In Partnership With:

 
 
Menu

Case Study

What is Data-Centric Security?

Participating Company:

Watchful Software



Breach prevention has been all about ‘reinforcing the perimeter’ to protect what lies within. While this remains good and necessary IT practise, it takes no account of two very important and inescapable truths: 1) users are always inside the perimeter, and 2) even those authorised users can cause significant damage.Breach prevention has been all about ‘reinforcing the perimeter’ to protect what lies within. Whilst this remains a good and necessary IT practise, it takes no account of two very important and inescapable truths:

1) users are always inside the perimeter
2) even those authorised users can cause significant damage.

By ignoring these truths, CIOs fail to address possibly the most fundamental persistent threat, the one of a breach orchestrated by one or more of their organisation’s own users. The antidote to this insider threat is to arrange persistent protection and control over information at all times.

RightsWATCH is a state-of-the-art data-centric information security, ensuring that even if sensitive data is released, it is rendered meaningless to whoever may acquire it. RightsWATCH enforces multi-level security and mandatory access control, providing access to data based on its classification, on a “need to know” basis, in order to protect data privacy and achieve regulatory compliance

Publications from Watchful Software

Sign up to receive the Enterprise Management 360˚ ‘Weekly Digest’ direct to your inbox every Thursday. This contains news on the latest industry trends, interviews with key thinkers, white papers and videos. Unsubscribe at any time

Email address