Define your data for better document security0 pages
Define your data for better document security White Paper
Define your data for better document security
Without document classification in play, it’s impossible to know what
to protect.
Table of contents
1:tSensitive documents in
a mobile world
2:tTake control of content
2:tExplore controls within
documents
3:tConclusion
In the previous white paper, “A delicate balance: The competing needs of IT and users in a mobile world,” we
discussed the expectations of a highly mobile workforce with regards to documents. Mobile and cloud
environments can bring risks ranging from corporate liabilities to enterprise security. Personal devices, along
with the rapid growth of file share and sync accounts, have invaded many workplaces as employees use them
to transmit and store sensitive company documents. And now, employees aren’t just securely accessing
corporate content via mobile devices—they’re also handling new content created on those mobile devices.
But the mobile ecosystem also makes workers infinitely more productive, which is one reason that it won’t go
away. This white paper explores the question: How can IT govern and protect content in such ad hoc and
semi-structured environments?
This is the second paper
in a three-part series
that explores how IT can
enable mobile employees
to work productively
with documents without
sacrificing IT’s needs.
Part I: A delicate
balance: The competing
needs of IT and users in a
mobile world
Part II: Define your data
for better document
security
Part III: How hybrid IT
can support enterprise
mobility
Sensitive documents in a mobile world
As organizations support enterprise mobility, protecting electronic documents that contain sensitive
information is a challenge with potentially dire consequences. A security incident is expensive, not only from a
financial perspective, but also in the loss of customer trust. A recent survey by PWC found that 28.6% of
respondents claimed their company suffered financial losses due to a security incident.
In terms of documents, many information security solutions attempt to protect electronic content only at its
storage location or during transmission. But these solutions do not provide protection for the entire lifecycle of
an electronic document.
While concerns around accessing corporate information in mobile and cloud environments do not likely apply to
all your employees, many organizations have certain worker populations that push boundaries because they:
•t Work with multiple devices and want to sync files across those devices
•t Use multiple apps to accomplish work on mobile devices (beyond email or calendar)
•t Travel frequently
•t Participate in BYOD programs, where supported
These employees are not well served by an IT model that assumes that all employees are behind the corporate
firewall, on the same LAN, using the same type of device. You need a model that works in the real world—
supporting mobile workers but also protecting files outside the firewall.