{"id":1592,"date":"2010-05-06T00:00:00","date_gmt":"2010-05-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/06\/accuvant-unveils-new-data-centric-security-framework\/"},"modified":"2021-12-30T11:39:40","modified_gmt":"2021-12-30T11:39:40","slug":"accuvant-unveils-new-data-centric-security-framework","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/06\/accuvant-unveils-new-data-centric-security-framework\/","title":{"rendered":"Accuvant Unveils New Data-Centric Security Framework"},"content":{"rendered":"<p>Accuvant, the only research-driven information security partner delivering alignment, clarity and confidence to enterprise clients, announced today the availability of its Data-Centric Security Framework.  This new offering is comprised of several services that will be delivered by Accuvant&#8217;s Risk and Compliance Management and Technology Solutions teams, which are responsible for helping clients build and manage ongoing programs that pave the way for a healthy compliance posture and utilize the right technologies for their environments.  Accuvant&#8217;s Data-Centric Security Framework helps clients implement a Data Loss Prevention (DLP) strategy through sensitive data categorization and execution of repeatable security strategies, which can maximize investments in data protection controls and infrastructure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The framework consists of five steps that begin with data ownership and classification and end with a clear and effective data protection program that enables incidents and breaches to be properly handled.<\/p>\n<p>&#8220;The first step of Accuvant&#8217;s Data-Centric Security Framework is to understand and inventory our clients&#8217; sensitive data handling and critical system ownership.<\/p>\n<p>From this, we can determine the effectiveness of the current security program and system controls, and recommend the services and technologies that should be implemented to close the gap to get them where they need to be,&#8221; said Doug Landoll, director for Accuvant&#8217;s Risk and Compliance Management team.<\/p>\n<p>&#8220;Defining what sensitive information exists, where it resides and how it must be protected is the underlying principle of Accuvant&#8217;s Data-Centric Security Framework, and ensures that our clients can make the most efficient use of their security dollars.&#8221;<\/p>\n<p>Accuvant&#8217;s Data-Centric Security Framework is a departure from traditional DLP projects in that most are centered on the technology and assume that the organization has already defined its data, developed policies and put critical controls in place.  Accuvant&#8217;s Data-Centric Security Framework turns this concept on its head and instead focuses on the sensitive data first, with a review of the existing controls and pragmatic use of available DLP tools and technology thereafter.<\/p>\n<p>Step 2 &#8211; Locate: This step is for organizations that want to discover the location of all in-scope sensitive data assets, such as credit card data.<\/p>\n<p>http:\/\/www.darkreading.com\/security\/management\/showArticle.jhtml?articleID=224900104<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1592","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1592"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1592\/revisions"}],"predecessor-version":[{"id":4079,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1592\/revisions\/4079"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}