Data Loss Prevention (DLP)

An ongoing challenge in data security is managing the rights of those who get access to data and those who don’t. DLP provides a solution. Spirion provides the intelligence.

INTEGRATION BENEFITS

The core function of DLP technologies is preventing the loss of data. DLP solutions give organizations the ability to protect data while it’s on the move across the enterprise. But the function needs to be strengthened with data intelligence.

TECHNOLOGY SHORTCOMINGS

DLP solutions are only effective when they understand the type of data traversing the enterprise — including data stored in the network, clouds, and endpoints. Also, limitations in data discovery create a classic garbage-in-garbage-out scenario, which creates friction between data access and protection. This is increasingly difficult as data footprints rapidly expand..

HOW SPIRION BRIDGES THE GAPS

The depth of knowledge that Spirion brings to data discovery, classification, and protection changes the execution of DLP from garbage-in-garbage-out to quality-in-quality-out. This reduces the risk of losing data, while enabling organizations to effectively police data security and compliance. This fortifies your data security and compliance.

PRODUCTS

Information/Data Rights Management (IRM/DRM)

An ongoing challenge in data security is managing the rights of who gets access to which data. IRM and DRM provide solutions. Spirion provides the intelligence.

INTEGRATIONS BENEFITS

IRM and DRM enforce organizations’ data access rules regarding who has access to sensitive information, when and where. They also protect files and documents containing sensitive data, such as spreadsheets and presentations, from unauthorized access — including viewing, forwarding, editing, copying, printing, and deleting. But the function needs to be strengthened with data intelligence.

TECHNOLOGY SHORTCOMINGS

IRM and DRM deliver many advantages, but also some significant drawbacks — including the risk of over-provisioning data access rights, and putting data security and compliance at risk. Also, both applications can be highly complex and integrations can be challenging, which creates usability problems.

HOW SPIRION BRIDGES THE GAPS

Organizations can gain the maximum functionality from their IRM and DRM applications by integrating with Spirion. This ensures optimized policing of data, so that only authorized users gain access, while unauthorized access is restricted. This fortifies your organization’s data security and compliance.

PRODUCTS

Security Information Event Management

An ongoing challenge in data security is aggregating event data produced by security devices, network infrastructure, systems, and applications. SIEM provides a solution. Spirion provides the intelligence.

INTEGRATIONS BENEFITS

SIEM technologies collect security log events from numerous hosts within an enterprise and centrally store the relevant data. By bringing this log data together, SIEM products enable centralized analysis and reporting. But the function needs to be strengthened with data intelligence.

TECHNOLOGY SHORTCOMINGS

SIEM technologies deliver many advantages, but also a significant drawback — a general lack of context awareness that would allow organizations to understand how events are related to the data impacted during security incidents.

HOW SPIRION BRIDGES THE GAPS

Organizations can gain the maximum functionality from their SIEM applications by integrating with Spirion. It provides the critical data context awareness required to ensure optimal data analysis and reporting. This fortifies your organization’s data security and compliance.

PRODUCTS

De-Identification / Synthetic Data

Security and risk management leaders are now able to respond to requests for PII (Personal Identifying Information) data removal, while maintaining the business value of their data and adhering to regulatory compliance, (CCPA and GDPR) through the unique relationship between Spirion and Tonic.

INTEGRATIONS BENEFITS

Tonic provides a mathematically provable guarantee of privacy protection against a wide range of privacy attacks, including:

  • Differencing Attack: A differencing attack uses background knowledge about an individual person to learn sensitive information about that person by taking into account multiple statistics in which the target’s data was included.
  • Linkage Attacks:linkage attack attempts to re-identify individuals in an anonymized dataset by combining that data with another dataset.
  • Reconstruction Attacks:reconstruction attack is any method for partially reconstructing a private dataset from public aggregate information. Typically, the dataset contains sensitive information about individuals, whose privacy needs to be protected.

By utilizing Tonic as a test environment, you can safely test your production environment without compromising your own data. The data would simply be replaced with synthetic or de-identifying data for testing purposes.

HOW TONIC COMPLEMENTS SPIRION

Rather than deleting valuable data, Tonic complements Spirion by taking cured structured data sets from our Sensitive Data Manager (SDM) and replaces sensitive data with de-identifiable or synthetic data.

PRODUCTS

Rights Management

Microsoft’s complementary AIP/MIP solution provides data pattern searches for sensitive data.

Azure Information Protection (AIP) and Microsoft Information Protection (MIP) are Microsoft’s complementary security best practices products within the Microsoft suite of O365 products when purchased at an E3 level license or above.

Integration Benefits

AIP/MIP primarily scans, classifies and labels Microsoft data. This allows organizations to retain the business value of subject data while adhering to regulatory compliance. AIP is cloud-based and optimized for risk management, data loss prevention, and technology encryption. All Microsoft data is governed and protected in the Microsoft environment.

Technology Shortcomings

AIP conducts pattern searching on Microsoft assets and may generate a number of false positives.

How Spirion Bridges the Gap

Spirion’s Sensitive Data Manager (SDM), while complementing AIP/MIP, provides a complete solution to not just Discovering and Classifying sensitive data but giving businesses the Understanding of where it resides and Control over it, ultimately enabling compliance with any number of data privacy regulations inside and outside of Microsoft products.

AIP is cloud-based and optimized for risk management, data loss prevention, and technology encryption. All Microsoft data is governed and protected in the Microsoft environment. AIP re-classifies and reports on updated files containing sensitive data, automatically performing bulk re-labelling when a policy is changed. A confidential watermark can be added to appropriately label documents.
AIP/MIP primarily scans, classifies and labels only Microsoft data. This allows organizations to retain the business value of subject data while adhering to regulatory compliance.

PRODUCTS