Gartner Research

Information Classification: An Essential Security Thing You're (Still) Not Doing

Published: 14 September 2012

ID: G00234077

Analyst(s): Trent Henry


With the growing volume of electronic information created and maintained by business, it gets harder and harder for organizations to locate, catalog, secure and manage information. Information classification technologies and techniques aim to address information management problems by allowing organizations to categorize and prioritize content. This assessment examines approaches for successful security classification.

Table Of Contents

Summary of Findings


  • Information Classification
  • Security Classification Techniques
  • Security Classification Tools
    • Criteria for Choosing a Classification Tool
  • The Role of the User
  • Strengths
  • Weaknesses
  • Be Realistic and Target Specific Areas
  • Ensure That Classification Is Integral to Project Efforts
  • Tie Classification to Other Business Efficiency Projects
  • Use Native Repository Functionality for Structured Data
  • Avoid Exclusive Reliance on Retrospective Tools for Security and Compliance
  • Selectively Supplement Security and Compliance With Information Classification

The Details

  • A Little History
  • Interaction With Business
    • Business Decisions About Information Classification

Recommended Reading

©2021 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.