Information-Centric Security and Data Erasure

Information-Centric Security and Data Erasure

Cover
The frightening reality is that storage remains insecure. ESG data suggests that 30% of users do not include storage infrastructure in their corporate security policies and procedures. While servers provide some storage protection, an inside attack could easily result in compliance issues, intellectual property theft or data corruption; all of which could be devastating. Further, the information and media on these systems are put at additional risk when these systems are routinely relocated, reallocated or serviced.

When it comes to fighting data breaches or complying with regulations, organizations must implement an information-centric security infrastructure -- one that protects confidential information, not just desktops, networks and servers. This type of approach has several key components:

  • Risk assessments and strong controls
  • Data classification
  • An information-centric security infrastructure

In this paper, ESG analysts Jon Oltsik and Heidi Biggar discuss the particulars of information security and data erasure, pointing out common misperceptions and overlooked problems -- and explaining why data deletion is not an adequate security measure. They also describe the components of an information-centric security infrastructure, best practices for data erasure and what to look for when retaining data erasure services.

Authors

Jon Oltsik Enterprise Strategy Group Heidi Biggar Enterprise Strategy Group
Vendor:
EMC Corporation
Posted:
26 Sep 2006
Published:
01 Jul 2006
Format:
PDF
Length:
9 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy