Retain data according to law and security policies requirements.
Problem:
Law, security policies or the requirements enforces the companies to keep data for some time. Typically, it is 3, 6 or even 12 months.
It is common for companies to have to retain certain types of data for a specified period of time due to legal, regulatory, or business requirements. The length of time that data must be retained can vary depending on the type of data and the reason for retention.
In some cases, data may need to be retained for several years or even indefinitely.
It is important for companies to be aware of any data retention requirements that apply to their business and to have processes in place to ensure that data is retained for the required period of time. Failure to comply with data retention requirements can result in legal and financial consequences for the company.
Solution - Sycope
· NetFlow data makes is easy to store the data for a very long time.
· NetFlow reduces the data to metadata 500:1 (it means that we can savethe core of information which we need to be store for the necessary time)
3 features we applied in Sycope solution to optimize stored data:
· Stitch flows– connects flow from the client to server and flow from the server to client into a single line, which is the connection log
· Data deduplication – if the traffic goes through many devices, the flows are connected into a single connection log. The individual data from each device is stored in multi-value fields
· Licensing model – licence based on performance, not on a data store. You can extend the data store to keep the data for a longer period of time
NetFlow data can be useful for compliance purposes as it can provide detailed information about network traffic, including the source and destination of traffic, the volume of data transmitted, and the types of protocols and applications being used. This data can help organizations demonstrate compliance with various regulations and standards, such as those related to data privacy, data security, and network security.