SlideShare a Scribd company logo
Make a case for
data classification in
your organization
www.watchfulsoftware.com
June 22,2016
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2
Agenda
1 Introductions & “House Rules”
2 Business Context & Challenges
3 Data Classification is key
4 Data Classification is Evolving
5 First Generation tools “User Driven”
6 Second Generation tools “User Friendly”
7 Use Case on policy driven rules
8 RightsWATCH Audit Trail
9 Q&A andWrap-up
Introductions
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3
Dick Olsen House Rules
 You are muted centrally. You don’t need to
mute/unmute yourself
 This webinar is being recorded. You’ll have access to it
On-demand at www.watchfulsoftware.com/en/resources
 The Q&A session will be at the end. You are welcomed
to enter questions anytime, using the Questions feature
in the GoToWebinar control panel
Dick Olsen serves as the marketing
lead for Watchful Software and is
responsible for brand positioning and
messaging.
1 Securing data and company secrets has become increasing difficult
2 40% of enterprises will experience data breach this year
3 Data breaches damage reputations, customers and employees
4 Corporate security policies are often complex and difficult for users to understand
Business Context & Challenges
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4
Data Classification is the most effective step to securing your data
• Securing Data as it is created through
Classification is the most effective step in
securing your data
• Works at the point of creation
• Is driven by your corporate policies
• Determines who can see the data before it is
shared
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5
Policy-driven Classification
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6
data is truly sensitive?
should have access to it?
is the data to be handled?
should the classification change?
What
Who
How
When
should the data be protected?Where
Data classification tools are evolving to become more effective
• Data classification tools are evolving to
become more effective
• As a data security professional it is your
responsibility to continually upgrade your
solutions
• Most employees do not know or care much
about protecting data
• “It is somebody else's job”
• It is time consuming and complicated to
comply with policies
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7
First Generation User Driven Data Classification Products
• First generation classification tools are
classified as “user driven”
• Required in-depth understanding of your
corporate security policies
• User judgement calls
• Drop down questions
• Classification errors
• Incomplete compliance
• Result in Leaks
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8
Second Generation User Friendly Automated Systems
• RightsWATCH is a user friendly automated
system that works to classify your data in
compliance with your security guidelines
• Digitizes your corporate classification
guidelines to automate designation of data
• Properly classifies information when it is
created so it is handled appropriately
• Streamlines and simplifies the user experience
• Relieves the end user from the need to
understand and apply corporate policies
• Makes your existing infrastructure work better
• Improves compliance
• Works on new and legacy files
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
RightsWATCH reads data as it is being created
• RightsWATCH reads data as it is being created
by your users
• Applies your classification policies and assigns
the correct classification real time
• Eliminates errors
• If authorized, enables classification override
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10
Use Cases on Policy-driven Rules
1. Emails are automatically classified based on:
1) to whom is the email being sent
2) which content is written in the email
3) which files are attached to it
6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 11
Content, Context and
Metadata aware
Policy-driven Rules
Use Cases on Policy-driven Rules
2. RightsWATCH’s Global Protector dynamically scans legacy data files and automatically
classifies ALL files in that repository, enforcing the policy rules.
6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 12
Global Protector
Server
Use Cases on Policy-driven Rules
3. A user is prevented from saving a document to an unauthorized location and/or with
unauthorized content. RightsWATCH blocks the file from being saved and shows the user the
reason why.
6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 13
Warn/Block
Rules
RightsWatch provides an audit trail
• RightsWATCH provides a comprehensive
audit trail
• Documents and traces any authorized or
unauthorized access to confidential data
• Provides real time information detailing who
is doing what, when and how with classified
information
• Enables organizations to improve regulatory
compliance
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 14
RightsWATCH Summary
• RightsWATCH automated systems represent a
significant upgrade to earlier user driven
products
• Data classification in compliance with
corporate protocols at the point of creation is
an essential step in the plan to secure data
• Early tools are complicated and failed to gain
user support and usage proved minimal
• RightsWATCH automated policy driven
product streamlines the user experience
• RightsWATCH improves your existing security
infrastructure and compliance
• RightsWATCH is necessary upgrade to protect
your data
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 15
Check out the “Resources” area on www.watchfulsoftware.com and watch
short product walkthrough demonstrations of how RightsWATCH address a
comprehensive set of use cases
E-mail info@watchfulsoftware.com to request a demo of RightsWATCH
This webinar is being recorded.You’ll have access to it On-demand at
www.watchfulsoftware.com
Q&A
Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 16
www.watchfulsoftware.com
June 22, 2016
Make a case for data
classification in your
organization

More Related Content

What's hot

Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance  Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance
Privacera
 
The economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasThe economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos Loutas
Open Knowledge Belgium
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
Privacera
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
Jeff Kelly
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Index Engines Inc.
 
The GDPR timeline - Stephen Bailey, NCC Group
The GDPR timeline - Stephen Bailey, NCC GroupThe GDPR timeline - Stephen Bailey, NCC Group
The GDPR timeline - Stephen Bailey, NCC Group
BCS Data Management Specialist Group
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
Index Engines Inc.
 
Case Study For Data Governance Portal
Case Study For Data Governance PortalCase Study For Data Governance Portal
Case Study For Data Governance Portal
Mike Taylor
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
TrustArc
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Symantec
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
TrustArc
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
Neo4j
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
Revulytics Inc.
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
Druva
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
TrustArc
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
Peter Witsenburg
 
data_blending
data_blendingdata_blending
data_blending
subit1615
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
TrustArc
 
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
Craig Adams
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
Druva
 

What's hot (20)

Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance  Five Elements of Effective Data Access Governance
Five Elements of Effective Data Access Governance
 
The economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos LoutasThe economic value behind (Linked) Open Data - Nikolaos Loutas
The economic value behind (Linked) Open Data - Nikolaos Loutas
 
Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020Privacera Databricks CCPA Webinar Feb 2020
Privacera Databricks CCPA Webinar Feb 2020
 
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
CCPA Compliance for Analytics and Data Science Use Cases with Databricks and ...
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017
 
The GDPR timeline - Stephen Bailey, NCC Group
The GDPR timeline - Stephen Bailey, NCC GroupThe GDPR timeline - Stephen Bailey, NCC Group
The GDPR timeline - Stephen Bailey, NCC Group
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
 
Case Study For Data Governance Portal
Case Study For Data Governance PortalCase Study For Data Governance Portal
Case Study For Data Governance Portal
 
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
Managing Multiple Compliance Priorities - GDPR, CCPA, HIPAA, APEC, ISO 27001,...
 
How to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected DataHow to turn GDPR into a Strategic Advantage using Connected Data
How to turn GDPR into a Strategic Advantage using Connected Data
 
GDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage AnalyticsGDPR Readiness for Software Usage Analytics
GDPR Readiness for Software Usage Analytics
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...
 
GDPR How to get started?
GDPR  How to get started?GDPR  How to get started?
GDPR How to get started?
 
data_blending
data_blendingdata_blending
data_blending
 
ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]ROI of Privacy: Building a Case for Investment [Webinar Slides]
ROI of Privacy: Building a Case for Investment [Webinar Slides]
 
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 

Viewers also liked

Diagnosticos de problemas de funcionamiento en vehiculos obd i & ii
Diagnosticos de problemas de funcionamiento en vehiculos obd i & iiDiagnosticos de problemas de funcionamiento en vehiculos obd i & ii
Diagnosticos de problemas de funcionamiento en vehiculos obd i & ii
gustavo saravia
 
New York Daily News McCarthy
New York Daily News McCarthyNew York Daily News McCarthy
New York Daily News McCarthyKraig Bohot
 
The future of digital marketing - Sophie Iredale #passion4digital
The future of digital marketing - Sophie Iredale #passion4digitalThe future of digital marketing - Sophie Iredale #passion4digital
The future of digital marketing - Sophie Iredale #passion4digital
Masters in Digital Marketing Europe
 
