to help enterprise security across Europe
The resource centre for busy senior executives seeking the latest insights into IT Compliance & Privacy issues for major organizations
 
sarbaines oxley ofcom communications regulator
Latest Resources      data protection register
compliance resources privacy resource center

Breaking Global News
Global Compliance and Privacy News
- Breaking News, updated every 30 minutes
•   Compliance, Privacy and Security
•  Money Laundering
•  Phishing
•  Regulatory Issues
•  SOX, Basel 2, MiFID


You Tell Us:
S
S
L

T
E
C
H
N
O
L
O
G
Y
We use SSL Technology for web data entry points:

Always
Sometimes
Never
What is SSL?

News
Are Smartphones Endangering Security? - Wick Hill
Dealing with Internet Security Threats - Ian Kilpatrick
How the New EU Rules on Data Export Affect Companies in and Outside the EU - Thomas Helbing
Farmers' Data Leak Highlights Old Technology Use - Wick Hill
Saving Money with SFTP - Wick Hill
UK Information Commissioner targets firm selling vetting data - Eversheds e80
12 Key Steps to Internet Security - Wick Hill
Telephone Monitoring Legality in the UK - Dechert
Firewall or UTM - Wick Hill
UK Information Commissioner demands mobile device encryption - Eversheds e80
Data loss - liability, reputation and mitigation of risk - Eversheds e80
Phorm, Webwise and OIX - BCS Security Forum
The challenges of PCI DSS compliance - Thales, Russell Fewing
"Quality" Data Vendor Spams us! Editor astounded!
National Gateway Security Survey 2008 - Wick Hill
Unified Threat Management - Watchguard Technologies

news archives
:
0 | 1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 | 11 |
12 | 13
[What is this?]

Industry Blogs
Tim Berners Lee's Blog
Tim Callan's SSL Blog
Davis Wright Tremaine's Privacy & Security Law Blog
Emergent Chaos Blog
Michael Farnum's Blog
Phillip Hallam-Baker's Blog - The dotFuture Manifesto: Internet Crime, Web Services, Philosophy
Stuart King's Security and Risk Management Blog
David Lacey's IT Security Blog
Metasploit Official Blog
Jeff Pettorino's Security Convergence Blog
Jeff Richards's Demand Insights Blog
David Rowe's Risk ManagementBlog
Bruce Schneier's Security Blog
Larry Seltzer's Security Weblog
Mike Spinney's Private Communications Blog
Richard Steinnon's Threat Chaos Blog
The TechWeb Blog
Tim Trent's Marketing by Permission Blog
Rebecca Wong 's DP Thinker Blog

Newsletters
23 February Newsletter
Newsletter Archives are located in "News"

Industry Update
Internet Security Intelligence Briefing - November 2005
Find out the latest trends in e-commerce, web usage & the latest threats from adware/Spyware

Reports
Phorm, Webwise and OIX
- BCS Security Forum

'The Any Era has Arrived, and Everyione has Noticed' - Stratton Sclavos - VeriSign
Identity Security - Time to Share
Malicious code threats - iDefense
Public Alerts - updated as they happen from Stopbadware.org
Public Alerts - updated as they happen from Websense
Public Advisories - updated as they happen, from iDefense
Phoraging - Privacy invasion through the Semantic web: a special report by Mike Davies of VeriSign

Legislation
Privacy Laws & Business International E-news, Issue 57
Privacy Laws & Business UNited Kingdom E-news, Issue 60

Security Reviews
February 2007 - VeriSign Security Review
The security review archive is here

Case Studies
Finance Industry
Case Study Example

A case study on a Finance industry company.

White Papers
VeriSign® Intelligent Infrastructure for the 21st Century
VeriSign® Intelligent Infrastructure for Security
VeriSign® Intelligent Infrastructure: An Overview
Identity Protection Fraud Detection Service - description of the service
Life of a Threat - Video on Threat Management Lifecycle
Optimizing Enterprise Information Security Compliance - Dealing with all the audits
For a full list of all whitepapers, visit our Whitepaper library

Legal Notices
Privacy Policy
Terms of use

basel 2 sarbanes oxley
    legislation
data controller notification binding corporate rules BCR data transfer third countries third part data transfer basel 2 regualtor regulation regulate FSA banking network security RSA encryptin algorithm Bits sacked bank staff
Blogs compliance Reports compliancy Legislation Data Protection Case Studies data privacy White Papers data protection act News information commissioner Events security standards Links information security iDefense
Retail Solutions

Tablus Brings Next Generation Content Discovery to Large Enterprises

compliance and privacy

Current News Updates

Tablus Brings Next Generation Content Discovery to Large Enterprises

Tablus Inc., a leading provider of comprehensive content loss prevention solutions, today (24 April 2007) announced the availability of the next generation of content discovery for large enterprises. The company's release of Content Sentinel 3 represents a revolutionary approach and the industry's most viable solution for discovering sensitive content residing on corporate networks and work stations. The solution is a vital component for the IT security architecture of today's large enterprises - many of which have tens of thousands of servers and computers containing petabytes of digital content. To truly protect customer data, corporate assets and brand equity, organizations need to first locate their sensitive content across these large repositories.

