Secure, Protect and Control Your Data At All Times, Wherever It Is – Seminar, Tower of London, 18th Sept 20140

I would like to invite you to this exclusive free event at the prestigious and historic HM Tower of London.

Secure, Protect & Control Your Data At All Times, Wherever It Is, on Thursday 18th September 2014. … Read more →

Preventing Data Leakage With Boldon James Classifier0

Depending on your preferred source for technology statistics there is one undeniable fact that during the first half of 2014 over 300 million records were lost in data breaches.  Based on a report issued by SafeNet this figure represents an increase in excess of 250% on the same time period in 2013. It is very clear that the problems caused by data mismanagement are getting worse.

Up until now it has been the reputational damage that has seen global enterprises spring into action following minimal fines for data breaches which serve as a mere slap on the wrist. PR departments have, up until now, been able to smooth over any reputational damage caused by data breaches. But with new EU legislation set to come into force, Firms that break the rules could now face fines of up to €100 million, or up to 5pc of their annual worldwide turnover, whichever is greater.  This fact is likely to see Data Leakage Prevention moving up the agenda of companies across the EU and put vendors like Boldon James on the lips of every CISO on the continent.

Where is it all going wrong for companies struggling to keep up with the increasing pressure being placed on them? Why are so many companies still failing to get it right and in some cases going backwards?

Danny Maher, the lead Data Classification expert at HANDD Business Solutions, tells us where he suspects the problems lie and how they can be addressed.

“In the past, companies have only been interested in traditional perimeter security and ring fencing their existing infrastructure to limit the risk of data leakage. At HANDD we have learnt this is not necessarily the best approach to securing the journey of your data.  It’s alright in locking data down and blocking access to it but what if we don’t really know what that data is? Preventing users from conducting required business processes impacts on productivity and business efficiency. Not only that, but when you consider the most important asset to any company, it’s people, are unsure of company policy and what is required of them when handling specific content it is easy to see how companies can run into problems.”

But how can we be sure that we are handling content in the correct way if we really have no idea what the content or context of that content is? How can we streamline business processes to not only ensure data is being handled in the correct manner but, more importantly, we are using solutions that do not impact on common business practices? 

The answer is simple says Danny, “Boldon James Classifier.  Using Boldon James Classifier and its user-friendly, single Administration Interface it is simple to deploy a classification security policy that not only raises awareness among your end users but brings them into line with your company data security policy without impacting on their daily duties.  By placing a key identifier into metadata or x-headers we can automatically leverage downstream technologies such as McAfee, Symantec, PGP Encryption, Document Storage and Archiving solutions as part of a wider DLP strategy to combat data leakage.”

It shouldn’t be the IT Administrators who are responsible for classifying your data.

“Who is best placed to know what the content of that data is? IT? Management? Business Leaders? No, data owners, the person who creates a document or composes an email are the ones most likely to understand how valuable that data is to the company. Boldon James Classifier empowers your users to select a classification label and apply it to a document or an email with one simple click.  Behind that classification tag sits a range of policies and rules that control the flow of that data.  Automatic rules can be triggered based on content, key words, regular expressions, recipient clearance and classification labels etc.  Visual labels such as headers, footers and watermarks can be automatically applied to content to educate the users as to their responsibilities when handling that data.”

That is all very well applying labels and rules to data but where Boldon James Classifier really starts to prove its worth is when used to add value to your existing DLP architecture.

“The problems with DLP solutions are that they can be overworked and clunky by having to scan content, recipients, strings of text, document properties and then aggregating that information on the fly, creating many false positives.  With the placement of a single key identifier into that data by Boldon James DLP solutions now only have to look in one place to apply a policy efficiently which drastically reduces demands on infrastructure.  Encryption can be automatically applied based upon the classification label. Storage & Archiving policies can also be triggered by reading the classification tag. Thanks to a single x-header automatically placed into a message by Boldon James Classifier, this entire process is made simple.”

Part of the problem behind Data Leakage lies in the fact that content of legacy data is rarely known or understood.  Data is growing exponentially and expensive storage costs keep on going up as a result.  How do we combat these two problems?

Danny Maher says “Varonis Datadvantage is a metadata framework that allows companies to discover content, apply context to that content as well as offering a bi-directional view of who has access, who has been accessing and who could potentially access your data.

Coupling a solution such as Boldon James Classifier, which places that key identifier into a documents metadata, with Varonis Datadvantage you start to create a bigger picture of what type of content users have accessed or could have access to. These first steps are integral to the process of securing the journey of your data”.

Datadvantage can discover the metadata placed into documents by Boldon James Classifier and automatically move that content onto cheaper storage if it is deemed to be a low sensitivity. It could also discover who has access to sensitive content and remove inappropriate permissions, vastly reducing extortionate storage costs and rapidly decreasing the potential for loss of sensitive information.

To add even more functionality to the Boldon James Classification suite, Power Classifier allows you to bulk classify your historical and legacy data. With Varonis Datadvantage giving you the ability to understand the sensitivity of content which has not yet been classified, Power Classifier can be used to apply classification metadata to folders full of content.

In the past, securing data has been the responsibility of global IT Departments. With Boldon James Classifier IT Administrators can now provide a reliable classification mechanism for the people who really understand the content of the data, the end users.

Understanding your content as well as classification are the first steps to efficiently securing your data.  With the help of Boldon James Classifier companies can now take that all important first step”.