Trabajo de fisica.compressed
Trabajo de fisica.compressedTrabajo de fisica.compressed
Trabajo de fisica.compressed
marisela cusquillo
 
MBA_Energy__Industrial_Training_Certificate
MBA_Energy__Industrial_Training_CertificateMBA_Energy__Industrial_Training_Certificate
MBA_Energy__Industrial_Training_Certificate
Gaurav Agarwal
 
resume11
resume11resume11
Condition Monitoring of Transformer
Condition Monitoring of TransformerCondition Monitoring of Transformer
Condition Monitoring of Transformer
Makwana Mehul
 
Rhon resume
Rhon resumeRhon resume
Rhon resume
Ronald dela Cruz
 
Uvod u povijest
Uvod u povijestUvod u povijest
Uvod u povijest
batica1
 
Transformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for GrowthTransformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for Growth
francisfoo
 
Narodi istočne obale sredozemlja feničani i i żidovi
Narodi istočne obale sredozemlja   feničani  i i żidoviNarodi istočne obale sredozemlja   feničani  i i żidovi
Narodi istočne obale sredozemlja feničani i i żidoviŠkola Futura
 
Federal Court Order Suspending AB 219
Federal Court Order Suspending AB 219Federal Court Order Suspending AB 219
Federal Court Order Suspending AB 219
Jon Welner
 

Viewers also liked (12)

Diagnosticos de problemas de funcionamiento en vehiculos obd i & ii
Diagnosticos de problemas de funcionamiento en vehiculos obd i & iiDiagnosticos de problemas de funcionamiento en vehiculos obd i & ii
Diagnosticos de problemas de funcionamiento en vehiculos obd i & ii
 
New York Daily News McCarthy
New York Daily News McCarthyNew York Daily News McCarthy
New York Daily News McCarthy
 
The future of digital marketing - Sophie Iredale #passion4digital
The future of digital marketing - Sophie Iredale #passion4digitalThe future of digital marketing - Sophie Iredale #passion4digital
The future of digital marketing - Sophie Iredale #passion4digital
 
Trabajo de fisica.compressed
Trabajo de fisica.compressedTrabajo de fisica.compressed
Trabajo de fisica.compressed
 
MBA_Energy__Industrial_Training_Certificate
MBA_Energy__Industrial_Training_CertificateMBA_Energy__Industrial_Training_Certificate
MBA_Energy__Industrial_Training_Certificate
 
resume11
resume11resume11
resume11
 
Condition Monitoring of Transformer
Condition Monitoring of TransformerCondition Monitoring of Transformer
Condition Monitoring of Transformer
 
Rhon resume
Rhon resumeRhon resume
Rhon resume
 
Uvod u povijest
Uvod u povijestUvod u povijest
Uvod u povijest
 
Transformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for GrowthTransformation of the Electronic Payments Industry - Strategies for Growth
Transformation of the Electronic Payments Industry - Strategies for Growth
 
Narodi istočne obale sredozemlja feničani i i żidovi
Narodi istočne obale sredozemlja   feničani  i i żidoviNarodi istočne obale sredozemlja   feničani  i i żidovi
Narodi istočne obale sredozemlja feničani i i żidovi
 
Federal Court Order Suspending AB 219
Federal Court Order Suspending AB 219Federal Court Order Suspending AB 219
Federal Court Order Suspending AB 219
 

Similar to Make a case for Data Classification in your organization

Secure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaSecure information sharing - the external user dilemma
Secure information sharing - the external user dilemma
Watchful Software
 
How classification augments data loss prevention
How classification augments data loss preventionHow classification augments data loss prevention
How classification augments data loss prevention
Watchful Software
 
Watchful Corporate Overview
Watchful Corporate OverviewWatchful Corporate Overview
Watchful Corporate Overview
Watchful Software
 
How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate data
Watchful Software
 
FDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection IntelligenceFDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection Intelligence
Armin Torres
 
FDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection IntelligenceFDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection Intelligence
Armin Torres
 
Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16
Ravindran Vasu
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
Ernest Staats
 
Enterprise Data Management
Enterprise Data ManagementEnterprise Data Management
Enterprise Data Management
Bhavendra Chavan
 
The path to most GRC requirements
The path to most GRC requirementsThe path to most GRC requirements
The path to most GRC requirements
Watchful Software
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
PECB
 
OWASPTop10PrivacyRisks_v2(1).pptx
OWASPTop10PrivacyRisks_v2(1).pptxOWASPTop10PrivacyRisks_v2(1).pptx
OWASPTop10PrivacyRisks_v2(1).pptx
agam37
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
ALI ANWAR, OCP®
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
Drew Madelung
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
Armin Torres
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Srikanth Sharma Boddupalli
 
Valdas Maksimavičius - Reducing Technology Risks through Prototyping
Valdas Maksimavičius - Reducing Technology Risks through PrototypingValdas Maksimavičius - Reducing Technology Risks through Prototyping
Valdas Maksimavičius - Reducing Technology Risks through Prototyping
Agile Lietuva
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
Imperva
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
Andy Talbot
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
Don Daubert
 

Similar to Make a case for Data Classification in your organization (20)

Secure information sharing - the external user dilemma
Secure information sharing - the external user dilemmaSecure information sharing - the external user dilemma
Secure information sharing - the external user dilemma
 
How classification augments data loss prevention
How classification augments data loss preventionHow classification augments data loss prevention
How classification augments data loss prevention
 
Watchful Corporate Overview
Watchful Corporate OverviewWatchful Corporate Overview
Watchful Corporate Overview
 
How classification changes the way you look into corporate data
How classification changes the way you look into corporate dataHow classification changes the way you look into corporate data
How classification changes the way you look into corporate data
 
FDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection IntelligenceFDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection Intelligence
 
FDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection IntelligenceFDA News Webinar - Inspection Intelligence
FDA News Webinar - Inspection Intelligence
 
Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16Watchful-Corporate-Overview-Q1-16
Watchful-Corporate-Overview-Q1-16
 
Privacies are coming
Privacies are comingPrivacies are coming
Privacies are coming
 
Enterprise Data Management
Enterprise Data ManagementEnterprise Data Management
Enterprise Data Management
 
The path to most GRC requirements
The path to most GRC requirementsThe path to most GRC requirements
The path to most GRC requirements
 
Creating Trust for the Internet of Things
Creating Trust for the Internet of ThingsCreating Trust for the Internet of Things
Creating Trust for the Internet of Things
 
OWASPTop10PrivacyRisks_v2(1).pptx
OWASPTop10PrivacyRisks_v2(1).pptxOWASPTop10PrivacyRisks_v2(1).pptx
OWASPTop10PrivacyRisks_v2(1).pptx
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipelineQlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
Qlik wp 2021_q3_data_governance_in_the_modern_data_analytics_pipeline
 
Valdas Maksimavičius - Reducing Technology Risks through Prototyping
Valdas Maksimavičius - Reducing Technology Risks through PrototypingValdas Maksimavičius - Reducing Technology Risks through Prototyping
Valdas Maksimavičius - Reducing Technology Risks through Prototyping
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)Microsoft Cloud GDPR Compliance Options (SUGUK)
Microsoft Cloud GDPR Compliance Options (SUGUK)
 
Data Loss Prevention in O365
Data Loss Prevention in O365Data Loss Prevention in O365
Data Loss Prevention in O365
 

More from Watchful Software

Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprinting
Watchful Software
 
Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
Watchful Software
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCH
Watchful Software
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast Presentation
Watchful Software
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
Watchful Software
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
Watchful Software
 
RightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSRightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMS
Watchful Software
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
Watchful Software
 
How to leverage office 365
How to leverage office 365How to leverage office 365
How to leverage office 365
Watchful Software
 
Bringing policy based classification to Sharepoint
Bringing policy based classification to SharepointBringing policy based classification to Sharepoint
Bringing policy based classification to Sharepoint
Watchful Software
 
