Advisory Note: From Data Leakage Prevention (DLP) to Information Stewardship - 70587

Report Details

Loss and theft of Information from organizations continues to be a significant problem. The new data protection regulations in the EU will increase focus on this area. Given the amount of attention to this problem and the wealth of standards and technology available – why do these leaks still occur? This document considers the sources of leakage and describes how better information stewardship based on information centric security is essential to manage these risks and mitigate any problems resulting from leakage of information.

Information stewardship is not a new term; it has been in use since the 1990’s and covers the wide range of challenges involved in managing information as a key organizational asset. These include the management of the whole information lifecycle from ownership to deletion as well as aspects like business value, data architecture, information quality, compliance and security. This report focuses on the information security and resilience aspects that can be improved through better stewardship...

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Nov 30, 2012

Advisory Note: From Data Leakage Prevention (DLP) to Information Stewardship - 70587

Loss and theft of Information from organizations continues to be a significant problem. The new data protection regulations in the EU will increase focus on this area. Given the amount of attention to this problem and the wealth of standards and technology available – why do these…

€495.00 Get access

Latest Related Reports

Executive View

Executive View: Big Data and Information Stewardship - 70744

Big Data provides many opportunities to solve emerging business challenges and Big Data technologies can create business value. However Big Data also creates security challenges that need to be considered by organizations adopting or using Big Data techniques and technologies. This paper…

Whitepaper

Whitepaper: Information Classification: Information Stewardship in Practice - 70740

Information stewardship uses good governance techniques to implement information centric security for all of your data. Information Stewardship involves the business as well as the IT services group. It creates a culture where the people in the organization understand the sensitivity of…

Whitepaper

Whitepaper: Using Information Stewardship within Government to Protect PII - 71002

Loss and theft of Personally Identifiable Information (PII) from government, military and defense organizations continues to be a significant problem. Given the amount of attention to this area and the wealth of standards and technology available – why do these leaks still occur? This…

Executive View

Snapshot: GTB Technologies – DLP solutions - 70357

GTB is a US-based vendor which delivers a suite of products focusing on the DLD and DLP issues, e.g. Data Loss Detection and Data Loss Prevention. The core product GTB Inspector acts as a content-aware reverse firewall which scans all outbound traffic and applies classification on these…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Comment: Know and Serve Your Customer

‘Know your customer’ started as an anti-money laundering (AML) initiative in the financial industry. Regulators insisted that banks establish a customer ‘due-diligence’ processes to ensure that all bank accounts could be traced back to the entities that owned them. The [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Know Your Customer (KYC)

In order to improve and tighten business relationships, today’s connected businesses need to communicate, collaborate and interact with their customers in a way that’s faster and suppler than ever before. Knowing consumers and their identities spot on also allows to optimally serve them. To use this key to success in the era of digital transformation, enterprises today often think about employing Customer Identity & Access Management (CIAM), complementary to traditional IAM for employees and business partners. They often forget however that, forced by regulation [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00