It”™s an old truth that the man who does not know what he has will soon lose it. It appears to be the same with bits and bytes.
A study conducted by Norwalk-based Xerox has found that gaining control of the number of records, forms and files flowing through an organization is an imperative step before a company can be assured of a secure data records system.
The study found the top document-related challenges that contribute to workplace inefficiency are too many paper-based files and information residing in multiple formats, making it nearly impossible to search.
According to Xerox, once data streams are properly organized, they can be protected.
Protegrity Corporation, based in Stamford, specializes in the protection of data. Protegrity has recently released the fifth version of its data protection platform.
Â
The platform, called DPS 5, fully supports enterprises in their drive to move forward to proactive risk-adjusted data security strategies in order to achieve the right balance between business needs and security/compliance demands.
Â
“DPS is a truly significant update,” said Paul Giardina, CEO of Protegrity. “We have incorporated many Protegrity-patented technologies into this release. We, along with many enterprises, believe that risk-adjusted data protection is the most effective security model to employ, and DPS 5 strongly demonstrates our commitment to supporting practical, business-process based data security solutions.”
According to Protegrity, data protection is something that requires up-to-date maintenance and best practices. Revised features of their system include insider terms tokenization, format controlling, encryption, data usage monitoring, policy-based masking and security coordinates.
Giardina said having a system that secures data at the application, file and database levels, driven by an enterprise”™s own security policies, is an important business process in 2009.
“DPS is comprised of three core components designed to ease data security management and measurably simplify regulatory compliance,” said Giardina. “Protegrity Threat Management System is a web application firewall that detects and blocks unwanted activity.”
Despite the difficulties associated with reaching an acceptable level data management and protection, Xerox”™s study found that establishing an inventory document processes, outsourcing document management and retraining management can all help the method.