December 12, 2017

PKWARE and Boldon James: Find It, Classify It, and Encrypt It

PKWARE
PKWARE and Boldon James: Find It, Classify It, and Encrypt It

The rising epidemic of data breaches, the evolution of internal and external cyber threats, and increasingly demanding privacy regulations have put pressure on companies around the world to become more proactive about protecting sensitive information against loss, theft, and misuse.

For many organizations, a proactive approach to information security means establishing data governance policies and creating an operational framework for encryption. Strong data encryption is the best way to secure data while allowing the right people to access it, and has become a must-have component of information security in the eyes of consumers, government regulators, and corporate boards. But encryption alone is rarely a complete solution.

A successful data protection strategy includes not only encryption but also data classification and data discovery. These technologies are irrevocably interwoven with encryption and are frequently mentioned together in recommendations from security experts and industry analysts. But why are they so interdependent?

A Three-Piece Puzzle

In order for companies to apply security mechanisms for protecting their sensitive information, whether they use tools like encryption, DLP, or other remediation actions such as deleting, tracking, quarantining, or reporting events, they need to know what kind of sensitive data they have and where it is located. That’s where data classification and discovery come in— classification allows organizations to tag files with metadata indicating what kind of information the files contain, while discovery provides insight into the location and quantity of sensitive data.

For every piece of data, companies need to understand the level of importance to business (which determines the security mechanism to be used) and identify the business and IT owners (which determines who has access to the information). Coordinating these functions with the security mechanisms themselves, however, often proves so challenging that organizations’ security strategies never make it off the page and into reality.

A Solution That Makes Sense

It already makes sense to integrate data discovery with encryption. With the recent launch of PK Discovery, organizations now have the ability to find sensitive information and secure it without the need for multiple products for discovery and encryption.

Today, we are excited to announce that PKWARE has partnered with Boldon James, the world leader in data classification to offer an integrated set of discovery, classification, and remediation products that combine these capabilities in one simple workflow.

PK Discovery and Boldon James Classifier integrate seamlessly to discover sensitive data, classify those files, and apply remediation — including strong encryption — in one automated workflow. PK Discovery recognizes Boldon James’ labels in addition to looking for credit card numbers, industry-regulated information, or other sensitive data found within files. These insights can help users make more informed data classification decisions.

The integrated PKWARE and Boldon James solution is available today. Whether you’re a new customer interested in this integrated solution or an existing PKWARE or Boldon James customer who wants to add enhanced functionality, see it in action with a free demo.

Share on social media
  • The Evolution from PKZIP and SecureZIP to PK Protect

    PKWARE December 12, 2024
  • Data Breach Report: November 2024 Edition

    PKWARE December 9, 2024
  • Harvest Now Decrypt Later Cybersecurity Attack

    PKWARE December 3, 2024
  • Top Cybersecurity Predictions for 2025

    Jason Dobbs November 18, 2024
  • The Evolution from PKZIP and SecureZIP to PK Protect
    PKWARE December 12, 2024
  • Data Breach Report: November 2024 Edition
    PKWARE December 9, 2024
  • Harvest Now Decrypt Later Cybersecurity Attack
    PKWARE December 3, 2024