What does Design Thinking have to do with data security?
While most of an organization’s SAP enterprise would be secure at multiple levels, there is always the ‘Mystery’ on what happens to data when it leaves the boundaries of the enterprise
Have you heard of the concept called Design Thinking? Yes? No? Okay. Its evangelists define it as “a proven and repeatable problem-solving protocol that any business or profession can employ to achieve extraordinary results.” In other words it’s a very methodical step-by-vigorous-step process that helps organizations, departments, teams and individuals (and all in between) find a solution that is repeatable (algorithmic).
On deep diving into the subject, you’d notice that the application of Design Thinking is truly universal. Its application can be found across industries. A very popular proponent, Professor Roger Martin (writer, strategy advisor and Institute Director at the Rotman School of Management, University of Toronto, Canada) especially propounds that Design Thinking is THE way for businesses to not only stay current, but also disrupt through innovation, thus creating new models and leading the way. In his popular 2009 best seller, The Design of Business, he introduces the reader to what he calls the ‘Knowledge Funnel’. This funnel is a structured process that enables businesses to innovate consistently. The Knowledge Funnel has three phases: Mystery, Heuristics and Algorithm.
The Mystery stage is filled with exploration – too many questions, problems, symptoms, and so on. What happens on deeper analysis of the issues, from multiple perspectives, is a transition from a disorganized motley bunch of problems, to workable groups that are manageable size. The final stage, algorithm, presents the final transition to a solution that is fixed and repeatable, thus taking the issue from complexity to simplicity.
Okay. But that still doesn’t answer the question. What does ‘Design Thinking’ have to do with data security? A lot. Really. While most of an organization’s SAP enterprise would be secure at multiple levels, there is always the ‘Mystery’ on what happens to data when it leaves the boundaries of the enterprise.
Consider this. SAP users in organizations extract hundreds of sensitive documents from your SAP systems and applications for the purpose of reporting, analytics, and knowledge sharing with colleagues, partners, and suppliers. Most enterprises have very little knowledge or control of where these documents are going, who accesses them, or how they are being used. This leaves companies at a high risk of data loss due to malicious or accidental actions. A recent case in point – Target.
The ‘Mystery’ here is: who is accessing what, seeing what and sharing what. Applying Design Thinking through HALOCORE® actually helps in solving this mystery once and for all. HALOCORE® is a unique technology that protects intellectual property and other sensitive information extracted from SAP systems. By integrating directly with SAP, HALOCORE® protects data with intelligent classification, strong encryption, and fine-grained access policies. This innovative approach allows enterprises to maintain a high level of control and security over sensitive documents extracted from SAP throughout their lifetime, even if these have been shared via email, downloaded to a recipient’s PC, moved to a mobile device, or uploaded to the cloud.
The innovative solution’s intelligent classification feature provides comprehensive classification (tagging) for any data extracted from the SAP landscape or application. HALOCORE® intercepts the data being downloaded from SAP and applies fully customizable labels to the document metadata. HALOCORE® ensures consistent and proper handling of documents downloaded from SAP throughout their life cycle. HALOCORE®’s classification is truly unique as it does not classify based on content, but on context. This allows security officers in the enterprise to seamlessly progress from ‘Heuristics’ to applicable ‘Algorithm’ – in this case the Block or Protect feature.
Data security is, today, an integral part of not only secure operations, but a superlative business outcome. With increasingly stringent regulations securing client data and one’s own IP is no more wishful thinking, but a real-world need.