Data Security at Content Creation with Microsoft and Websense
I think there is a need for industries to first admit a problem – a problem with data. A huge volume of new content is being created, shared and moved inside and outside our walls every second. The challenge is that much of this data is sensitive and is a major governance and data theft concern. In order to prevent both accidental data loss and malicious data theft organizations need to be able to identify what is and is not sensitive information and be able to accurately categorize sensitive information as it is created without a massive process that intrudes or adds additional steps to content creator.
We’ve seen this is a real challenge for organizations, so we have been working closely with Microsoft to accurately monitor, identify, categorize, and ensure protection and proper use of sensitive information— as it is being authored. It’s a big challenge and a huge technology hurdle. That said, at the recent Microsoft® BUILD developer conference we demonstrated accurate real-time file classification and data security policy application done automatically, without manual intervention from the author.
What we have done is integrate Websense DLP technology with the new File Classification Infrastructure (FCI) capabilities of Microsoft Windows® Server 8. What this means is that Websense DLP accurately identifies and classifies sensitive information - like source code, network diagrams, credit card numbers and customer files. It then applies one or more of our 1100 standard data policies and any custom policies to automatically tag the document and protect its use regardless of where it will travel.
The real key innovation here is that it is all done as it is being created, without a user even having to give it a second thought.
This automatic classification and policy enforcement should greatly assist organizations looking to maintain industry compliance and protect themselves from inappropriate use or theft of their data. We’ve made a video that illustrates how the process works. We’d love if you took a moment to take a look at this innovation in data protection.
(Please visit the site to view this media)