100 likes | 237 Views
Data Security Trends & Data Access. From IT in Control to Business in Control. We go to a single global User ID One official, multiple unofficial BYOD will be UAD Home Automation is within Cloud Security is around Data Data in Rest is not an Issue Structured & Unstructured Data
E N D
Data Security Trends & Data Access From IT in Control to Business in Control • We go to a single global User ID • One official, multiple unofficial • BYOD will be UAD • Home Automation is within Cloud • Security is around Data • Data in Rest is not an Issue • Structured & Unstructured Data • Structured Data to stay on Premise • Unstructured Data to be on Internet • Full Life Cycle & Distribution Management • Dimensions: Workflow, Access, Change & Distribution • Deviation Workflow is key to identify incorrect usage • We need to describe/document all workflows • We need business approval for each step
Data in Motion Rules or Questions 1 of 2 Alltobeansweredwith a Yes • Unaware • Is the specific data exchange announced to the Secure Cell exchange mechanism? • Unexpected • Does the data exchange fit in the workflow and is the data package expected in that context? • Unauthorised • Is the initiator been authorised to execute the process or access the system? • Unapproved • Has the specific exchange been approved by the owner within the business?
Data in Motion Rules or Questions 2 of 2 Alltobeansweredwith a Yes • Unknown • Are the source, Sender, Target and Receiver known? • Unhealthy • Has the data any virus, worm, inline SQL or other harmful content? • Unknown format • Has the data any unexpected or unknown format? • Not meeting specifications • Has the data the specifications as provided?
BYOD willbeUseAny Device (UAD) Solving Home Automation & Business IT Security
BYOD willbeUseAny Device (UAD) Looking at accessing a Business Application
SharingUnnstructured Data Store itAnyWhere
Data Virtualization Before
Data Virtualization After
Data Virtualization Thinking on Service Model
Data Security Trends & Data Access From IT in Control to Business in Control • We go to a single global User ID • One official, multiple unofficial • BYOD will be UAD • Home Automation is within Cloud • Security is around Data • Data in Rest is not an Issue • Structured & Unstructured Data • Structured Data to stay on Premise • Unstructured Data to be on Internet • Full Life Cycle & Distribution Management • Dimensions: Workflow, Access, Change & Distribution • Deviation Workflow is key to identify incorrect usage • We need to describe/document all workflows • We need business approval for each step