SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Data Protection Services
Information Risk Advisory Services
Business Challenges & Key Questions
Business Challenges
1.
2.
3.
4.
5.
6.
Proliferation of privacy and data protection laws
Defining the scope for data protection
Visibility into data flow throughout and beyond the organization
Selecting the right data protection solutions
Integrating solutions with other technologies and existing infrastructure
Optimizing solutions for real world accuracy
Key Questions?
1.
2.
3.
4.
5.
6.
Data Classification?
DLP/ERM/DAM?
Business alignment of policies?
Inter-operability with enterprise & business apps?
Incident and consequence management?
Support for country specific regulations?
Lifecycle approach to critical information protection
Our Solution
Data protection lifecycle service addressing business concerns from strategizing to identifying data flow and optimizing technology solutions
Our six phase approach helps our customers to:
• Establish data protection organization, implement governance
framework, develop data protection strategy & implementation
roadmap.
• Identify high level data leakage risk vectors and high risk processes
within the organization.
• Identify sensitive data flow across entities, business processes and
exchange with external parties. Conduct data element analysis.
• Evaluate appropriate data protection solutions, select and develop an
integrated architecture design for implementation.
• Implement identified solutions, configure data protection policies and
create custom rules.
• Optimize solution operations for real world accuracy (e.g. reducing
incident volume and false positives) and perform sustenance activities.
Data Protection Services
Information Risk Advisory Services
Our Value Enablers (Tools & Processes)
Lifecycle approach to critical information protection
Health Check Tool
Data Classification
Repository
Moderators
Timer Awards
Document
Classification Tool
Aujas Value Proposition & Thought Leadership:
• Health check tool allows organizations to get a high-level view of their data protection program
• Data Classification Repository allows the business community to directly identify business sensitive data
and keep the library updated.
• Gamification allows us to collect the critical data within 8-10 business processes that can cause
significant impact within a matter of hours
• Our data classification tool enforces the user to classify MS office files before they are saved. The
classification is entered into the meta data so that the DLP/ERM tools can ‘see’ it.
BINGO
Template
NG
E
Template
Gamification
Template
CH
AL
LE
Template
Template
Biz. teams
Template
Biz. teams
Aujas Experience
DP solution architecture for stock exchange
Developed technical requirements and use cases for DLP, IRM and DAM product evaluation.
Created a roadmap for mass classification, DLP rollout, and access control management.
Provided DLP, IRM and DAM technology implementation assistance comprising of
architecture definition, rule base creation, creation of custom patterns and integrating it
with AD, Proxy, email, DB, SIEM etc.
Data flow analysis and IRM setup for financial client
Conducted data flow analysis to identify the sensitive data and its path within the
processes, across departments and with third parties. Identified sensitive documents for
fingerprinting and classified for IRM with appropriate distribution rights. Sustenance
phase for data protection included incident management, rule base audit and fine tuning,
managing change in DLP and IRM policies
DLP optimization for a large telecom company
The client already had implemented a leading DLP solution. But lack of a strong incident
management process hampered the effectiveness of the project. Aujas implemented a well-
defined incident management process that helped the client to detect, analyze, escalate and
close incidents to ensure deterrence and compliance. Aujas was able to show substantial
reduction in incidents.
.
Data flow analysis and DLP IM for a banking client
Aujas performed data flow assessment, designed the DLP rules, implemented and tested them
for accuracy. Aujas also developed the governance and incident management (IM) process for
consistency that helped the client to detect, analyze, escalate and close incidents to ensure
deterrence and compliance.

Más contenido relacionado

La actualidad más candente

Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC NextLabs, Inc.
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security NextLabs, Inc.
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightSymantec
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...NextLabs, Inc.
 
Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkKannan Subbiah
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseNextLabs, Inc.
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsCillian Kieran
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix LLC
 
The Merger is Happening, Now What Do We Do?
The Merger is Happening, Now What Do We Do?The Merger is Happening, Now What Do We Do?
The Merger is Happening, Now What Do We Do?DATUM LLC
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
 
5 Level of MDM Maturity
5 Level of MDM Maturity5 Level of MDM Maturity
5 Level of MDM MaturityPanaEk Warawit
 
Michael Josephs
Michael JosephsMichael Josephs
Michael JosephsdaveGBE
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutionsxband
 
How to Evaluate a Managed Services Firm
How to Evaluate a Managed Services FirmHow to Evaluate a Managed Services Firm
How to Evaluate a Managed Services Firmoneneckitservices
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfAlan McSweeney
 

La actualidad más candente (19)

Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC Requirements for Implementing Data-Centric ABAC
Requirements for Implementing Data-Centric ABAC
 
Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security Addressing Gaps in Your Cyber Security
Addressing Gaps in Your Cyber Security
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
 
Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance Framework
 
Data-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended EnterpriseData-Centric Security for the Extended Enterprise
Data-Centric Security for the Extended Enterprise
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data TeamsEthyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
Ethyca CodeDriven - Data Privacy Compliance for Engineers & Data Teams
 
Opteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdfOpteamix_whitepaper_Data Masking Strategy.pdf
Opteamix_whitepaper_Data Masking Strategy.pdf
 
The Merger is Happening, Now What Do We Do?
The Merger is Happening, Now What Do We Do?The Merger is Happening, Now What Do We Do?
The Merger is Happening, Now What Do We Do?
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 
5 Level of MDM Maturity
5 Level of MDM Maturity5 Level of MDM Maturity
5 Level of MDM Maturity
 
Omzig
OmzigOmzig
Omzig
 
Michael Josephs
Michael JosephsMichael Josephs
Michael Josephs
 
Are you ready for the transformation
Are you ready for the transformationAre you ready for the transformation
Are you ready for the transformation
 
Assessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security SolutionsAssessing the Business Value of SDN Datacenter Security Solutions
Assessing the Business Value of SDN Datacenter Security Solutions
 
How to Evaluate a Managed Services Firm
How to Evaluate a Managed Services FirmHow to Evaluate a Managed Services Firm
How to Evaluate a Managed Services Firm
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data Management
 
IT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdfIT Architecture’s Role In Solving Technical Debt.pdf
IT Architecture’s Role In Solving Technical Debt.pdf
 

Destacado

Full lifecycle services for next generation initiatives
Full lifecycle services for next generation initiativesFull lifecycle services for next generation initiatives
Full lifecycle services for next generation initiativesTeleste Corporation
 
C* Summit 2013: Stepping Through the Lifecycle of a Service Offering with Cas...
C* Summit 2013: Stepping Through the Lifecycle of a Service Offering with Cas...C* Summit 2013: Stepping Through the Lifecycle of a Service Offering with Cas...
C* Summit 2013: Stepping Through the Lifecycle of a Service Offering with Cas...DataStax Academy
 
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014Meng Choon Tan
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecyclesagaroceanic11
 
UX Australia - voice of customer in the product lifecycle
UX Australia - voice of customer in the product lifecycleUX Australia - voice of customer in the product lifecycle
UX Australia - voice of customer in the product lifecycledarthbunny
 
Lifecycle of a Service Project: An Interactive Experience
Lifecycle of a Service Project: An Interactive ExperienceLifecycle of a Service Project: An Interactive Experience
Lifecycle of a Service Project: An Interactive ExperienceRotary International
 
Dataflow Analysis
Dataflow AnalysisDataflow Analysis
Dataflow AnalysisMiller Lee
 
Service Contracts Lifecycle Management
Service Contracts Lifecycle ManagementService Contracts Lifecycle Management
Service Contracts Lifecycle ManagementMohan Dutt
 
Lifecycle of a Service Project (Part 5): Evaluation and Promotion
Lifecycle of a Service Project (Part 5): Evaluation and PromotionLifecycle of a Service Project (Part 5): Evaluation and Promotion
Lifecycle of a Service Project (Part 5): Evaluation and PromotionRotary International
 
What Every Project Manager Should Know About Itil
What Every Project Manager Should Know About ItilWhat Every Project Manager Should Know About Itil
What Every Project Manager Should Know About ItilDaniel Cayouette
 
Service Product Profit Model - FULL
Service  Product  Profit  Model - FULLService  Product  Profit  Model - FULL
Service Product Profit Model - FULLWalter Adamson
 
New Ways to Service Lifecycle Management
New Ways to Service Lifecycle ManagementNew Ways to Service Lifecycle Management
New Ways to Service Lifecycle ManagementCapgemini
 
Using Business Architecture to enable customer experience and digital strategy
Using Business Architecture to enable customer experience and digital strategyUsing Business Architecture to enable customer experience and digital strategy
Using Business Architecture to enable customer experience and digital strategyCraig Martin
 
19 Signs of a Disengaged Employee
19 Signs of a Disengaged Employee19 Signs of a Disengaged Employee
19 Signs of a Disengaged EmployeeAchievers
 
Best Presentation About Infosys
Best Presentation About InfosysBest Presentation About Infosys
Best Presentation About InfosysDurgadatta Dash
 
