The new paradigm of Data Protection
With the new situation of hybrid working (remote and face-to-face work in coexistence), it is necessary to ensure that people can continue to access cloud tools and that they, as well as the sensitive or regulation-controlled data, are protected. To this end, Forcepoint has data protection solutions which analyze the daily behavior of the user through the tools they use and how they use them. Each user is given a risk score from which decisions can be made by security teams, either applying data protection policies automatically, adapting those security policies from static to dynamic based on the user and the criticality of the data, or intervening where required.
On Wednesday April 21, Telefónica and Forcepoint teamed up to propose Forcepoint DLP together with Telefónica's management services. The goal of the event was to show how to unify security management, reduce costs and maintain business continuity in our new hybrid workplaces. Wherever the data resides, (cloud, end-device, network) it must remain secure and available, wherever the user is located.
Revolutionizing cybersecurity
Every day more and more private companies and (to a lesser extent) public organizations adopt public cloud services in SaaS, PaaS or IaaS setups. Due to the increase in remote working, new services in mobility, from unmanaged and personal devices, modern cybersecurity solutions must be flexible and adaptable enough to not only integrate with existing systems but also provide market-leading protection AND increase visibility and allow reduce security administrative costs by automating processes and convergence of solutions. And of course, do all of this in the cloud and in service mode (“as a service”)! It’s a tall order!
When it comes to critical data protection, DLP technology must have advanced information identification techniques. Without them, the solution will not be able to identify sensitive data and will result in countless false positives. Techniques such as word search or preconfigured patterns can be used as a test, but are not real solutions. Advanced techniques such as the use of patterns with algorithms and context analysis, fingerprinting techniques or information fingerprints that allow the detection of structured and unstructured information and its parts, techniques for identifying characters in images ... these are techniques for identifying sensitive information that make DLP technology add great value to the SASE solution.
To hear more about the discussions held between Telefónica Tech and Forcepoint, watch the video recording of the webinar "Evolving data security" in the video below.
The participants of the webinar were: