English   Deutsch   Русский   中文    

Advisory Note: From Data Leakage Prevention (DLP) to Information Stewardship - 70587

Loss and theft of Information from organizations continues to be a significant problem. The new data protection regulations in the EU will increase focus on this area. Given the amount of attention to this problem and the wealth of standards and technology available – why do these leaks still occur? This document considers the sources of leakage and describes how better information stewardship based on information centric security is essential to manage these risks and mitigate any problems resulting from leakage of information.

Information stewardship is not a new term; it has been in use since the 1990’s and covers the wide range of challenges involved in managing information as a key organizational asset. These include the management of the whole information lifecycle from ownership to deletion as well as aspects like business value, data architecture, information quality, compliance and security. This report focuses on the information security and resilience aspects that can be improved through better stewardship...


You can get access to this document for free, if you register for KuppingerCole Select access now.
Date Title Price
Nov 30, 2012 Advisory Note: From Data Leakage Prevention (DLP) to Information Stewardship - 70587


€495.00 Get access 


top
KuppingerCole Select
Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.
Register now
Spotlight
Mobile Enterprise
It is estimated by the International Telecommunication Union that the total number of mobile devices in the world has already exceeded the number of people. Mobile devices are becoming increasingly advanced as well. In fact, modern smartphones are as powerful as desktop computers, but “know” much more about their owners: current and past location, contents of their private text messages, photos and other sensitive information, as well as their online banking credentials and other financial data. They are also always connected to the Internet and thus are especially vulnerable to hacking and malware exploits.
Links
 KuppingerCole News

 KuppingerCole on Facebook

 KuppingerCole on Twitter

 KuppingerCole on Google+

 KuppingerCole on YouTube

 KuppingerCole at LinkedIn

 Our group at LinkedIn

 Our group at Xing

 GenericIAM
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2015 KuppingerCole