Symantec launches new information protection solution to automatically encrypt critical enterprise data

Symantec launches new information protection solution to automatically encrypt critical enterprise data

The Symantec Information Centric Security solution launched by *** can help enterprises automatically encrypt, track and revoke data anytime and anywhere, providing excellent visibility and control

Recently, Symantec, a global leader in network security, announced the launch of a new advanced information protection tool, Symantec Information Centric Security (ICS) solution, which provides enterprises with comprehensive visibility and management control of key business data, regardless of whether the data is stored locally, in the cloud or in other external devices. The Symantec Information Centric Security solution can automatically encrypt and track corporate data, even if it is moved to a non-enterprise controlled environment.

[[194184]]

Ensuring visibility of critical enterprise data and information is not an easy task, as it is difficult for IT staff to track every byte of enterprise data and where it is stored. Critical enterprise data, such as intellectual property (IP) or personally identifiable information (PII), is often shared and stored through various channels such as email, USB devices, local devices, Box or other cloud storage platforms. In fact, a recent survey conducted by Symantec found that about one-third of CISOs believe that data loss is one of the biggest internal threats facing enterprises this year.

Data loss can also put companies at great risk of violating regional data regulations and laws, such as the upcoming EU Global Data Privacy Regulation (GDPR) and PCI Security Standards Council regulations. According to GDPR regulations, if companies fail to meet compliance requirements, they will face fines of up to $21 million or 4% of annual revenue, whichever is higher. As can be seen, data loss will not only cause companies to face high fines, but also cause them to lose market competitiveness, damage their brand image, and even cause more serious potential impacts.

The solution: integrated security

Symantec Information Centric Security solutions take a new approach to data security, combining visibility, data protection and authentication to protect sensitive enterprise data wherever it is stored, even in non-enterprise-controlled environments such as cloud applications and employee-bring-your-own-devices (BYOD).

As the first solution to integrate industry-leading data loss prevention (DLP), CloudSOC CASB, cloud-based PGP encryption, and identity authentication, Symantec Information Centric Security enables enterprise users to track and manage the entire life cycle of data. With this solution, users can automatically encrypt, track, and revoke data anytime, anywhere.

Key benefits of the Symantec Information Centric Security solution include:

  • Automatically discover sensitive data on various communication channels or manually classified by the creating user;
  • Automatically identify and encrypt sensitive data through the data leakage prevention (DLP) function to reduce the risk of accidental data loss;
  • Through CASB capabilities, data can be intercepted from the cloud and data loss prevention (DLP) protection can be extended to non-enterprise controlled environments;
  • Multi-factor authentication is provided through Symantec VIP. Symantec VIP integrates user authentication credentials and decryption keys to ensure that only genuine users have access.

It is worth mentioning that the Symantec Information Centric Security solution is open to third parties and supports third-party integration. Symantec plans to release Internet drafts and API extensions for use by third-party developers and data-centric vendors.

With the new Symantec Information Protection solution, enterprises can further respond to the ever-changing threat environment and network security risks by accurately capturing, tracking and protecting business-critical data through a powerful policy engine and using dynamic intelligent protection to reduce human error.

<<:  Aicrypt and Anbai Technology reached a strategic cooperation to build the "Application Security +" of the information industry

>>:  CDN has so many derivatives?! Yunfan Accelerator takes advantage of technological innovation to conquer the new blue ocean of short videos

Recommend

What kind of sparks will be created when 5G meets the power grid?

In the past, electricity changed the way of produ...

Cloud computing, IoT and SDN pose the biggest challenges to enterprise networks

According to a new report released by Kentik, clo...

5G private network is a big watermelon (Part 2): The mystery of the collision

In the first article of this series, we explained...

Catch it all - Webpack project packaging 1

[[427986]] This article is reprinted from the WeC...

AT&T and Microsoft team up for private 5G edge deployment

To further accelerate its goal of deploying priva...

From 1G to 5G and then to 6G, 30 years of mobile communication technology

Since the 1980s, mobile communications have seen ...