"In today's content driven business environment, where information grows by the day, companies are increasingly at risk for the loss or misuse of sensitive or confidential content," said Brian Burke, research manager of security products at industry analyst firm IDC. "Whether intentional or accidental, the data breaches gripping newspaper headlines are primarily driven by an enterprise's inability to locate, and consequently protect, sensitive information. Content discovery, or the ability for organizations to locate sensitive, at-risk content, is vital."

According to a 2007 research study sponsored by EMC Corp. titled "The Expanding Digital Universe," IDC estimates that the world generated 161 billion gigabytes of digital information in 2006, a volume of content that poses new challenges for corporate governance and compliance as well as overall corporate reputation. Organizations that do not effectively incorporate content discovery into their overall IT security architectures run the risk of non-compliance with strict state and federal policies around the protection of Personally Identifiable Information (PII) and data governed by the Payment Card Industry (PCI) Standard. More dangerous than facing the fines associated with a breach of these regulations, however, is the negative impact that the loss or theft of sensitive content has on brand, shareholder value and customer loyalty.

Protection of brand and corporate assets starts with the discovery of sensitive content. Many large corporations are becoming aware that the first essential step in protecting confidential information is to accurately locate it. As a result, Content Sentinel is being deployed as a key element in the overall security postures of organizations including Microsoft, Domino's Pizza and Columbia River Bank.

According to Scott Hamilton, systems administrator at Columbia River Bank, "We have all witnessed the negative impact a data breach has on the brand equity of major corporations. At Columbia River Bank, we prefer to get ahead of the problem by accurately identifying where our sensitive information resides so that we can best protect it. With the Tablus solution we have gained a better understanding of the location of sensitive information, and are able to measure and enforce policies on the protection of that content to better protect against its proliferation."

Without Content Sentinel 3, comprehensive content discovery requires the arduous process of pulling data to a central location for analysis, placing a heavy burden on network resources, adding lengthy scan times and potentially introducing security holes. Content Sentinel is the only solution with patent-pending ZettaScan Architecture(TM) that brings the software to the data rather than bringing the data to the software. As a result, it is the only viable way for large organizations to scan thousands of computers simultaneously, virtually eliminating network impact, and cutting scan time from months to hours while delivering the highest levels of precision, all right out of the box.

Other features of Content Sentinel 3 include:

  • Enterprise Management and Operations: A hierarchical deployment approach where a central Enterprise Coordinator manages policies, scan groups and results from distributed Site Coordinators. This makes the technology suited to provide enterprise-scale content discovery across multiple locations and remote offices.
  • Grid-Based Scanning: A breakthrough in content discovery, grid-based scanning is the fastest and most scalable way to analyze content in a massive data repository. With grid scanning, the analysis of large data repositories are automatically load balanced across multiple, designated machines for fast, parallel analysis of content. This guarantees unmatched performance and scalability in the largest corporate networks.
  • Agent-Based Scanning: Temporary or permanent scan agents provide constant protection by continuously scanning computers, while analyzing the content in place. In today's mobile world, agents are the only way to ensure that scans continue even when the computer is disconnected from the network. By doing the analysis in place, without having to move the content, impact to the network is virtually eliminated. Leaving the content in place also ensures that content is never transmitted without being encrypted. Results are uploaded to the site coordinator once the computer reconnects to the corporate network.
  • Incremental Scanning: A patent-pending incremental scanning approach processes only new, modified, renamed or moved files and folders on previously scanned content - typically just one percent changes on a daily basis--making frequent scans feasible in a minimal amount of time.
  • Unparalleled Accuracy: At the heart of Content Sentinel is an advanced Content Analysis Engine that can accurately identify and locate sensitive content with greater than 99 percent precision rates. Only Tablus utilizes C3 Precision Technology(TM) which includes sophisticated detection techniques and analysis algorithms, powerful multi-level content analysis and content detection built right into the product to produce the most accurate content identification rates in the industry.

"The exponential growth of digital content within large enterprises makes content discovery vital to securing today's businesses," said Anne Bonaparte, president and CEO of Tablus. "Content Sentinel 3 is designed to scale to meet the needs of the largest organizations - companies characterized by tens of thousands of servers, workstations and remote employees. It is imperative that these enterprises focus on the location of their sensitive information in order to truly secure it. Without content discovery, they are missing a primary step required in the protection of customers, brand and corporate assets."

 


This site is independent of all its sources
The contents of the site are sourced from across the industry. All copyrights are acknowledged.