Big Data...turning a liability into an asset.

Enforcement

Protective Marking of Current data (labelling).

This solution addresses the implementation of the (Electronic) Information and Classification Handling Policy Enforcement System. Many of the processes and the methods currently used to control the distribution of confidential or sensitive documents have not kept up with the explosion in data sharing and the necessary transfer of data used in the operation of today’s business or governmental environment. 

Thousands of personal files are held in corporate systems. Only one in a hundred download (Song Programme) is actually legally held

Today’s workforce are bringing to the workplace a different view on Data Security and sharing. This has led to an inadvertent relaxation of information security (this is especially true for the 00’s generation of young adults that has grown up using Twitter, Facebook and other social networking sites where information sharing and openness is the norm). This generation is now moving into the workplace and finding a culture where attitudes to information sharing are much more conservative. This can lead to low productivity, increased risk of data loss and staff retention issues. Sensible enforcement protection coupled with awareness and

This solution takes the Information and Classification Handling policies and implements an automatic, easy to use method of preventing any document being moved, printed, copied or altered without a positive action on behalf of the user to assign or re affirm the documents classification level.  Simply it prevents any

  • This Module enforces the labelling of any created or altered document or email.  
  • Provides simple user “drop down” choices to enable the speedy acceptance of the routine need to security label all documents and email traffic. 
  • It can be set up to invoke enforcement of an organisation’s rules on the handling and release of documents. 
  • It provides the most comprehensive set of labelling plug-ins for key applications in the Microsoft® Office family: Word, Power Point, Excel, Visio, Project, amongst others.
  • It provides Domain and User Clearance Checking to prevent inadvertent or malicious data delivery to inappropriate users.


Protective Monitoring Control (logs)

Within the DataCube toolkit is the ability to monitor all transactions and most importantly record in an evidential quality system (GPG18) all activities on the network. Should an organisation be unfortunate enough to suffer a breach of its data, DataCube can track the breach and notify the administrators of the network according to a rules based process. DataCube has developed a workflow process which incorporates the use of a CESG accredited system of Protective Monitoring.

The Protective Monitoring Control system has been integrated into DataCube- supplied by an ISO 27000 registered company who provide their log management, Analysis and Alerting, Protective monitoring and forensic readiness to many defence and corporate customers, including BAe, Fujitsu, UK MOD, plus many NATO country defence organisations. This capability allows you to monitor every system activity and provide alerts for every attempted breach or unusual activity, as well as being able to provide evidential quality proof from log data of these activities.

If you are a Governmental organisation, you will be familiar with the need for this kind of Monitoring- known as Protective Monitoring, also known as Good Practice Guide 13. GPG13 is a UK government (CESG) recommended set of people and business processes and technology to improve company risk profiles.

The goal of a Protective Monitoring system is to ensure that there is a level of operational insight, to ensure that organisations have an understanding of how their IT systems are being used or abused by internal or external agents.

Protective Monitoring for HMG ICT Systems is based on CESG’s Good Practice Guide no.13 (GPG 13.) It provides a framework for treating risks to systems and includes mechanisms for collecting ICT log information and configuring ICT logs in order to provide an audit trail of security relevant events of interest.  GPG13 is essentially compulsory for systems that store high impact level data

Could you assure your board/council that you are not illegally holding out of time files?

Essentially, a Protective Monitoring solution will provide visibility and an understanding of who is accessing your organisations sensitive data. Within Central HMG it is a mandatory requirement of the Security Policy Framework (SPF) to provide a reporting model within the IA structure.

Implementation of protective monitoring solutions are recommended in a number of regulatory and industry best practices, such as PCI DSS, ISO27001, GCSx CoCo and SOX. : The DataCube system works at several levels to operate to the requirements of the PSN.  The DataCube integrates an accredited protective marking system with a protective monitoring solution to provide a data management framework that complies with the CESG framework, ISO27001 and PSN CoCo requirements as well as addressing the Big Data issues for commercial organisations.


Retention Policy Management

The spectre of a dataset with millions of documents each with an unknown retention date position is difficult enough to contemplate, and even with the work which DataCube can achieve bring the dataset into line, something has to be done to prevent the same problem re occurring and building back to the levels of documents with unknown retention dates/removal requirements.

DataCube has developed an enforcement solution which operates in a similar way to the protective marking (labelling) software. The Retention Policy Management  solution offers users a simple “drop down” choice on the Outlook or Office formats where the user then chooses the timeframe of the retention details for that document.  Like the labelling system, this easy to use method of preventing any document being moved, printed, copied or altered without a positive action on behalf of the user to assign or re affirm the documents retention level.  

It can be set up to invoke enforcement of an organisation’s rules on the handling and release of documents. 

It provides the most comprehensive set of labelling plug-ins for key applications in the Microsoft® Office family: Word, Power Point, Excel, Visio, Project, amongst others.

© Copyright 2013 Apperception