Page 64 - Cyber Defense eMagazine for September 2020
P. 64
6. Is this data shared externally, and if so, how and with whom?
This is an important part of the process, because it will give you more insight into the kind of data you
have. It will also provide you with an opportunity to implement some best practices of how the data is
handled and protected and automate critical functions such as discovering and classifying documents
that contain sensitive information.
About the Author
Deborah Kish is Executive Vice President of Marketing and Research at
Fasoo. She is responsible for leading Fasoo’s research and product
strategies in the unstructured data security and privacy space. Fasoo
provides unstructured data security and enterprise content platforms that
enable our customers to protect, control, trace and analyze critical
business information while enhancing productivity. Fasoo has
successfully retained leadership in the unstructured data security market
by deploying enterprise-wide solutions globally, securing millions of users.
Deborah can be reached online at ([email protected],@deborah_kish,
linkedin.com/in/deborahkish.) and at our company website http://www.en.fasoo.com/
Cyber Defense eMagazine – September 2020 Edition 64
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.