Query Processing and Optimisation - Lecture 10 - Introduction to Databases (1...
Query Processing and Optimisation - Lecture 10 - Introduction to Databases (1...Query Processing and Optimisation - Lecture 10 - Introduction to Databases (1...
Query Processing and Optimisation - Lecture 10 - Introduction to Databases (1...Beat Signer
 
Hadoop Overview & Architecture
Hadoop Overview & Architecture  Hadoop Overview & Architecture
Hadoop Overview & Architecture EMC
 

Destacado (18)

Full lifecycle services for next generation initiatives
Full lifecycle services for next generation initiativesFull lifecycle services for next generation initiatives
Full lifecycle services for next generation initiatives
 
C* Summit 2013: Stepping Through the Lifecycle of a Service Offering with Cas...
C* Summit 2013: Stepping Through the Lifecycle of a Service Offering with Cas...C* Summit 2013: Stepping Through the Lifecycle of a Service Offering with Cas...
C* Summit 2013: Stepping Through the Lifecycle of a Service Offering with Cas...
 
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014
Announcing DA.PO Augury Customer Experience Lifecycle Services - feb 2014
 
2 the service lifecycle
2 the service lifecycle2 the service lifecycle
2 the service lifecycle
 
UX Australia - voice of customer in the product lifecycle
UX Australia - voice of customer in the product lifecycleUX Australia - voice of customer in the product lifecycle
UX Australia - voice of customer in the product lifecycle
 
Lifecycle of a Service Project: An Interactive Experience
Lifecycle of a Service Project: An Interactive ExperienceLifecycle of a Service Project: An Interactive Experience
Lifecycle of a Service Project: An Interactive Experience
 
Dataflow Analysis
Dataflow AnalysisDataflow Analysis
Dataflow Analysis
 
Service lifecycle placemat v3
Service lifecycle placemat v3Service lifecycle placemat v3
Service lifecycle placemat v3
 
Service Contracts Lifecycle Management
Service Contracts Lifecycle ManagementService Contracts Lifecycle Management
Service Contracts Lifecycle Management
 
Lifecycle of a Service Project (Part 5): Evaluation and Promotion
Lifecycle of a Service Project (Part 5): Evaluation and PromotionLifecycle of a Service Project (Part 5): Evaluation and Promotion
Lifecycle of a Service Project (Part 5): Evaluation and Promotion
 
What Every Project Manager Should Know About Itil
What Every Project Manager Should Know About ItilWhat Every Project Manager Should Know About Itil
What Every Project Manager Should Know About Itil
 
Service Product Profit Model - FULL
Service  Product  Profit  Model - FULLService  Product  Profit  Model - FULL
Service Product Profit Model - FULL
 
New Ways to Service Lifecycle Management
New Ways to Service Lifecycle ManagementNew Ways to Service Lifecycle Management
New Ways to Service Lifecycle Management
 
Using Business Architecture to enable customer experience and digital strategy
Using Business Architecture to enable customer experience and digital strategyUsing Business Architecture to enable customer experience and digital strategy
Using Business Architecture to enable customer experience and digital strategy
 
19 Signs of a Disengaged Employee
19 Signs of a Disengaged Employee19 Signs of a Disengaged Employee
19 Signs of a Disengaged Employee
 
Best Presentation About Infosys
Best Presentation About InfosysBest Presentation About Infosys
Best Presentation About Infosys
 
Query Processing and Optimisation - Lecture 10 - Introduction to Databases (1...
Query Processing and Optimisation - Lecture 10 - Introduction to Databases (1...Query Processing and Optimisation - Lecture 10 - Introduction to Databases (1...
Query Processing and Optimisation - Lecture 10 - Introduction to Databases (1...
 
Hadoop Overview & Architecture
Hadoop Overview & Architecture  Hadoop Overview & Architecture
Hadoop Overview & Architecture
 

Similar a Data protection services lifecycle approach to critical information protection

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityPriyanka Aash
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM ChecklistEstuate, Inc.
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data GovernanceBhavendra Chavan
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsDrew Madelung
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDrew Madelung
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftAppsian
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Priyanka Aash
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareKonverge Technologies Pvt. Ltd.
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overviewjayallen77
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Vishal Bamba
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
Make Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINERMake Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINERLeonardo Couto
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerCapgemini
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfData Science Council of America
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfData Science Council of America
 

Similar a Data protection services lifecycle approach to critical information protection (20)

Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Estuate EDM Checklist
Estuate EDM ChecklistEstuate EDM Checklist
Estuate EDM Checklist
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data Governance
 
Breakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview SolutionsBreakdown of Microsoft Purview Solutions
Breakdown of Microsoft Purview Solutions
 
