Taking Control of Sensitive Data

Data protection is becoming an ever more pressing concern. The threat landscape is complex and adversaries are increasingly sophisticated. Sensitive data that falls into the wrong hands can cause widespread damage, both to the individuals concerned and organisations, which can suffer financial and reputational damage.

This white paper looks at the technologies that can help with data protection efforts. Of these, the use of encryption and pseudonymisation techniques – the only technologies specifically called out in GPDR – are considered to be best practice. For best results, these technologies should be used as part of an enterprise-wide information governance program that includes data classification capabilities and robust access controls.