Data Security Trends & Data Access

Preview:

DESCRIPTION

Data Security Trends & Data Access. From IT in Control to Business in Control. We go to a single global User ID One official, multiple unofficial BYOD will be UAD Home Automation is within Cloud Security is around Data Data in Rest is not an Issue Structured & Unstructured Data - PowerPoint PPT Presentation

Citation preview

• We go to a single global User ID• One official, multiple unofficial• BYOD will be UAD• Home Automation is within Cloud

• Security is around Data• Data in Rest is not an Issue• Structured & Unstructured Data

• Structured Data to stay on Premise• Unstructured Data to be on Internet

• Full Life Cycle & Distribution Management• Dimensions: Workflow, Access, Change & Distribution

• Deviation Workflow is key to identify incorrect usage• We need to describe/document all workflows• We need business approval for each step

•Data Security Trends & Data AccessFrom IT in Control to Business in Control

• Unaware• Is the specific data exchange announced to the Secure Cell

exchange mechanism?• Unexpected

• Does the data exchange fit in the workflow and is the data package expected in that context?

• Unauthorised• Is the initiator been authorised to execute the process or

access the system?• Unapproved

• Has the specific exchange been approved by the owner within the business?

•Data in Motion Rules or Questions 1 of 2All to be answered with a Yes

• Unknown• Are the source, Sender, Target and Receiver known?

• Unhealthy• Has the data any virus, worm, inline SQL or other

harmful content?• Unknown format

• Has the data any unexpected or unknown format?• Not meeting specifications

• Has the data the specifications as provided?

•Data in Motion Rules or Questions 2 of 2All to be answered with a Yes

•BYOD will be Use Any Device (UAD)Solving Home Automation & Business IT Security

•BYOD will be Use Any Device (UAD)Looking at accessing a Business Application

•Sharing Unnstructured DataStore it AnyWhere

Business IT Infrastructure

The Internet

External DocumentSharing

Document DisclosureService

3rd Party

FASFileSecure Key

IRM / DRMFileSecure

DocumentSharing

App

BusinessApproval

Documentto Share

Person Bound Device bound Location Bound Time Bound

•Data VirtualizationBefore

•Data VirtualizationAfter

•Data VirtualizationThinking on Service Model

• We go to a single global User ID• One official, multiple unofficial• BYOD will be UAD• Home Automation is within Cloud

• Security is around Data• Data in Rest is not an Issue• Structured & Unstructured Data

• Structured Data to stay on Premise• Unstructured Data to be on Internet

• Full Life Cycle & Distribution Management• Dimensions: Workflow, Access, Change & Distribution

• Deviation Workflow is key to identify incorrect usage• We need to describe/document all workflows• We need business approval for each step

•Data Security Trends & Data AccessFrom IT in Control to Business in Control

Recommended