dlp-data-access-governance-en.pdf - DATA SHEET Symantec DLP Data Access Governance Comprehensive data security and governance for file systems and

dlp-data-access-governance-en.pdf - DATA SHEET Symantec DLP...

This preview shows page 1 - 2 out of 3 pages.

DATA SHEET Symantec DLP Data Access Governance Comprehensive data security and governance for file systems and SharePoint Introduction The majority of enterprise data exists as unstructured files stored in common content repositories such as network file shares on server and NAS infrastructure as well as Microsoft SharePoint. Gartner estimates there will be an 800% growth in the amount of data by 2021, with 80% of it being in the form of unstructured data. As a result, organizations are losing more and more visibility into this data every day and are struggling to control it, leaving it vulnerable to negligent employees and malicious attackers. Protecting unstructured data against loss and theft is a critical strategy to your data security program. Solution Symantec Data Loss Prevention (DLP) Data Access Governance addresses the unstructured data problem by delivering actionable intelligence into data ownership, usage and access for unstructured data. For file shares and SharePoint sites, Symantec DLP Data Access Governance provides powerful reporting, analytics, and visualization capabilities that shine a light on the data by giving organizations visibility into where their sensitive data resides, who owns and accesses it, as well as how it is being used. Data Access Governance is part of the comprehensive Symantec DLP for Storage solution, which includes DLP Network Discover and DLP Network Protect to allow you to discover and protect confidential data across virtually any storage system. Data discovery Identify sensitive data across file systems and data repositories with unmatched content detection capabilities that minimize false positives. Seamless integration of Data Access Governance and Data Loss Prevention for Storage. Data activity monitoring Monitor activity across Windows file servers, NAS devices, and SharePoint so you know what data users are accessing and what they’re doing with it. Identify probable owners so only the right people are put in charge of important data access decisions. Key Use Cases Find and fix sensitive files access. Data Access Governance integrates with Network Discover to find sensitive files stored on your network, identify data owners, and automatically restrict access or engage data owners in the data cleanup process.
Image of page 1

Subscribe to view the full document.

Image of page 2
  • Summer '19
  • none

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask You can ask ( soon) You can ask (will expire )
Answers in as fast as 15 minutes