The Information Protection Life Cycle and Framework: Monitor and Detect
Content of Figures
1 Executive Summary
The Information Protection Life Cycle (IPLC) and Framework describes the phases, methods, and controls associated with the protection of information. ...
Login Free 30-day Select Access Get full Access2 Analysis
The three stages in the life of information objects are: acquire & assess, active use life, and disposition.
Active Use Life
Active Use Life is a ...
Login Free 30-day Select Access Get full Access3 Recommendations
-
Evaluate your current information protection strategy. Does it encompass all three phases of Information Protection Life Cycle? Are the IPF contr ...
4 Related Research
Leadership Compass 71172 Endpoint Security: Anti-Malware Solutions
Leadership Compass 70614 Cloud Access Security Brokers
Leadership Compass 80127 Fraud Reduction Intelligence Platforms
Leadership Brief 80296 Do I Need Network Threat Detection & Response (NTDR)
Leadership Brief 80187 Do I Need Endpoint Detection & Response (EDR)
Leadership Brief 80186 The Differences Between EPP and EDR
Leadership Brief 80008 Find Your Route from SIEM to SIP to SOAR
Whitepaper 72613 Protecting Your Keys to the Kingdom Against Cyber-attacks and Insider Threat
Whitepaper 80017 Next-Generation Enterprise Security Delivered from the Cloud
Advisory Note 80110 Buyer’s Compass Endpoint Protection
Advisory Note 80213 Buyer’s Compass Endpoint Detection & Response (EDR)
Advisory Note 72570 Protect Your Cloud Against Hacks and Industrial Espionage