skip to main content

Organizations require additional security layers

The rapid growth of digital communications has affected every industry and vertical, creating increasingly document-intensive operations. And, the need to address decreased productivity, spiraling costs, vulnerabilities in security and growing regulation.

What does a data breach cost?

Organizations have ethical and legal duties to protect information relating to clients. Encryption and activity monitoring are important considerations in addressing these duties.

Insider Risk Threats are rising

According to the Ponemon Institute’s “2018 Cost of Insider Threats” report, the average cost of insider-caused incidents was $8.76 million in 2017—more than twice the $3.86 million global average cost of all breaches during the same year.

All types of insider risk threats are increasing. Since 2016, the average number of incidents involving employee or contractor negligence has increased from 10.5 to 13.4. The average number of credential theft incidents has tripled over the past two years, going from 1.0 to 2.9.

In terms of total annual costs, employee or contractor negligence represents the most expensive insider profile. While credential theft is the most expensive on a unit cost basis.1

Mitigate risk with eDOCS Defense

Disrupt the status quo

eDOCS Defense, a new OpenText™ eDOCS module, addresses the gap in the protection of sensitive data at its core with two new layers of protection.

Introducing Encryption at Rest

Insider data theft may be due to a malicious employee taking or selling corporate data or simply making a mistake.

Rather than reacting after sensitive data is lost, organizations should take proactive steps to mitigate the risk of insider data theft.

eDOCS Defense Encryption at Rest encrypts individual files at the library/document server level and only individuals with permission to access those files will be able to decrypt the files.

With Activity Monitoring, eDOCS Defense offers multiple layers of defense for complete security of sensitive data.

The first step in protecting data is knowing where it is and who has access to it. In today’s IT environment, there is a lack of oversight and control over how and who among employees has access to confidential, sensitive information.

By implementing user activity monitoring, enterprises can more readily identify suspicious behavior and mitigate risks before they result in data breaches, or at least in time to minimize damages.

1 Ponemon Institute 2018 Report

Talk to an OpenText expert