K logix Project Advisory Service will Bring Clarity to Data Protection Programs

VIEW THE ARTICLE HERE

VIEW FEATS OF STRENGTH MAGAZINE HERE

REPLICATING OUR ENDPOINT PROJECT ADVISORY SERVICE FOR DATA PROTECTION

K LOGIX PROJECT ADVISORY SERVICE GUIDES INFORMED DECISIONS
Just like K logix did with our Endpoint Security Project Advisory Service, we will bring clarity to the frustrating and cumbersome Data Protection market in the Spring of 2016. Within our methodical, scientific process we will identify the real data protection issues our clients need to solve and help them build a practical data protection framework. We will help clients cut through the clutter of data protection solutions to make informed decisions that make sense for their specific business.

In the decade since the technology was first introduced few Data Protection implementations have been successful. In fact, many in the industry refer to Data Loss Prevention (the pre-cursor to Data Protection) as the most expensive shelfware in the security industry’s history. The space was still emerging, the technology was positioned inaccurately, and sold to organizations unequipped to effectively support it. Roll-outs failed for a few reasons, namely:

• Security organizations were not prepared or staffed to support a time-intensive solution.
• Most organizations had yet to establish an effective Data Ownership program.
• There was limited understanding of data discovery and classification in the industry, and no holistic data protection strategy.
• The market viewed data protection as a technical challenge instead of a business risk.
• The “prevention” aspects of the solutions were primitive, so instead DLP was a futile exercise in detection.

In April of 2007 all six companies in the Leaders Quadrant of the Gartner Magic Quadrant for DLP were privately-held start-up security companies. Today the Leaders Quadrant consists of mature, publicly held security companies who bought and integrated those 2007 technologies into their eco-system. As we study data protection in 2016 we have important questions to answer. Have the original technologies matured within these large, and well-funded companies? How do we account for current considerations like cloud security, permissions management and unstructured data? How do these new solutions fit into an overall data protection strategy?

For more information about our upcoming Data Protection Project Advisory Service, please contact us.

    Subscribe

    Stay up to date with cyber security trends and more