Back to top

Information Security Analysis

Using Search and Big Data to Ensure Information Security

Whether you are under direct attack from competitors and overseas governments, or simply hoping to be diligent in preventing the leakage of your intellectual property and future plans, we can help.

However hard you try to enforce document-level security, through the traditional means of attaching Access Control Lists (ACLs) to documents, folders and repositories, and building robust firewalls, it is impossible to legislate for the inadvertent proliferation of secure content, by persons who are authorized to view it.

At Search Technologies, we are working with customers to implement automated solutions for policing the leakage of sensitive content.

For more than a decade, folks in the enterprise search world have understood and implemented document-level security within search applications. This comprises:

  • Capturing and understanding the ACLs of every document to be indexed
  • Ensuring that search results filter out all documents to which the searcher does not already have viewing rights via the source repository

Enforcing this, in the enterprise search scenario, can be complex. However, it is a known science, and with hundreds of customers, Search Technologies are proud to be the market leader for delivering expert services for this important discipline. 

However well enforced, ACL-based access restrictions can never fully deal with the human factor. People make mistakes, and whether the cause is laziness, carelessness, or sheer work-load, it is important to detect and eliminate these occurrences.

We are working with customers to provide automated IP leakage solutions, typically based around open source software.

One highly effective approach to this problem is to:

  • Automatically create "vectors" for all documents that are subject to ACL restrictions
  • Then compare these vectors using a statistically-based comparison algorithm, to find document which describe similar subject matter, but have significantly different access security limitations

A complimentary approach is to use a vocabulary of sensitive terminology, combined with a knowledge of access control restrictions, to find abnormalities and potential leaks.

If you have a lot of documents, then this may sound intimidating. The good news is that through the use of low-cost and open source software tools, complimented by expert services, this is much easier to achieve than you might think.

Contact us if you are looking for inspiration, or for some like-minded folks to discuss your idea with, for extracting business value from unstructured content.