The Program Design Process
The first step in developing a data protection program is working with your organization’s leaders to define which assets are the most critical to the success and health of your enterprise. Assets are identified by their revenue, reputation and core operational impact. The business intelligence gained from this research is turned into a strategy that defines what types of information will be protected, the scope of that protection in terms of threat vectors, and the establishment of a road map for the program.
Additionally, organizations are increasingly utilizing cloud-based applications such as Office 365, SharePoint, Dropbox and others as a standard part of their business. Our consultants work with you to understand your relationship with the cloud, which applications are being utilized and by whom. They are able to recommend technologies and policies to address your specific cloud needs, including blocking, quarantining encrypting and DLP, CASBs and gateways.
Once the overall strategy has been established, we define how each stage of the program will be implemented, managed and the responsibility of specific actions consisting of the following:
- Application Management
- Policy Governance
- Event Triage and Incident Management
- Reporting and Key Performance Indicators (KPIs)
Once the program has been designed and approved, we are able to architect, procure and install the necessary product components and integrate them with any existing solutions you may already have in place.