The 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatThe 5 Key Trends for Insider Threat
The 5 Key Trends for Insider Threat
Watchful Software
 

More from Watchful Software (11)

Behavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprintingBehavior biometrics - The silent revolution in digital fingerprinting
Behavior biometrics - The silent revolution in digital fingerprinting
 
Jump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data ClassificationJump start EU Data Privacy Compliance with Data Classification
Jump start EU Data Privacy Compliance with Data Classification
 
Leverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCHLeverage your Siem Tool with RightsWATCH
Leverage your Siem Tool with RightsWATCH
 
Global Thought Leadership Webcast Presentation
Global Thought Leadership Webcast PresentationGlobal Thought Leadership Webcast Presentation
Global Thought Leadership Webcast Presentation
 
You can't teach an old dog new tricks
You can't teach an old dog new tricksYou can't teach an old dog new tricks
You can't teach an old dog new tricks
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
RightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMSRightsWATCH Secure Collaboration with Azure RMS
RightsWATCH Secure Collaboration with Azure RMS
 
Addressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance RequirementsAddressing todays Governance Risk and Compliance Requirements
Addressing todays Governance Risk and Compliance Requirements
 
How to leverage office 365
How to leverage office 365How to leverage office 365
How to leverage office 365
 
Bringing policy based classification to Sharepoint
Bringing policy based classification to SharepointBringing policy based classification to Sharepoint
Bringing policy based classification to Sharepoint
 
The 5 Key Trends for Insider Threat
The 5 Key Trends for Insider ThreatThe 5 Key Trends for Insider Threat
The 5 Key Trends for Insider Threat
 

Recently uploaded

UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
kalichargn70th171
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 

Recently uploaded (20)

UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
Why Mobile App Regression Testing is Critical for Sustained Success_ A Detail...
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 

