Symantec launches new information protection solution to automatically encrypt critical enterprise data

Symantec launches new information protection solution to automatically encrypt critical enterprise data

The Symantec Information Centric Security solution launched by *** can help enterprises automatically encrypt, track and revoke data anytime and anywhere, providing excellent visibility and control

Recently, Symantec, a global leader in network security, announced the launch of a new advanced information protection tool, Symantec Information Centric Security (ICS) solution, which provides enterprises with comprehensive visibility and management control of key business data, regardless of whether the data is stored locally, in the cloud or in other external devices. The Symantec Information Centric Security solution can automatically encrypt and track corporate data, even if it is moved to a non-enterprise controlled environment.

[[194184]]

Ensuring visibility of critical enterprise data and information is not an easy task, as it is difficult for IT staff to track every byte of enterprise data and where it is stored. Critical enterprise data, such as intellectual property (IP) or personally identifiable information (PII), is often shared and stored through various channels such as email, USB devices, local devices, Box or other cloud storage platforms. In fact, a recent survey conducted by Symantec found that about one-third of CISOs believe that data loss is one of the biggest internal threats facing enterprises this year.

Data loss can also put companies at great risk of violating regional data regulations and laws, such as the upcoming EU Global Data Privacy Regulation (GDPR) and PCI Security Standards Council regulations. According to GDPR regulations, if companies fail to meet compliance requirements, they will face fines of up to $21 million or 4% of annual revenue, whichever is higher. As can be seen, data loss will not only cause companies to face high fines, but also cause them to lose market competitiveness, damage their brand image, and even cause more serious potential impacts.

The solution: integrated security

Symantec Information Centric Security solutions take a new approach to data security, combining visibility, data protection and authentication to protect sensitive enterprise data wherever it is stored, even in non-enterprise-controlled environments such as cloud applications and employee-bring-your-own-devices (BYOD).

As the first solution to integrate industry-leading data loss prevention (DLP), CloudSOC CASB, cloud-based PGP encryption, and identity authentication, Symantec Information Centric Security enables enterprise users to track and manage the entire life cycle of data. With this solution, users can automatically encrypt, track, and revoke data anytime, anywhere.

Key benefits of the Symantec Information Centric Security solution include:

  • Automatically discover sensitive data on various communication channels or manually classified by the creating user;
  • Automatically identify and encrypt sensitive data through the data leakage prevention (DLP) function to reduce the risk of accidental data loss;
  • Through CASB capabilities, data can be intercepted from the cloud and data loss prevention (DLP) protection can be extended to non-enterprise controlled environments;
  • Multi-factor authentication is provided through Symantec VIP. Symantec VIP integrates user authentication credentials and decryption keys to ensure that only genuine users have access.

It is worth mentioning that the Symantec Information Centric Security solution is open to third parties and supports third-party integration. Symantec plans to release Internet drafts and API extensions for use by third-party developers and data-centric vendors.

With the new Symantec Information Protection solution, enterprises can further respond to the ever-changing threat environment and network security risks by accurately capturing, tracking and protecting business-critical data through a powerful policy engine and using dynamic intelligent protection to reduce human error.

<<:  Aicrypt and Anbai Technology reached a strategic cooperation to build the "Application Security +" of the information industry

>>:  CDN has so many derivatives?! Yunfan Accelerator takes advantage of technological innovation to conquer the new blue ocean of short videos

Recommend

The first batch of 5G users complained: 30G was spent in 2 days!

At the end of October, the three major operators ...

Traffic scheduling: DNS, full-site acceleration and computer room load balancing

We have learned about how to deal with traffic pr...

Why 5G networks require a new way of operating

In the 5G reality, network operations are moving ...

5G technology is expected to make various contributions to Jordan’s GDP

Recently, Ericsson commissioned management consul...

Detailed explanation of five Docker container network modes

Docker networking sets up how containers communic...

Why the popular dual-band wireless router advantages tell you

Open the e-commerce website, dual-band wireless r...

The battle for power saving in 5G mobile phones

As of the end of 2020, 718,000 5G base stations h...

Is working from home a good idea? See which companies are hiring remote developers

【51CTO.com Quick Translation】 When you encounter ...