• I would like to receive the latest marketing communications. I can unsubscribe at any time.

The company had over 40,000 employees in locations around the world who required access to the IP. Their infrastructure included desktops, laptops, Windows® Servers and Fileshares, as well as virtual environments. The IP was used in multiple applications, including specialized scientific and simulation software. Data types included new product design and engineering documents, process flow plans, manufacturing documents, and business plans.

Identifying and classifying the sensitive data presented a challenge. Manual classification of the data was impractical; it existed in too many forms and in too many locations. Manual classification is also subject to a user’s judgment, and therefore inconsistent. More importantly, the attempted breach made clear the risk from malicious insiders. The solution had to provide automatic classification of data as it was created.

The company had previously relied on access control measures to protect data, but further restricting access to sensitive material was not possible. Employees needed the information to perform their jobs. The required solution had to provide authorized users with unencumbered access to IP, while monitoring data use to ensure compliance with corporate policies. In short, permissions for use needed to travel with the data.

Complete the form to download this resource in full.