HANDD is the UK’s leading integrator in the DLP space with expertise in Data Classification, Data Loss Prevention and E-discovery, working with enterprise sized companies on major integration projects.  Our knowledge and expertise is fundamental to our ability to be able to offer invaluable and independent advice to companies concerned about addressing the problems that can cause Data Leakage.   HANDD adds value to the process of implementing a solution such as Boldon James by being well positioned in the market to offer; Independent Advice, Project Management Services, Training, Support, Knowledge Share, Documentation and an unrivalled understanding of your vertical’s regulatory bodies and laws which can dramatically affect your approach to securing your data.  We ensure your company is not at a loss when it comes to applying and understanding the sensitivity of your data.

Are you looking to install a Secure Data Transfer Solution?0

Any enterprise which regularly manages or processes data relating to customers must adhere with the Data Protection Act in the UK. In recent times, the Information Commissioners Office is clamping down on serious breaches of the Data Protection Act and companies who lose even the smallest amount of data are being hit with significant fines.Subsequently, many businesses are beginning to realise the importance of secure data transfer and information loss and how this can have a detrimental effect upon their company, particularly relating to data loss. Any business who uses mobile devices or laptop computers should have in place a robust data security strategy with encryption and the ability to send and receive files securely.  … Read more →

What is OWA and why should you classify this?0

The Outlook Web App or OWA is a web based email client based on Microsoft Exchange Server and it provides clients with a seamless email solution offering full contact and calendar functions along with access to voicemail, instant messaging and SMS messages entirely on one system. The web app is now commonly available across multiple web browsers and includes an efficient and user friendly control panel and interface including web sharing which enables users to share their own calendars with non-exchange users. There is often some confusion between OWA and Microsoft Outlook because they work in very similar ways; this technology however requires an internet connection in order to access email communications.  … Read more →

Varonis DatAnywhere0

A few weeks ago, Varonis announced that DatAnywhere is now completely free for up to 5 users.

varonis datanywhere free 5 users download




Varonis DatAnywhere turns an organisation’s file shares into a secure private cloud, providing employees, business partners and clients with secure mobile access and file synchronisation to files stored on the organisation’s internal file shares and NAS devices.  … Read more →

Do you have any data loss prevention policies in place?0

Security issues and data loss often feature frequently in the news with even some of the most high profile businesses encountering security breaches. This has a significant impact on both customers and employees, not only the company name. Since these high profile cases of data loss many businesses including small and medium enterprises are looking to review or even implement for the very first time data loss prevention policies.

What is Data Loss Prevention (DLP)

Most enterprises have clearly defined policies when it comes to data protection, but enforcing these policies at the end user level is difficult.

Data loss prevention (DLP) is not a simple tool or solution, but an approach that applies technology to enforce your data protection policies and mitigate the risk of lost data.

Using a combination of methods including data classification, permission management, data ownership and website security, we can provide data loss prevention solutions that offer complete peace of mind and full end user accountability.


Varonis is one of our leading suppliers in the provision of data loss prevention and offer a range of products suitable to address all data security requirements. Deciding which software to use ultimately depends on your business and the way in which solutions are to be deployed within the existing infrastructure. One of the main solutions that Varonis can help your business is through its DataPrivilege solution addresses issues surrounding data entitlement management and seamlessly manages automation of access authorisation, entitlement reviews, policy enforcement and compliance reporting.

The key benefits of this software includes;

  • Ability to provide data owners with comprehensive recommendations relating to access removal
  • Seamless access control workflows granting users access requests to specific data sets
  • Consistent implementation of business policies
  • Accessible self service data governance portal for users and data owners
  • Clear and concise audit trail

Boldon James

Boldon James are another leading provider of data loss prevention systems which can be implemented to strengthen your existing data security policies and procedures. Whereas Varonis focuses on establishing permissions, Boldon James look instead at the documents themselves with a range of solutions to classify particular sets of documents including emails, Notes, Office, SharePoint and CAD to name a few.

One of the areas where data loss often occurs is through emails, whether they are accessed by a third party during transit or they are mistakenly sent to the wrong individual. Boldon James email classifier ensures that this doesn’t occur. This solution puts labelling at the forefront of data loss prevention strategies by allowing users the ability to apply labels to emails within Microsoft Office and integrate these into the metadata of the email message.

Key Benefits of Classification Software;

  • Strictly enforces information assurance procedures and policies
  • Increases end user awareness of the data they are handling
  • Boosts the effectiveness of wider data loss prevention policies
  • Implements consistency and strict controls for unstructured and fragmented data disseminated across the network
  • Seamlessly safeguards even the most sensitive content
  • Allows system managers to view user behaviour and how documents are being used
  • Very low implementation and ongoing management costs

Whichever solution you opt for, they are all effective ways of both strengthening your data loss prevention policies and working in the background to ensure that the requirements of these policies are not only applied consistently for all users but are strictly enforced, significantly reducing or even eliminating all of your data loss concerns.

Does your business have an information classification policy in place?0

An information classification policy is the first stage toward developing a secure IT infrastructure for your business. It is not only necessary to have one in place but essential to safeguard important and confidential data. A data classification policy applies specific classifications to different pieces of data. Each of these classifications act as an indicator for the level of security to be assigned to the file or folder. Businesses typically assign the following categories; internal, external, confidential or restricted. Data falling into the latter of these is often the most sensitive and only accessed by senior level members of the business or those with specially granted permissions.  … Read more →