Optimizing Your Data Protection: Part One



This two-part series features Q&A sessions with Tony Themelis, VP of Product Strategy at Digital Guardian, on how organizations can optimize their data protection programs. Here’s the first installment.

We recently sat down with Tony Themelis to discuss ways that security teams can optimize their data protection strategies and get the most out of their data protection solutions. In his role, Tony works closely with Digital Guardian customers to identify the top challenges facing security teams and develop solutions to meet those needs. As a result, Tony has a wealth of experience and expertise on the concerns that are top of mind for security practitioners at organizations today. This series features Tony discussing some of those concerns and providing strategies for optimizing your data protection efforts to overcome them.

Getting to data visibility and insights quickly

It’s a commonly held misconception that all of your data must be identified and classified before you can start protecting it. In this video, Tony advises on how security teams can get to actionable data visibility and insights without first conducting a detailed data discovery and classification process that can take months to complete.

Simplifying your data protection programs for quick wins

Many data protection programs are bogged down by a cumbersome deployment process, delaying protection efforts and time to value for businesses. In this video, Tony details a strategy that enables businesses to use data insights to drive meaningful protection policies that are tailored to your most critical risks.

Stay tuned for Part Two in this series, in which Tony will discuss topics such as employee security education, outsourcing security, and strategies for building defenses against new threat types.

Bill Bradley
Related Articles
6 security risks of enterprises using cloud storage and file sharing apps

The following are six of the top risks that must be addressed when using cloud storage and file sharing apps for business.

Breaches are inevitable, but sensitive data loss isn’t – thinking like an attacker to keep your data safe in the face of a breach

When thinking about data protection in today’s world, there is no shortage of attack vectors. Data is everywhere: on laptops, with vendors, on mobile devices, and in the cloud.

Security Experts Share Top Tips for Protecting Unstructured Data

19 security professionals and business leaders share their top tips for protecting unstructured data.

Bill Bradley

Bill Bradley is director of product marketing at Digital Guardian, bringing over 20 years of technology, marketing, and sales experience to the role. He spent the first portion of his career in field sales and brings this customer-centric mentality to his role in marketing for Digital Guardian. Prior to Digital Guardian Bill was at Rapid7 and the General Electric Corporation.

Please post your comments here