Page 143 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 143
As with CASB adoption, DLP and encryption technology deployment is on the rise, and increasingly,
these three data security types are becoming more integrated solutions.
Content Discovery
If you’ve successfully stopped shadow IT and ensured that users are only accessing and interacting with
files in a safe and secure manner, you’ve only won half the battle. Understanding the nature of content
and where sensitive data is stored, and then assessing how to monitor it as a file changes over time, are
critical next steps. This is where Artificial Intelligence (AI) and Machine Learning (ML) can make a
significant difference.
AI and ML based technologies provide advanced tactics necessary for identifying and securing data.
Applying appropriate classification and being dynamic enough to adapt protection and policies as files
move through their collaboration lifecycle—without compromising user productivity—is essential.
Protect Data from The Inside And Out
These are a handful of internal considerations to successful data security, which must co-exist within a
larger strategy that includes external tactics, such as perimeter defenses. Leveraging AI and ML powered
solutions allow IT to move beyond basic collaboration to embrace and gain the benefits of a truly secure
and intelligent workplace.
About the Author
Steve Marsh is the Vice President of Product at Nucleus Cyber and brings more than 20 years of product
experience to Nucleus Cyber from Microsoft, Metalogix, start-ups and academia. He drives product
management and product marketing to deliver first class customer experiences, strategic product
roadmaps and key go to market messaging. Steve holds a PhD in Microelectronics and Materials
Physics,and lives in the Pacific Northwest with his family.
Links
https://twitter.com/nucleuscyber?lang=en
https://www.linkedin.com/in/drstevemarsh
143