Latest Research

This content is currently locked.

Your current Info-Tech Research Group subscription does not include access to this content. Contact your account representative to gain access to Premium SoftwareReviews.

Contact Your Representative
Or Call Us:
1-888-670-8889 (US/CAN) or
+1-519-432-3550 (International)

Comprehensive software reviews to make better IT decisions

Symantec Now Has Zero Trust for Cloud DLP

Symantec recently announced new features for its Integrated Cyber Defense Platform (CDP) aimed at boosting data loss prevention (DLP) strategies in the cloud via zero trust technologies from Luminate, which was acquired by Symantec back in February. These upgrades are meant to address what Art Gilliland – executive vice president and general manager of enterprise products at Symantec – refers to as the “dissolu[tion]” of “[t]raditional network perimeters” that are occurring “as cloud technologies change the way we work.”

Because the cloud can be accessed from anywhere, it presents a particular challenge for organizational DLP. To combat this, Symantec is now using a zero-trust approach to cloud access authentication, which requires that users prove their identity and right to use the data before any access is granted, so that data cannot simply come and go from the cloud as it has sometimes done in the past. In theory, this should greatly cut down on accidental cloud-related data loss.

Check out the SoftwareReviews rating of this Symantec product: Accessed August 19, 2019

Our Take

Symantec’s got an interesting approach with this one. This zero-trust model is definitely an improvement for decreasing data loss in the cloud, especially when it comes to accidental data loss resulting from privilege management issues (i.e. cases where people who don’t use sensitive data have access to it and don’t know how to handle it). However, these new features won’t be able to stop someone bent on maliciously leaking data to which they rightfully have access.

When it comes down to it, DLP solutions should be used to enhance a data classification program, not replace it. To protect your data properly, you need a full understanding of the sensitivity of your data. Without knowing this information, you won’t be able to decide who does and does not need access to such data.

Want to Know More?

Discover and Classify Your Data

Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019