What you can do with
Veritas Data Insight
and
Symantec Data Loss Prevention

What you can do with
Veritas Data Insight
describes the use cases of
Veritas Data Insight
to enable more efficient incident remediation. You use the
Network Discover
incident report options to identify the data owners to notify about these incidents.
What you can do with
Veritas Data Insight
Tasks
Description
Prioritize remediation of folders.
The
Folder Risk Report
ranks folders based on number of files with policy violations, severity weightings, folder exposure, and actual user accesses on sensitive data. This report provides a mechanism to focus on the folder assets with the largest volume of data and highest risk of data exposure. The report helps
Symantec Data Loss Prevention
remediators drive down risk in the fastest possible manner. The
Folder Risk Report
is only available for file system Discover targets.
Create and automatically distribute aggregated incident reports to data owners for remediation.
Data-owner remediation reports provide a scalable method of remediating large numbers of incidents. You can aggregate incidents into a single incident report for each data owner on an ad hoc or scheduled basis and then email the remediation reports (as a CSV or HTML attachment) to the respective custodians or data owners.
Identify the data owner.
File owner information may not reflect the responsible party. The responsible party or data owner can be a line manager in the business unit, the head of a department, or an information security officer.
Veritas Data Insight
provides information to tie the most active user of a file to a manager or responsible party for remediation steps.
Identify the next-best owner.
The
Data Owner
field may return an unresolvable account for an individual that has left the organization. For example, in Windows Active Directory, every user has an underlying unique identifier that is associated with their account. This identifier is sometimes an unidentifiable string of information.
Veritas Data Insight
provides information to drop down to the next resolvable account that names an individual.
Identify the data custodian.
Veritas Data Insight
enables assignment of one or more users as custodians of a data repository. Custodian tagging is typically used to determine the person responsible for remediation. The assigned custodian need not have accessed the files and folders. Support for custodian information is available beginning with
Veritas Data Insight
version 4.0.
Investigate a data leak.
In the event of a data leak, you may want to know who saw a particular file. You can run a
Symantec Data Loss Prevention
summary report by the data user custom attribute. Also, incident snapshots provide information to tie the incident back to the
Veritas Data Insight
Management Server. On the
Veritas Data Insight
Management Server, you can view detailed information and an audit history of who accessed the data. You can also view correlations to similar incidents. Additional remediation steps can then be taken to report on those individuals or launch subsequent targeted scans on their assets.