Make a case for Data Classification in your organization

  • 1. Make a case for data classification in your organization www.watchfulsoftware.com June 22,2016
  • 2. Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 2 Agenda 1 Introductions & “House Rules” 2 Business Context & Challenges 3 Data Classification is key 4 Data Classification is Evolving 5 First Generation tools “User Driven” 6 Second Generation tools “User Friendly” 7 Use Case on policy driven rules 8 RightsWATCH Audit Trail 9 Q&A andWrap-up
  • 3. Introductions Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 3 Dick Olsen House Rules  You are muted centrally. You don’t need to mute/unmute yourself  This webinar is being recorded. You’ll have access to it On-demand at www.watchfulsoftware.com/en/resources  The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel Dick Olsen serves as the marketing lead for Watchful Software and is responsible for brand positioning and messaging.
  • 4. 1 Securing data and company secrets has become increasing difficult 2 40% of enterprises will experience data breach this year 3 Data breaches damage reputations, customers and employees 4 Corporate security policies are often complex and difficult for users to understand Business Context & Challenges Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 4
  • 5. Data Classification is the most effective step to securing your data • Securing Data as it is created through Classification is the most effective step in securing your data • Works at the point of creation • Is driven by your corporate policies • Determines who can see the data before it is shared Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 5
  • 6. Policy-driven Classification Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 6 data is truly sensitive? should have access to it? is the data to be handled? should the classification change? What Who How When should the data be protected?Where
  • 7. Data classification tools are evolving to become more effective • Data classification tools are evolving to become more effective • As a data security professional it is your responsibility to continually upgrade your solutions • Most employees do not know or care much about protecting data • “It is somebody else's job” • It is time consuming and complicated to comply with policies Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 7
  • 8. First Generation User Driven Data Classification Products • First generation classification tools are classified as “user driven” • Required in-depth understanding of your corporate security policies • User judgement calls • Drop down questions • Classification errors • Incomplete compliance • Result in Leaks Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 8
  • 9. Second Generation User Friendly Automated Systems • RightsWATCH is a user friendly automated system that works to classify your data in compliance with your security guidelines • Digitizes your corporate classification guidelines to automate designation of data • Properly classifies information when it is created so it is handled appropriately • Streamlines and simplifies the user experience • Relieves the end user from the need to understand and apply corporate policies • Makes your existing infrastructure work better • Improves compliance • Works on new and legacy files Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 9
  • 10. RightsWATCH reads data as it is being created • RightsWATCH reads data as it is being created by your users • Applies your classification policies and assigns the correct classification real time • Eliminates errors • If authorized, enables classification override Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 10
  • 11. Use Cases on Policy-driven Rules 1. Emails are automatically classified based on: 1) to whom is the email being sent 2) which content is written in the email 3) which files are attached to it 6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 11 Content, Context and Metadata aware Policy-driven Rules
  • 12. Use Cases on Policy-driven Rules 2. RightsWATCH’s Global Protector dynamically scans legacy data files and automatically classifies ALL files in that repository, enforcing the policy rules. 6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 12 Global Protector Server
  • 13. Use Cases on Policy-driven Rules 3. A user is prevented from saving a document to an unauthorized location and/or with unauthorized content. RightsWATCH blocks the file from being saved and shows the user the reason why. 6/22/2016 © Copyright www.watchfulsoftware.com. 2013 All Rights Reserved. 13 Warn/Block Rules
  • 14. RightsWatch provides an audit trail • RightsWATCH provides a comprehensive audit trail • Documents and traces any authorized or unauthorized access to confidential data • Provides real time information detailing who is doing what, when and how with classified information • Enables organizations to improve regulatory compliance Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 14
  • 15. RightsWATCH Summary • RightsWATCH automated systems represent a significant upgrade to earlier user driven products • Data classification in compliance with corporate protocols at the point of creation is an essential step in the plan to secure data • Early tools are complicated and failed to gain user support and usage proved minimal • RightsWATCH automated policy driven product streamlines the user experience • RightsWATCH improves your existing security infrastructure and compliance • RightsWATCH is necessary upgrade to protect your data Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 15
  • 16. Check out the “Resources” area on www.watchfulsoftware.com and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases E-mail info@watchfulsoftware.com to request a demo of RightsWATCH This webinar is being recorded.You’ll have access to it On-demand at www.watchfulsoftware.com Q&A Wednesday, June 22, 2016 © Copyright www.watchfulsoftware.com. 2016 All Rights Reserved. 16
  • 17. www.watchfulsoftware.com June 22, 2016 Make a case for data classification in your organization

Editor's Notes

  1. Organizations of all sizes are challenged to protect a growing quantity of valuable digital information against careless mishandling and malicious use. The increasing incidences of information theft underscore the need for better protection of digital information. Implementing a solid Information Classification Policy (ICP) is the first step to protecting sensitive information. A growing list of legislative and regulatory requirements adds to the ongoing task of protecting digital files and information Intricate and unclear data classification strategies that aren’t understood by users and end up never being used in the real world; PLUS the classification requirements, many times, don’t take in consideration the business impact and the volume of legacy data present in the organization.
  2. Organizations need to control and protect their sensitive and confidential information against information leakage, by dynamically applying a pre-defined Information Control Policy to all types of unstructured information (emails, documents, spreadsheets, presentations, etc.) as that information is created. Data classification should be established by setting a core set of principles regarding the proper use, handling and applicability of various protection profiles for each data category. To successfully implement a policy-driven classification process, your organization must know it’s data, and for that it must answer a few questions…
  3. There are 2 main methods to achieve data classification: Policy-driven: that relieves the user from the workload and overhead of having to know, understand and apply corporate policies, while at the same time increasing user and organizational awareness of the value and sensitivity of the data and ensuring compliance. User-driven: When the user is able to make data classification decisions or override automatic classification if corporate policy allows it. RightsWATCH enables you to have the flexibility to combine both methods according to your company’s security policies. For example, corporately defined policy rules can overwrite user decisions and choices if your company chooses to.
  4. To finalize, let me ask you to participate in a short 3 question quiz: - So, want we are asking is “Which type of rule are we applying in these use cases?”