Published: 14 January 2019
This summary contains input from eight members on their approaches to securing unstructured data. We begin this summary by exploring the different environments in which unstructured data exists within member organizations, along with the methods members have adopted to locate such data. We then examine members' organizational structures for securing unstructured data, including the size of the internal FTE teams dedicated to this purpose and the location of such teams within the IT organization. We close with an analysis of the different ways in which members have implemented Enterprise Digital Rights Management (EDRM), as well as a discussion of members' best practices for setting up preventative controls to keep sensitive, confidential, or critical unstructured data from being stored in highly-accessible or risky locations.
Included in Full Research
Consult the Board Research Team