View
35
Download
2
Category
Tags:
Preview:
DESCRIPTION
Data Security Trends & Data Access. From IT in Control to Business in Control. We go to a single global User ID One official, multiple unofficial BYOD will be UAD Home Automation is within Cloud Security is around Data Data in Rest is not an Issue Structured & Unstructured Data - PowerPoint PPT Presentation
Citation preview
• We go to a single global User ID• One official, multiple unofficial• BYOD will be UAD• Home Automation is within Cloud
• Security is around Data• Data in Rest is not an Issue• Structured & Unstructured Data
• Structured Data to stay on Premise• Unstructured Data to be on Internet
• Full Life Cycle & Distribution Management• Dimensions: Workflow, Access, Change & Distribution
• Deviation Workflow is key to identify incorrect usage• We need to describe/document all workflows• We need business approval for each step
•Data Security Trends & Data AccessFrom IT in Control to Business in Control
• Unaware• Is the specific data exchange announced to the Secure Cell
exchange mechanism?• Unexpected
• Does the data exchange fit in the workflow and is the data package expected in that context?
• Unauthorised• Is the initiator been authorised to execute the process or
access the system?• Unapproved
• Has the specific exchange been approved by the owner within the business?
•Data in Motion Rules or Questions 1 of 2All to be answered with a Yes
• Unknown• Are the source, Sender, Target and Receiver known?
• Unhealthy• Has the data any virus, worm, inline SQL or other
harmful content?• Unknown format
• Has the data any unexpected or unknown format?• Not meeting specifications
• Has the data the specifications as provided?
•Data in Motion Rules or Questions 2 of 2All to be answered with a Yes
•BYOD will be Use Any Device (UAD)Solving Home Automation & Business IT Security
•BYOD will be Use Any Device (UAD)Looking at accessing a Business Application
•Sharing Unnstructured DataStore it AnyWhere
Business IT Infrastructure
The Internet
External DocumentSharing
Document DisclosureService
3rd Party
FASFileSecure Key
IRM / DRMFileSecure
DocumentSharing
App
BusinessApproval
Documentto Share
Person Bound Device bound Location Bound Time Bound
•Data VirtualizationBefore
•Data VirtualizationAfter
•Data VirtualizationThinking on Service Model
• We go to a single global User ID• One official, multiple unofficial• BYOD will be UAD• Home Automation is within Cloud
• Security is around Data• Data in Rest is not an Issue• Structured & Unstructured Data
• Structured Data to stay on Premise• Unstructured Data to be on Internet
• Full Life Cycle & Distribution Management• Dimensions: Workflow, Access, Change & Distribution
• Deviation Workflow is key to identify incorrect usage• We need to describe/document all workflows• We need business approval for each step
•Data Security Trends & Data AccessFrom IT in Control to Business in Control
Recommended