...
2. Data Assets Visibility
Gain unparalleled insight into where your data assets are stored, which are at risk, and compliance details. The introduction Achieve seamless stakeholder alignment with Data Assets Visibility. This update catalyses strong stakeholder alignment and facilitates the establishment of comprehensive security policies.
By centralising the view of DataAsset, Department, and Owner columns on the FileExplorer page brings visibility to security posture policies from the data register directly to your analytics dashboard. This update is crucial for compliance officers and C-level executives aiming for comprehensive oversight of sensitive company assets.Gaining insights into the storage, risk status, and compliance of data assets across the company has often been a fragmented and opaque process. With the introduction of DataAsset, Department, and Owner columns in the FileExplorer, we've centralised this visibility. This enhancement empowers compliance officers and C-level executives with the information needed to make informed data security and compliance decisions, all from a single dashboardinformation, organisations can now collaboratively identify and define what defines most sensitive business data (we call it data assets). This is the crucial step toward implementing rigorous data controls.
The Process Transforms Data Asset Management:
Collaborative Asset Definition: Stakeholders define what constitutes a data asset, ensuring all parties have a unified understanding.
Policy Creation: Develop tailored policies for each data asset, allowing for nuanced governance that reflects the asset's unique characteristics.
Specify where data should reside, how long we should store it, and how data should be protected.Data Ownership: Assign clear ownership to each data asset, ensuring accountability and fostering a sense of responsibility
Control Implementation: Create controls aligned with your business needs and defined data assets. We put your policies on immediate monitoring with our data controls. Once DSPM finds any policy violation, it will alert the right data owner.
Ownership Assignment: Risk & Gap Analysis: Perform detailed risk and gap analyses, allowing for targeted security strategies that address specific vulnerabilities.
Ongoing Management: Continually adapt and refine the controls and policies as data assets evolve and new threats emerge.
Why It's Important for You:
Before: Identifying where data assets were stored and their compliance status involved manual, time-consuming processes. After: Instant visibility into data assets, their risk status, and compliance details enables proactive management and decision-makingLocating, classifying, and managing data assets was often disjointed, leading to inefficiencies and security oversights.
After: With unified views and agreed-upon definitions, your organisation can proactively manage data assets with controls and policies that contribute to a robust security posture.
Use Case & Value: Organisations can now easily track compliance with data protection laws by having immediate access to where data is stored and its classification, streamlining audits and compliance checksThis strategic initiative enables the company to define internal policies and quickly respond to business needs and external regulatory demands. When a company defines an asset, immediate action can be taken to protect it, ensuring security measures are effective and in line with broader organisational goals.
...
3. Trustees Visibility: Clear Oversight on User Data Access
...
Centralised Access Overview: Quickly view and manage the data access of individual trustees or groups from a single, intuitive interface.
Simplified Trustee Management: With just a few clicks, you can review a trustee’s access to various files and make informed decisions about permission revocations or adjustments.
Identification of Risky Users: We have prepared new dashboards that have prebuilt use cases for:
Users with Outdated passwords
Inactive Admins
Admins with Outdated passwords
Inactive users
Why It's Important for You:
Before: Gaining visibility into what files a user or group could access was a manual and scattered process, often leading to oversight gaps and potential security risks. No easy way to find inactive users, or users with outdated passwords that violated compliance policies.
After: With immediate visibility into all files associated with a user, you can proactively manage data access, ensuring that only the right eyes see sensitive information.
...
Direct, real-time notifications made staying informed about critical data control activities easier. Our new email alerting feature lets you set up email notifications easily with an API key and Endpoint details, ensuring you're always informed of important events and actions within your data ecosystem.
Why It's Important for You:
Before: Important alerts and notifications could be missed, delaying response times to critical events. After: Immediate email notifications keep you informed in real-time, allowing for swift action and enhanced data control.
...
Access more information with fewer clicks thanks to the expanded row details in the sidebar UI, now showing up to 10 chips before collapsing. Additionally, a new tooltip makes expanding row details straightforward, enhancing your ability to analyse data quickly.
Why It's Important for You:
Before, Users found it cumbersome to access detailed information quickly, which impacted productivity. After, the Enhanced sidebar UI allows immediate access to detailed data asset information, improving efficiency.
...