1 / 10

Data Security Trends & Data Access

Data Security Trends & Data Access. From IT in Control to Business in Control. We go to a single global User ID One official, multiple unofficial BYOD will be UAD Home Automation is within Cloud Security is around Data Data in Rest is not an Issue Structured & Unstructured Data

helen-mayo
Download Presentation

Data Security Trends & Data Access

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Security Trends & Data Access From IT in Control to Business in Control • We go to a single global User ID • One official, multiple unofficial • BYOD will be UAD • Home Automation is within Cloud • Security is around Data • Data in Rest is not an Issue • Structured & Unstructured Data • Structured Data to stay on Premise • Unstructured Data to be on Internet • Full Life Cycle & Distribution Management • Dimensions: Workflow, Access, Change & Distribution • Deviation Workflow is key to identify incorrect usage • We need to describe/document all workflows • We need business approval for each step

  2. Data in Motion Rules or Questions 1 of 2 Alltobeansweredwith a Yes • Unaware • Is the specific data exchange announced to the Secure Cell exchange mechanism? • Unexpected • Does the data exchange fit in the workflow and is the data package expected in that context? • Unauthorised • Is the initiator been authorised to execute the process or access the system? • Unapproved • Has the specific exchange been approved by the owner within the business?

  3. Data in Motion Rules or Questions 2 of 2 Alltobeansweredwith a Yes • Unknown • Are the source, Sender, Target and Receiver known? • Unhealthy • Has the data any virus, worm, inline SQL or other harmful content? • Unknown format • Has the data any unexpected or unknown format? • Not meeting specifications • Has the data the specifications as provided?

  4. BYOD willbeUseAny Device (UAD) Solving Home Automation & Business IT Security

  5. BYOD willbeUseAny Device (UAD) Looking at accessing a Business Application

  6. SharingUnnstructured Data Store itAnyWhere

  7. Data Virtualization Before

  8. Data Virtualization After

  9. Data Virtualization Thinking on Service Model

  10. Data Security Trends & Data Access From IT in Control to Business in Control • We go to a single global User ID • One official, multiple unofficial • BYOD will be UAD • Home Automation is within Cloud • Security is around Data • Data in Rest is not an Issue • Structured & Unstructured Data • Structured Data to stay on Premise • Unstructured Data to be on Internet • Full Life Cycle & Distribution Management • Dimensions: Workflow, Access, Change & Distribution • Deviation Workflow is key to identify incorrect usage • We need to describe/document all workflows • We need business approval for each step

More Related