SHARE
Facebook X Pinterest WhatsApp

Eight Steps to Securing Unstructured Data

As your customers continue to leverage mobile devices and laptops within and outside of their environments, many of them have experienced unparalleled productivity within recent years. But with these gains come significant risks. As IT assets become scattered to the winds, so too does the valuable data that these assets carry. According to the Aberdeen […]

Sep 25, 2009
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

As your customers continue to leverage mobile devices and laptops within and outside of their environments, many of them have experienced unparalleled productivity within recent years. But with these gains come significant risks.

As IT assets become scattered to the winds, so too does the valuable data that these assets carry.

According to the Aberdeen Group, approximately 86 percent of enterprises have experienced year-over-year growth in unstructured data across their organizations.

Additionally, 56 percent say that they’ve experienced year-over-year growth in mobile endpoint devices. Without proper policies, people management and technology controls, that convergence poses a serious threat to organizations.

As channel partners try to come up with ways to help their customers mitigate the risks posed by uncontrolled unstructured data, Channel Insider suggests they think about eight critical steps suggested by Aberdeen analyst Derek Brink in his recent report, Securing Unstructured Data.

Identify and Classify Data
You can’t secure data if you don’t even know what kind is under your stewardship.
As Brink puts it, “knowing what you have and where it is correlates strongly with Best-in-Class performance in protecting and managing unstructured data.”

Prioritize Security Control Objectives

Once organizations have established what kind of data you need to protect, it’s time to prioritize the data based on risk and develop security goals for each step in that prioritization pyramid.

“Not all data is worth being protected; you should prioritize the protection of the data with the greatest impact on the business,” Brink says.

Establish Consistent Policies
Clear risk-based policies will help you achieve those security objectives you came up with during the prioritization phase. Brink believes that organizations need to have policies that cover access to unstructured data, distribution of unstructured data and actions which may be taken with unstructured data.

Select and Deploy Data Protection Solutions

Too many of today’s enterprises focus security solely on network protection. In order to truly protect the data, the paradigm must shift to information-centric protections such as DLP, full-disk encryption and database security.

Invest in Documentation, Awareness and Training
“Investments in technology to help protect data can be significantly eroded by insufficient investments in the people and process side of successful implementation,” Brink writes.

Enterprises need to clearly explain policy, the reasoning behind it and enforce security principles in order for that message to ‘stick.’

Assign Clear Ownership and Accountability
Often organizations fail to accomplish data security objectives because there are too many stakeholders and not enough accountability. A cross-functional team in charge of the effort greatly improves chances for success.

Automate Enforcement
Paper-based policy does nothing to keep the ignorant and the scofflaws from breaking the rules. Technology that automatically enforces policies is essential to making them meaningful—and they’re key to keeping the auditors happy.

Measure and Monitor
This step is not only important for documenting regulatory compliance. It can also “drive continuous improvements by finding and eliminating root causes for exceptions, security events and audit deficiencies,” Brink writes.
 

Recommended for you...

SailPoint Intros Accelerated Application Management Solution
Jordan Smith
Aug 22, 2025
ConnectWise Partners with Proofpoint on Security in Asio
Jordan Smith
Aug 22, 2025
RegScale CRO on Channel Growth in Risk & Compliance
Victoria Durgin
Aug 22, 2025
Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.