Please choose your search criteria and click on "search" or browse all reports

Leadership_Brief

Leadership Brief

The Information Protection Life Cycle and Framework: Secure

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the fourth in the series introducing the Information Protection Life Cycle and Framework. [...]

Executive_View

Executive View

Symantec Identity Governance and Administration

In the absence of a secure external perimeter Identity and Access Management has become fundamental to protecting corporate digital assets. Identity Governance and Administration includes two core elements of IAM - Identity Provisioning and Access Governance - that are essential to enabling and securing digital transformation. This report describes how Symantec Identity Governance and Administration meets these challenges. [...]

Leadership_Brief

Leadership Brief

Enterprise Information Protection

The perimeter of the corporation has transformed into a much more fluid and permeable boundary than it once was. Sensitive information is now routinely accessed with personal and business devices by employees, and mass remote work further exacerbates this trend. Advanced methods for the protection of sensitive data are necessary. This Leadership Brief is an overview of the role that Enterprise Information Protection solutions play in the current working environment and covers the capabilities that such vendors should provide. [...]

Leadership_Brief

Leadership Brief

The Information Protection Life Cycle and Framework: Contain and Recover

The modern economy is driven by information. Digital Transformation is made possible by information. But most forms of information must be protected to create and maintain value. The Information Protection Life Cycle and Framework provides concepts to organize the discovery, protection, and disposition of information objects. This article is the sixth in the series introducing the Information Protection Life Cycle and Framework. [...]

top