{"id":12169,"date":"2020-06-23T13:49:33","date_gmt":"2020-06-23T13:49:33","guid":{"rendered":"https:\/\/www.inspark.nl\/?p=12169"},"modified":"2020-06-23T13:50:46","modified_gmt":"2020-06-23T13:50:46","slug":"detect-and-track-sensitive-information-with-cognni","status":"publish","type":"post","link":"https:\/\/www.inspark.nl\/detect-and-track-sensitive-information-with-cognni\/","title":{"rendered":"Detect and track sensitive information with Cognni"},"content":{"rendered":"
> Read this post in Dutch<\/span><\/a><\/h5>\n

Risks and opportunities<\/span><\/b>\u00a0<\/span><\/h3>\n

Since the World Health Organization (WHO) has declared the Corona outbreak a pandemic, working from home has become a standard practice for many people. More than ever before, employees depend on digital workplaces provided by their employer. The modern workplace provides various cloud services to equip employees with all the necessities to be productive and successful for the organization, even when they are not physically present. The pressure from this new situation falls on IT professionals. They need to ensure that everything runs smoothly, so that everyone can experience the same quality of service, when working from home. Hence the IT department is constantly looking for a balance between productivity and security.\u00a0<\/span>\u00a0<\/span><\/p>\n

Organizations that were hesitant to migrate to the cloud have now fully converted and are deploying Microsoft Teams to provide a modern and smart service so that employees can work together remotely. The adoption of Office 365 services has been forced by these special circumstances and the acceptance of<\/span>,<\/span>\u00a0for example<\/span>,<\/span>\u00a0Microsoft Teams seems to be enhanced as well. Unfortunately, in this situation<\/span>,<\/span>\u00a0there is hardly any time left for a detailed planning for security agreements and rules for sharing sensitive information. Organizations run considerable risks when they do not properly implement information classification and security from scratch.\u00a0<\/span>\u00a0<\/span><\/p>\n

The importance of secure information\u00a0<\/span><\/b>\u00a0<\/span><\/h3>\n

An important question that arises when using cloud services is whether sensitive information can be safely stored in the cloud: \u201c<\/span>Is the information also safe when employees download it or store it in other applications?<\/span><\/i>\u201d and \u201c<\/span>Are all employee devices managed by the organization so that stored company information remains secure at all times<\/span><\/i>?\u201d These questions are very important to security and compliance officers, because they are the ones responsible for the secure provision of information within the organizational network. In the Microsoft cloud, various security controls are available to take preventive measures, so that, when starting from a greenfield situation, all sensitive information is protected. However, it is unrealistic to think that all sensitive information flows in the cloud are immediately properly classified and encrypted.\u00a0<\/span>\u00a0<\/span><\/p>\n

Detect sensitive information with\u00a0Cognni<\/span><\/b>\u00a0<\/span><\/h3>\n

Cognni\u00a0is an information intelligence company based in Israel that has developed software to complement Office 365.\u00a0Cognni\u00a0uses smart technology to detect sensitive information within Office 365.\u00a0Cognni\u00a0provides added value for organizations that currently do not know where their sensitive information is stored or shared. To this end,\u00a0Cognni\u2019s\u00a0solution can detect how sensitive information is shared within Office 365. The\u00a0Cognni\u00a0dashboard shows security and compliance officers what type of information is shared, both within the company and to sources outside the organization. This enables security officers to selectively protect information and implement appropriate security measures.<\/span>\u00a0<\/span><\/p>\n

\"\"<\/p>\n

Figure 1: The\u00a0Cognni\u00a0radar which contains a high-level overview of the detected sensitive information.<\/span>\u00a0<\/span><\/p>\n

\u00a0<\/span>\u00a0<\/span><\/p>\n

“Cognni\u00a0gives organizations instant insight into sensitive information flows. It detects where vulnerable information is stored and where this information is shared or moved to.”<\/span><\/i>\u00a0<\/span><\/p>\n

\u00a0<\/span>\u00a0<\/span><\/p>\n

Insights based on Machine Learning and Cognitive Intelligence<\/span><\/b>\u00a0<\/span><\/p>\n

Cognni\u00a0uses machine learning (cognitive intelligence) to scan the content of information and then divides it into recognizable subjects. Classification can also be influenced and expanded so that information can be labelled correctly. In organizations we often see that security and compliance officers spend a lot of time having conversations with the business users to discover where sensitive information is used and processed. Use cases need to be determined in order to apply final information classification as well as information security. With the deployment of\u00a0Cognni\u00a0they can save a lot of time, because they now access a dashboard with insights gathered autonomously, which they can see immediately. This enables security and compliance officers to act effectively and implement targeted security measures.<\/span>\u00a0<\/span><\/p>\n

\"\"<\/span>\u00a0<\/span><\/p>\n

Figure 2:\u00a0Cognni\u00a0dashboard with detailed information about risky sharing.<\/span>\u00a0<\/span><\/p>\n

\u00a0<\/span>\u00a0<\/span><\/p>\n

“Security and compliance officers now have a tool in their hands to trace sensitive information and take targeted security measures. This saves an enormous amount of time in determining use cases for the deployment of Microsoft Information Protection”.<\/span><\/i>\u00a0<\/span><\/p>\n

\u00a0<\/span>\u00a0<\/span><\/p>\n

Conclusion<\/span><\/b>\u00a0<\/span><\/p>\n

Would you like to know more about how\u00a0Cognni\u00a0can support your organization in making sensitive information transparent? Or would you like to use\u00a0Cognni\u00a0to generate an overview, in which your company data is mapped? Our security team at\u00a0InSpark\u00a0can participate and contribute in the thought process; we can help you. The onboarding of your Office 365 environment can be completed within half an hour. This way we offer your security and compliance officers a tool to detect sensitive information in the cloud and secure company information in a targeted way. Don’t hesitate to contact us! Rely on the security options in the cloud and use smart tools like\u00a0Cognni\u00a0to be in control. Know where your sensitive information is stored, and which information flows are vulnerable, to keep your information safe.\u00a0\u00a0<\/span>\u00a0<\/span>\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

> Read this post in Dutch Risks and opportunities\u00a0 Since the World Health Organization (WHO) has declared the Corona outbreak a pandemic, working from home has become a standard practice for many people. More than ever before, employees depend on digital workplaces provided by their employer. The modern workplace provides various cloud services to equip … Continued<\/a><\/p>\n","protected":false},"author":22,"featured_media":10953,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7389,7386],"tags":[7391],"acf":[],"_links":{"self":[{"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/posts\/12169"}],"collection":[{"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/comments?post=12169"}],"version-history":[{"count":3,"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/posts\/12169\/revisions"}],"predecessor-version":[{"id":12174,"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/posts\/12169\/revisions\/12174"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/media\/10953"}],"wp:attachment":[{"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/media?parent=12169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/categories?post=12169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inspark.nl\/wp-json\/wp\/v2\/tags?post=12169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}