In both instances, nine hundred and ninety-nine times out of a thousand, the answer aligns with what you expected. Unfortunately, data leakage statistics are based on those instances when bad behaviour is actually detected. Nobody really knows what your cat does.
At e-Safe Systems, a member of the Goal Group, they have a data leakage statistic that is based on threat detections by the eSafe software, a system that operates and reports in near-real-time.
It’s not pretty.
Globally, across the detection statistics we’ve gathered (with the clients active participation!), e-Safe Compliance software detects data leakage at the following rate…
One instance of data leakage, for every hundred employees…every month!
But what if they could do better? A great deal better?
What if the responsible Primes could also reassure themselves around confidentiality, integrity and availability (CIA) of their data, with high degrees of confidence? Imagine the difference in data security if a Prime could:
- Ensure correct data classification was applied and preserved on all data
- Ensure all iterations of that data were classified in the same manner
- Ensure that all data remained encrypted, in motion, at rest, and in use
- Ensure that data was only available to authorised users
- Monitor data security in near-real-time
- Maintain a catalogue of information assets
- Revoke access to data assets
The reality is that Primes can do all of these things inside their own networks. Now imagine doing all this outside the Prime network…down through the supply-chain!
To data assets anywhere on earth, from anywhere on earth!
That reality is powered by e-Safe Compliance
e-Safe Compliance identifies and secures sensitive data using a simple 4 step approach:
This unique challenge of controlling sensitive data outside of one’s organisation and across multiple organisations makes selecting an appropriate security solution a difficult job.
e-Safe Compliance SOLVES THIS PROBLEM USING CUSTODIAL INFORMATION SECURITY (cis)
e-Safe Compliance solves this problem using custodial information security. Primes can add suppliers as trusted organisation to receive sensitive information and have visibility and control over their information even when it is in supplier’s network. e-Safe Compliance achieves this through the following steps:
Gartner views e-Safe Compliance in the same light. Following are comments about e-Safe by Gartner’s head of their Data Leak Prevention research division.
“E-Safe’s approach seems to provide a simplified approach to identifying sensitive data, creating DLP policies and providing controls to ensure data is protected in accordance with policies. The integration of encryption and digital rights management solutions as part of the remediation framework simplifies deployments and offers medium and small organizations a means of deploying advanced security and protection features without the complexity of manually integrating complex solutions.”