Data Security Trends & Data Access
-
Upload
helen-mayo -
Category
Documents
-
view
36 -
download
2
description
Transcript of Data Security Trends & Data Access
![Page 1: Data Security Trends & Data Access](https://reader035.fdocuments.net/reader035/viewer/2022062422/56812cee550346895d91b5df/html5/thumbnails/1.jpg)
• We go to a single global User ID• One official, multiple unofficial• BYOD will be UAD• Home Automation is within Cloud
• Security is around Data• Data in Rest is not an Issue• Structured & Unstructured Data
• Structured Data to stay on Premise• Unstructured Data to be on Internet
• Full Life Cycle & Distribution Management• Dimensions: Workflow, Access, Change & Distribution
• Deviation Workflow is key to identify incorrect usage• We need to describe/document all workflows• We need business approval for each step
•Data Security Trends & Data AccessFrom IT in Control to Business in Control
![Page 2: Data Security Trends & Data Access](https://reader035.fdocuments.net/reader035/viewer/2022062422/56812cee550346895d91b5df/html5/thumbnails/2.jpg)
• Unaware• Is the specific data exchange announced to the Secure Cell
exchange mechanism?• Unexpected
• Does the data exchange fit in the workflow and is the data package expected in that context?
• Unauthorised• Is the initiator been authorised to execute the process or
access the system?• Unapproved
• Has the specific exchange been approved by the owner within the business?
•Data in Motion Rules or Questions 1 of 2All to be answered with a Yes
![Page 3: Data Security Trends & Data Access](https://reader035.fdocuments.net/reader035/viewer/2022062422/56812cee550346895d91b5df/html5/thumbnails/3.jpg)
• Unknown• Are the source, Sender, Target and Receiver known?
• Unhealthy• Has the data any virus, worm, inline SQL or other
harmful content?• Unknown format
• Has the data any unexpected or unknown format?• Not meeting specifications
• Has the data the specifications as provided?
•Data in Motion Rules or Questions 2 of 2All to be answered with a Yes
![Page 4: Data Security Trends & Data Access](https://reader035.fdocuments.net/reader035/viewer/2022062422/56812cee550346895d91b5df/html5/thumbnails/4.jpg)
•BYOD will be Use Any Device (UAD)Solving Home Automation & Business IT Security
![Page 5: Data Security Trends & Data Access](https://reader035.fdocuments.net/reader035/viewer/2022062422/56812cee550346895d91b5df/html5/thumbnails/5.jpg)
•BYOD will be Use Any Device (UAD)Looking at accessing a Business Application
![Page 6: Data Security Trends & Data Access](https://reader035.fdocuments.net/reader035/viewer/2022062422/56812cee550346895d91b5df/html5/thumbnails/6.jpg)
•Sharing Unnstructured DataStore it AnyWhere
Business IT Infrastructure
The Internet
External DocumentSharing
Document DisclosureService
3rd Party
FASFileSecure Key
IRM / DRMFileSecure
DocumentSharing
App
BusinessApproval
Documentto Share
Person Bound Device bound Location Bound Time Bound
![Page 7: Data Security Trends & Data Access](https://reader035.fdocuments.net/reader035/viewer/2022062422/56812cee550346895d91b5df/html5/thumbnails/7.jpg)
•Data VirtualizationBefore
![Page 8: Data Security Trends & Data Access](https://reader035.fdocuments.net/reader035/viewer/2022062422/56812cee550346895d91b5df/html5/thumbnails/8.jpg)
•Data VirtualizationAfter
![Page 9: Data Security Trends & Data Access](https://reader035.fdocuments.net/reader035/viewer/2022062422/56812cee550346895d91b5df/html5/thumbnails/9.jpg)
•Data VirtualizationThinking on Service Model
![Page 10: Data Security Trends & Data Access](https://reader035.fdocuments.net/reader035/viewer/2022062422/56812cee550346895d91b5df/html5/thumbnails/10.jpg)
• We go to a single global User ID• One official, multiple unofficial• BYOD will be UAD• Home Automation is within Cloud
• Security is around Data• Data in Rest is not an Issue• Structured & Unstructured Data
• Structured Data to stay on Premise• Unstructured Data to be on Internet
• Full Life Cycle & Distribution Management• Dimensions: Workflow, Access, Change & Distribution
• Deviation Workflow is key to identify incorrect usage• We need to describe/document all workflows• We need business approval for each step
•Data Security Trends & Data AccessFrom IT in Control to Business in Control