Data Security Posture Management
Data Security Posture Management
Keep data secure

Discovery of Abandoned Data

Locate and eliminate abandoned data in multi-cloud environments.

Overview

Abandoned data increases risk and cost

Abandoned data is information that remains in storage but is no longer used, accessed or needed by an organisation. It can include snapshots of databases from discontinued projects, files from former employees or information left behind after migration to new platforms.

This redundant, obsolete or trivial data can arise from lack of oversight or visibility, poor understanding of which data is ready for archiving or deletion or inadequate data management policies. It drives up cloud storage and backup costs. It also increases attack surface without delivering value.

Benefits

Save up to $324k a year for every petabyte of data

Proofpoint research shows that 27% of data volumes are abandoned. This means that for every petabyte (PB) of data an organisation stores in the public cloud, 270 terabytes (TB) might be unused. By using Proofpoint Data Security Posture Management (DSPM) to locate and eliminate unused data, your organisation can save up to $324k a year on storage and backup costs.

Identify abandoned data in multi-cloud environments
Organisations commonly use multiple public cloud providers to store data. Much of this data might be unknown to IT, making it challenging for data security teams to protect it. DSPM identifies abandoned data stores across cloud platforms, such as Amazon Web Services, Microsoft Azure and Google Cloud Platform.

Reduce your attack surface and storage costs
By eliminating low-value, ungoverned data, DSPM reduces your attack surface and cloud storage spend.

Lower your risk, strengthen your compliance
Due to poor governance, internal users and service accounts often retain write access to abandoned data. Sometimes this also extends to third-party users and services, posing significant risk. DSPM reveals access permissions for your abandoned data. This enables precise access revocation, reducing your exposure and closing compliance gaps.

Key Features

Key features for discovery of abandoned data

Continuous scanning
DSPM continuously scans across your environments to identify obsolete, abandoned or redundant data.

Flagging of stale data
DSPM highlights stale storage objects and backups suitable for archive or deletion. Targeted filters help you prioritise high-cost, high-risk abandoned data for triage.

 

Data Security Posture Management

 

Risk evaluations
For every abandoned data store or backup that it uncovers, DSPM evaluates associated risks. This gives you the context you need to act.

 

Data Security Posture Management

 

Detailed access views
Using detailed access views, see which users and roles can access your abandoned data stores. This includes external users and roles. By knowing when each role last accessed data, you can precisely revoke permissions.

 

Data Security Posture Management

 

Access histories
See a detailed access history for each of your abandoned data stores and backups. This context helps you decide which data is safe to clean up.

Guided risk remediation and audit trails
Proofpoint turns analysis into action. DSPM enables security teams to triage risks and launch guided remediation actions, such as opening Jira tickets or creating email and Slack notifications. Proofpoint preserves audit logs for every decision made, ensuring traceability and compliance.

 

Data Security Posture Management
Resources

The latest resources on securing your data

Proofpoint Resources
Resource
Reduce Risk and Cost of Abandoned Data with Proofpoint DSPM
Bridging the Data Security Gap with DSPM
Resource
Bridging the Data Security Gap with DSPM
See other resources