Security News > 2022 > July > Dealing with threats and preventing sensitive data loss
Some data discovery solutions give you only metadata, which is a good place to start, but comprehensive data classification based on sensitive content provides the additional context so you can focus on protecting what is important first.
Volume: Data volumes in cloud environments are on the increase and hence the solution you pick needs to be able to handle large volumes of data and can scale itself up or down as needed to do both discovery and classification of the data.
Variety: The solution you pick must discover all types of data stores - structures and structured - across all 3 public clouds and has the ability to connect natively to scan and classify the data where it resides without any impact on performance or privacy of the data.
Since data scanning and classification happens on your compute time to maintain data privacy, it is important to understand the cost parameters upfront before choosing a data security solution.
As a result, shadow and abandoned data stores are popping everywhere in cloud environments with excessive privileges that could lead to expensive data breaches.
Such tools will enable CISOs to visualize the data across their cloud environments and understand how the data is used and for what purpose.