Innovative Driven’s 4-Step Program
-
ASSESS
Find out what you have and where. How much data do you have and what are the sources? Assess, index, and inventory.
-
IDENTIFY
Determine what content you have that is related to risk. Are there social security numbers in email boxes? Is there PII on your fileshares?
-
POLICY
Create a policy that fits your company’s specific needs and environment, train people on that policy, and use it to guide the cleanup and remediation process.
-
REMEDIATE
Finally, remediate existing legacy content by:
- Deleting (best for security).
- Securing via moving or encryption.
- Altering the data in place via masking or redacting.
- Replacing data with a token (tokenization).