and Control The HP Atalla IPC solutions provide the enterprise with: • File and mail classification: Classify file and email data items either automatically or manually based on the Atalla IPC information classification prism for data originating from any source (user, applications, cloud services, and more) according to corporate policy. Classification also allows adding visual classification to Microsoft Office and emails in order to raise users’ awareness on data sensitivity. The classification policy can be configured to require user input to raise the automatically assigned security level manually, where the data type, content, and context are insufficient parameters for a meaningful classification. • File and mail automatic protection: IQProtector applies Microsoft AD RMS data protection to files and mails based on the data item classification and according to the corporate security policy. Protection is applied automatically and transparently, with no operational disruption. The AD RMS protection includes encryption and a security policy of permissions (such as view, edit, print, extract), per user or user group, according to the organizational policy for the specific data type. However, unlike traditional Access Control Lists (ACLs), which are location-specific, AD RMS is embedded in the data itself and goes with the data. The permissions policy may be subsequently changed by IQProtector itself—in accordance with the organizational policy and the business process. Business white paper | HP Atalla Information Protection and Control
  • 11. 11 • Secured mail collaboration: IQProtector collaboration rules are classification- and protection-aware allowing the corporate to help ensure that only authorized users collaborate authorized data to authorized recipients inside and outside the corporate. Such collaboration rules may adapt the classification and protection of data items, block specific items from being sent or accessed, or strip data item from its protection based on the corporate security policy and business needs. • Application protection: IQProtector classifies and protects unstructured data in Web applications applying AD RMS rights within the Web application page (copy, print, etc.). IQProtector intercepts documents and reports generated and downloaded from any Web- or client-based applications without any need for integration allowing continuous protection for data beyond application boundaries. • Mobile support for AD RMS: Enables secure collaboration on RMS-protected emails and attachments on all major mobile devices and operating systems (iOS, BlackBerry, and Android). • Non-intrusive data discovery: IQProtector tracking and logging capabilities can be used to discover where the organization sensitive data is located. No data center deployment or intrusive scanning is needed. Instead, IQProtector monitors data usage and locates the data sources. The discovery results enable designing an effective and non-interruptive IQProtector security policy. • Data usage discovery for granular policy design: IQProtector tracking and logging capabilities can be used to discover how data is used in the organization: who is using which data, to whom are they sending it, and where are they saving it. Differentiating between legitimate business practices and usage, which should be prevented, enables organizational security officers to formulate a granular policy meaningfully, defining who should be allowed access and to what information. • Comprehensive data usage auditing: The entire information lifecycle, from creation through distribution and storage, is fully audited to supply security officers with comprehensive information about compliance to privacy, state, and industry regulations. Known security breaches can be tracked by identifying the usage of the leaked data. • Transparent assimilation in IT environment: Trusted applications like DLP, antivirus (A/V), or search engines can still access encrypted data seamlessly without integration efforts. IQProtector enables ECM, DLP, antivirus, and other enterprise IT systems to inspect, index, and classify encrypted content preserving investment in existing systems. Business white paper | HP Atalla Information Protection and Control
  • 12. Rate this documentShare with colleagues Sign up for updates hp.com/go/getupdated HP Atalla IPC key benefits Delivers data classification and automated protection • Proven classification accuracy –– Powered by content and context analysis • Multi-disciplinary classification mechanisms –– User, system recommendation, automatic source-based between data source and destination • Optimized classification cycle –– Triggered by captured events (open, close, save, upload, download, copy, etc.) • Full analytics of data usage events –– For all classification attributes; for enforcement, reporting, and audit • Persistent protection wherever the data travels –– Protection injected at the point of creation and travels with the data throughout its lifecycle Learn more at hp.com/go/AtallaIPC © Copyright 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Adobe and Acrobat are trademarks of Adobe Systems Incorporated. Microsoft and Windows are trademarks of the Microsoft group of companies. 4AA5-7731ENW, April 2015 Business white paper | HP Atalla Information Protection and Control