November 4, 2019 By Joanne Godfrey 2 min read

Data — it’s your most critical asset. According to Domo, 2.5 quintillion bytes of data are created daily. It’s no wonder that finding and identifying data is one of the most complex and challenging processes organizations face along their data protection journeys. With the average total cost of a data breach hitting $3.92 million in 2019, companies must discover and classify their data as a foundational component of their data security and data privacy strategies.

What Is Data Discovery and Classification?

Data discovery and data classification go hand in hand. Data discovery is the process of scanning your environment to determine where data (both structured and unstructured) resides — e.g., in database and file servers that could potentially contain sensitive and/or regulated data.

Data classification, which follows the data discovery process, is more complicated. It’s the process of identifying the types of data within the discovered data sources using a predefined set of patterns, keywords or rules and assigning classification labels to that data. For example, if you work at a health insurance company, you would use medical identifier patterns to search for sensitive healthcare information.

Why Is Data Discovery and Classification Important?

Put simply, if you don’t know what data you have and where it lives, you can’t protect it effectively, which means your data is vulnerable. In addition, data classifications inform how you should treat and protect your data, including the policies you need to place around it, and guide the prioritization of your data protection and risk mitigation activities. Finally, it helps identify data that is governed by regulations and enables you to implement the controls required to achieve compliance.

Common Barriers to Effective Data Protection

Given the myriad strategic, tactical, business and technical reasons for performing data discovery and data classification, why isn’t every company doing it? Well, it’s complicated.

Operationally, discovering and classifying structured and unstructured data in a unified way across the cloud and on-premises locations is a complex process due to the scale, types of data, and underlying architectures and platforms. It’s also challenging to establish and maintain a coherent approach across the different environments and assign labels consistently across all the data. Without that consistency, the effectiveness of these processes is limited at best.

Moreover, data is constantly changing and moving, which means it needs to be tracked and reclassified regularly and continuously. Your business changes and evolves over time, which can complicate your data discovery and data classification efforts when introducing legacy (or, conversely, new) technologies. Lastly, with so many new regulations coming into effect — especially data privacy regulations — it’s hard to keep up with, centralize and manage all the compliance requirements for data protection.

In part two of this series, we’ll explore some tips and best practices to help companies strategically plan and implement a flexible approach to data discovery and classification.

Read the Forrester Report: Rethinking Data Discovery & Classification

More from Data Protection

Data security tools make data loss prevention more efficient

3 min read - As businesses navigate the complexities of modern-day cybersecurity initiatives, data loss prevention (DLP) software is the frontline defense against potential data breaches and exfiltration. DLP solutions allow organizations to detect, react to and prevent data leakage or misuse of sensitive information that can lead to catastrophic consequences. However, while DLP solutions play a critical role in cybersecurity, their effectiveness significantly improves when integrated with the right tools and infrastructure. Key limitations of DLP solutions (and how to overcome them) DLP…

Defense in depth: Layering your security coverage

2 min read - The more valuable a possession, the more steps you take to protect it. A home, for example, is protected by the lock systems on doors and windows, but the valuable or sensitive items that a criminal might steal are stored with even more security — in a locked filing cabinet or a safe. This provides layers of protection for the things you really don’t want a thief to get their hands on. You tailor each item’s protection accordingly, depending on…

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Cost of a data breach: The evolving role of law enforcement

4 min read - If someone broke into your company’s office to steal your valuable assets, your first step would be to contact law enforcement. But would your reaction be the same if someone broke into your company’s network and accessed your most valuable assets through a data breach? A decade ago, when smartphones were still relatively new and most people were still coming to understand the value of data both corporate-wide and personally, there was little incentive to report cyber crime. It was…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today