Simplify your security stack Integrated Solutions
Spirion provides the single source of truth of sensitive data required to generate improved ROI from your organization’s existing data security and privacy technology investments Spirion’s mission to discover and protect sensitive data works in tandem with the rest of your IT security stack to help keep sensitive and restricted data away from external malicious actors and insider threats to privacy. Spirion’s accurate discovery and context-rich classification capabilities provide the identity necessary for Information/Data Rights Management (IRM/DRM) encryption, Security Information and Event Management (SIEM) incident workflows, data de-identification of structured data, and interoperability with Data Loss Prevention (DLP), NGFW, and CASB tools.
Information/Data Rights Management (IRM/DRM)
An increasingly common way to protect sensitive data is to restrict access to only the specific individuals that require it.. To do this, rights management solutions encrypt the selected files and limit the set of users who are permitted to decrypt these files. Rights management can also limit user rights to read-only, or limit actions such as printing, copying text, or sharing. These solutions excel at keeping prying eyes away from unauthorized data but can sometimes require assistance in understanding which data requires which level of protection.
An ongoing challenge in data security is controlling who gets access to which data without impacting productivity. Security leaders struggle to determine who can access data, when they can access it, and from which applications. Traditional security postures and techniques like full-disk encryption rely on defending a known perimeter, I But with modern applications and storage moving to the Cloud and more employees working remotely, the network perimeter has been obliterated.
Spirion simplifies rights management by working with leading file-level encryption and rights management providers to automatically enable the appropriate level of protection based on the sensitivity of the data. Organizations gain maximum functionality from their Rights Management and Encryption applications by leveraging the unparalleled accuracy of Spirion sensitive data discovery and identification. This solution fortifies your organization’s data security and compliance posture by ensuring your protection policies are optimized for the sensitivity of the data.
Microsoft + Spirion
Microsoft Purview Information Protection (MPIP), a cloud-based solution, enables organizations to classify and protect documents and emails by applying labels. It supports both manual and automatic labeling to help you both classify and (optionally) protect your documents. When integrated with Spirion, you benefit from c both MPIP’s labeling methodology and Spirion’s additional data sources, endpoint discovery, and more customizable persistent data classification methodology to invoke MPIP Rights Management.
Seclore + Spirion
Seclore Rights Management, the only entirely browser-based security solution, ensures sensitive information, digital assets, and documents can be protected and tracked wherever they travel and are stored with granular, persistent usage data security controls. When integrated with Spirion, Seclore can invoke specific protections based on Spirion classification tags.
Atakama + Spirion
Traditional encryption solutions are heavily dependent on identity and access management controls. Login credentials, which allow the authorized users to access encrypted data, represent a single point of failure. Atakama enables the encryption of files on an individual level without reliance on usernames and passwords. Spirion’s discovery and classification can automatically invoke Atakama’s data-centric security controls during the processing of scan results to ensure that sensitive information is consistently discovered, classified, logged, and protected by Atakama’s encryption, regardless of whether it resides inside or outside the security perimeter of an enterprise.
Thales + Spirion
Thales CipherTrust Transparent Encryption provides continuous, data-at-rest encryption to protect against unauthorized access by users and processes in physical, virtual, and cloud environments. When integrated with Spirion, you can meet the requirements of new remote work environments with sensitive-data-centric encryption and rights management. Spirion automatically discovers and classifies documents for sensitivity, applicable regulations, and other context, based upon organizational policies. These classifications are then shared with the Thales CipherTrust Transparent Encryption platform to encrypt data based upon its sensitivity and policies without disrupting ongoing business and operational processes.
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM) solutions are essential to organizations to manage workflow, deliver real-time analysis of security alerts, and s protect against attacks. SIEM technologies collect security log events from various hosts within an enterprise and centrally store the relevant data. By compiling log data in a single place, SIEM products enable centralized analysis and reporting and help organizations decrease the impact of advanced cyber-attacks by proactively monitoring the network for irregular activity in real-time.
SIEM tools provide reporting about security incidents, as well as real-time alerts based on analytics to an organization’s incident response team. SIEM tools aggregate data from across a networked environment, and makes that data useable. With the data categorized by a SIEM, users can research data security breaches with as much detail as necessary or even stop potential breaches in their tracks with real-time detection of anomalous behavior.
SIEM technologies deliver many advantages, but often lack a level of context regarding risks to data security and privacy. Without this understanding, to enable organizations struggle to understand how various events relate to the data impacted during security incidents. For example, a user accessing a folder or a server might not seem like a risk, but if the user is from R&D and is accessing and copying customer data, it could represent malicious activity. Accurate identification and classification of data sensitivity should be integrated into the SIEM to guard against these anomalies.
Organizations gain gain productivity from their SIEM solutions by integrating with Spirion. Once sensitive information is discovered by Spirion, persistent machine-readable metadata is applied to the data identifying its sensitivity level, which is then tracked by the activity logs collected by the SIEM product of choice. Your organization’s data security and compliance is fortified with data-context awareness that fuels optimal data analysis and reporting.
