Methods of Data Protection
Data protection comes in many forms. Conventional methods include good data governance, network firewalls, Intrusion Prevention Systems (IPS), Identity Management (IDM), semantic layer row- and column-level security (RLS/CLS), Role-Based Access Controls (RBAC), activity monitoring, encryption, tokenization, masking, obfuscation and many more.
This whitepaper focuses on a data-centric approach that provides an essential additional layer of security for protecting sensitive data today.
This white paper covers:
- Definitions of various data-centric security methods
- Data classification and data security policy
- Deciding which method is most appropriate
- Data-centric security solution checklist