Boldon James Logo

Data Classification Comes of Age

Reading Time: 2 minutes

Last week a California-based market research firm produced a listing of the top Cybersecurity firms in the world and guess what; they were virtually all American. It appears they use “World Series” rules, but encouragingly we made it in there, alongside only nine other UK-based entries.

It’s exciting to see Data Classification now listed alongside more established security technologies, especially as the listings were created by soliciting feedback from CISOs and end-user security practitioners on both sides of the Atlantic, and supports our view that Data Classification is now a core security technology.

We’re not alone in this view either – recently Bloor Research surveyed Senior IT Security executives from 200 organisations with more than 1,000 employees across a range of industries in the UK and the US, to get their opinions on data security challenges, best practices and solutions, in a survey entitled ‘Practices for Enhancing Data Security’.

We’re certainly seeing a change in attitudes to Data Classification in our discussions with customers and prospects and as the Bloor survey identified, Data Classification is now considered a best-practice tool for protecting data, ranking in the top three most important security controls for organisations across a variety of industries. Indeed 52% of organisations surveyed have already started to use some form of Data Classification tool.

Unsurprisingly as an industry, Financial Services lead the way in terms of adoption of security best practice and Data Classification toolsets, with manufacturing companies lagging behind. However, the survey reported that Data Classification policy and tools are by no means prolific amongst organisations in any sector, highlighting the opportunity that still resides for organisations today to ensure their sensitive data is protected right from the outset.

Do join us to learn more about the survey and how Data Classification solutions should be at the heart of any data-centric security approach, to minimise the risks associated with data loss, increase user awareness and improve the effectiveness of other security solutions such as DLP.

No Comments Yet