Splunk + Spirion
Splunk makes incident and forensic data accessible across an organization by identifying data patterns, providing metrics, diagnosing problems and providing intelligence for business operations. Spirion creates persistent, machine-readable metadata that this product can track in its activity logs, providing context awareness and improving your analysis and reporting capabilities.
Alien Vault + Spirion
AT&T Cybersecurity offers feature-rich, open source SIEM complete with event collection, normalization and correlation. Spirion creates persistent, machine-readable metadata that this product can track in its activity logs, providing context awareness and improving your analysis and reporting capabilities.
Privacy regulations such as GDPR & CCPA require organizations to delete user data from their systems when requested or when prior consent expires. Often, this data has genuine business utility that is lost when the personal data is entirely removed.
De-identification is a process for removing personally identifiable information (PII) from a data set to protect the privacy of individuals, since once de-identified, a data set is no longer considered to contain personal information. This reduces the risk of non-compliance with data privacy and security regulations.
With Spirion’s AnyFind® active scanning technology, c you can confidently identify database locations where sensitive data exists. Spirion performs fast and accurate searches of structured data in locations where many other solutions cannot. By identifying the sensitive data exposure, organizations can more accurately focus their de-identification efforts and protect sensitive data more effectively. Together, the joint solution provides a provable guarantee of privacy protection against a range of privacy attacks.
Examples of Integrations
Tonic + Spirion
To comply with Privacy regulations like GDPR & CPRA, companies need the ability to remove data identifying individuals from their systems without losing the business, scientific, analytic, or demographic value that data provides. Tonic uses Database Anonymization, Database Subsetting, and Data Synthesis to replace data/text within structured data repositories to anonymize it while still maintaining value. Spirion’s highly accurate sensitive data identification can determine what data needs to be deleted and where it lives, streamlining Tonic’s data de-identification efforts.
Data Loss Prevention/Cloud Access Security Brokers
Data Loss Prevention (DLP) and Cloud Access Security Brokers (CASB) solutions DLP technology can detect and monitor sensitive data and prevent it from leaking outside your enterprise, but a DLP system can’t be effective if you don’t know where your data is stored. You need to take inventory of both classified and unclassified data. Then list who has access to classified data.
While some DLP solutions may offer automated scanning and detection of sensitive data inside the corporate network, the discovery technologies are often rudimentary. High rates of false positives are common, resulting in wasted time chasing down non-issues and end-user frustration. Further, real-time analysis of sensitive data in motion is a drain on network productivity.
By starting with Spirion’s automated sensitive data discovery and classification, you can improve DLP performance and accuracy, as well as overall data security. Spirion discovers sensitive data across your data landscape and tags sensitive data using deep content inspection during off hours. Your DLP can then use these tags to determine if a file is sensitive without having to scan the entire file in real time, improving performance and accuracy.
Examples of Integrations
There are many DLP solutions available in the marketplace that can read Spirion’s persistent classification tags including:
McAfee supports data loss prevention with a suite of tools that find sensitive data, enforce policies, and scan networks and endpoints. The DLP suite helps ensure compliance and protect sensitive data wherever it lives. Spirion’s persistent classification can apply machine-readable metadata to files for McAfee to use, adding a layer of intelligence to the DLP decision-making process.
Symantec Endpoint Data Loss Prevention lets you identify sensitive information on endpoints in your organization and enables you to monitor and regulate the flow of that information as it moves off devices and is accessed by applications. Spirion’s persistent classification can apply machine-readable metadata to files for Symantec to use, adding a layer of intelligence to the DLP decision-making process.
Palo Alto Next Generation Firewall
Palo Alto Networks offers an enterprise cybersecurity platform which provides network security, cloud security, endpoint protection, and various cloud-delivered security services. Spirion creates persistent, machine-readable metadata that this product can track in its activity logs, providing context awareness and improving your analysis and reporting capabilities.
ITSM Ticketing and Workflow Management Systems
As organizations scale, they need a means of managing employee issues outside of emailing and calling IT departments with requests or approaching IT professionals to explain the issue in person. Ticketing software takes all service requests and converts them into a single point of contact.
IT service management (ITSM) is a framework that extends beyond ticketing, stressing continual improvement, with IT support delivered as a service. It describes the processes and tools IT teams use to manage all IT services, end to end.
While Spirion Playbooks can efficiently automate data protection, the solution is primarily used by SecOps and IT staff. For issues requiring IT support or additional collaboration across diverse stakeholders, Spirion offers the capability to govern sensitive issues from within their ServiceNow™.
Check out Spirion + ServiceNow ITSM
Integrate Spirion’s Sensitive Data Manager with ServiceNow ITSM to efficiently triage data and resolve sensitive data privacy and security incidents. Benefit from a collaborative but controlled workflow with input from IT and business stakeholders.