Deep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss PreventionDeep dive into Microsoft Purview Data Loss Prevention
Deep dive into Microsoft Purview Data Loss Prevention
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Enterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoftEnterprise GRC for PEoplesoft
Enterprise GRC for PEoplesoft
 
Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution Top learnings from evaluating and implementing a DLP Solution
Top learnings from evaluating and implementing a DLP Solution
 
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP SoftwareExplore Top Data Loss Prevention Tools | Fortify with DLP Software
Explore Top Data Loss Prevention Tools | Fortify with DLP Software
 
PCSG Corporate Overview
PCSG Corporate OverviewPCSG Corporate Overview
PCSG Corporate Overview
 
Big Data Readiness Assessment
Big Data Readiness AssessmentBig Data Readiness Assessment
Big Data Readiness Assessment
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
295256_Security_Problem_Whitepaper.Web
295256_Security_Problem_Whitepaper.Web295256_Security_Problem_Whitepaper.Web
295256_Security_Problem_Whitepaper.Web
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Make Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINERMake Smarter Decisions with WISEMINER
Make Smarter Decisions with WISEMINER
 
Data- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offerData- and database security & GDPR: end-to-end offer
Data- and database security & GDPR: end-to-end offer
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
 

Data protection services lifecycle approach to critical information protection

  • 1. Data Protection Services Information Risk Advisory Services Business Challenges & Key Questions Business Challenges 1. 2. 3. 4. 5. 6. Proliferation of privacy and data protection laws Defining the scope for data protection Visibility into data flow throughout and beyond the organization Selecting the right data protection solutions Integrating solutions with other technologies and existing infrastructure Optimizing solutions for real world accuracy Key Questions? 1. 2. 3. 4. 5. 6. Data Classification? DLP/ERM/DAM? Business alignment of policies? Inter-operability with enterprise & business apps? Incident and consequence management? Support for country specific regulations? Lifecycle approach to critical information protection Our Solution Data protection lifecycle service addressing business concerns from strategizing to identifying data flow and optimizing technology solutions Our six phase approach helps our customers to: • Establish data protection organization, implement governance framework, develop data protection strategy & implementation roadmap. • Identify high level data leakage risk vectors and high risk processes within the organization. • Identify sensitive data flow across entities, business processes and exchange with external parties. Conduct data element analysis. • Evaluate appropriate data protection solutions, select and develop an integrated architecture design for implementation. • Implement identified solutions, configure data protection policies and create custom rules. • Optimize solution operations for real world accuracy (e.g. reducing incident volume and false positives) and perform sustenance activities.
  • 2. Data Protection Services Information Risk Advisory Services Our Value Enablers (Tools & Processes) Lifecycle approach to critical information protection Health Check Tool Data Classification Repository Moderators Timer Awards Document Classification Tool Aujas Value Proposition & Thought Leadership: • Health check tool allows organizations to get a high-level view of their data protection program • Data Classification Repository allows the business community to directly identify business sensitive data and keep the library updated. • Gamification allows us to collect the critical data within 8-10 business processes that can cause significant impact within a matter of hours • Our data classification tool enforces the user to classify MS office files before they are saved. The classification is entered into the meta data so that the DLP/ERM tools can ‘see’ it. BINGO Template NG E Template Gamification Template CH AL LE Template Template Biz. teams Template Biz. teams Aujas Experience DP solution architecture for stock exchange Developed technical requirements and use cases for DLP, IRM and DAM product evaluation. Created a roadmap for mass classification, DLP rollout, and access control management. Provided DLP, IRM and DAM technology implementation assistance comprising of architecture definition, rule base creation, creation of custom patterns and integrating it with AD, Proxy, email, DB, SIEM etc. Data flow analysis and IRM setup for financial client Conducted data flow analysis to identify the sensitive data and its path within the processes, across departments and with third parties. Identified sensitive documents for fingerprinting and classified for IRM with appropriate distribution rights. Sustenance phase for data protection included incident management, rule base audit and fine tuning, managing change in DLP and IRM policies DLP optimization for a large telecom company The client already had implemented a leading DLP solution. But lack of a strong incident management process hampered the effectiveness of the project. Aujas implemented a well- defined incident management process that helped the client to detect, analyze, escalate and close incidents to ensure deterrence and compliance. Aujas was able to show substantial reduction in incidents. . Data flow analysis and DLP IM for a banking client Aujas performed data flow assessment, designed the DLP rules, implemented and tested them for accuracy. Aujas also developed the governance and incident management (IM) process for consistency that helped the client to detect, analyze, escalate and close incidents to ensure deterrence and compliance.