Getting in touch with information protection
In the following section, we will dive into advanced Access Control for information on protection solutions.
Overview and needs
There was an interesting presentation from Dan Plastina, a product manager at Microsoft, which asked a very important question: 'Why do you seek to protect information?' The following answers were given in an actual survey:
96% - Reduce leakage of data shared with others (B2B collaboration)
94% - Partitioning of sensitive data from unauthorized users
89% - Preventing malicious employees from leaking secrets
87% - Meeting compliance requirements
Exactly because of these needs, we need to think about an information protection strategy in our solution design in order to provide the following:
Persistent protection level independent from your storage solution
Permit all companies to authenticate and to enforce authorization policies
Provide tracking and compliance with powerful logging for reporting, including end user use/abuse tracking...