data security trends & data access

10
We go to a single global User ID One official, multiple unofficial BYOD will be UAD Home Automation is within Cloud Security is around Data Data in Rest is not an Issue Structured & Unstructured Data Structured Data to stay on Premise Unstructured Data to be on Internet Full Life Cycle & Distribution Management Dimensions: Workflow, Access, Change & Distribution Deviation Workflow is key to identify incorrect usage We need to describe/document all workflows We need business approval for each step Data Security Trends & Data Access From IT in Control to Business in Control

Upload: helen-mayo

Post on 31-Dec-2015

35 views

Category:

Documents


2 download

DESCRIPTION

Data Security Trends & Data Access. From IT in Control to Business in Control. We go to a single global User ID One official, multiple unofficial BYOD will be UAD Home Automation is within Cloud Security is around Data Data in Rest is not an Issue Structured & Unstructured Data - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Data Security Trends & Data Access

• We go to a single global User ID• One official, multiple unofficial• BYOD will be UAD• Home Automation is within Cloud

• Security is around Data• Data in Rest is not an Issue• Structured & Unstructured Data

• Structured Data to stay on Premise• Unstructured Data to be on Internet

• Full Life Cycle & Distribution Management• Dimensions: Workflow, Access, Change & Distribution

• Deviation Workflow is key to identify incorrect usage• We need to describe/document all workflows• We need business approval for each step

•Data Security Trends & Data AccessFrom IT in Control to Business in Control

Page 2: Data Security Trends & Data Access

• Unaware• Is the specific data exchange announced to the Secure Cell

exchange mechanism?• Unexpected

• Does the data exchange fit in the workflow and is the data package expected in that context?

• Unauthorised• Is the initiator been authorised to execute the process or

access the system?• Unapproved

• Has the specific exchange been approved by the owner within the business?

•Data in Motion Rules or Questions 1 of 2All to be answered with a Yes

Page 3: Data Security Trends & Data Access

• Unknown• Are the source, Sender, Target and Receiver known?

• Unhealthy• Has the data any virus, worm, inline SQL or other

harmful content?• Unknown format

• Has the data any unexpected or unknown format?• Not meeting specifications

• Has the data the specifications as provided?

•Data in Motion Rules or Questions 2 of 2All to be answered with a Yes

Page 4: Data Security Trends & Data Access

•BYOD will be Use Any Device (UAD)Solving Home Automation & Business IT Security

Page 5: Data Security Trends & Data Access

•BYOD will be Use Any Device (UAD)Looking at accessing a Business Application

Page 6: Data Security Trends & Data Access

•Sharing Unnstructured DataStore it AnyWhere

Business IT Infrastructure

The Internet

External DocumentSharing

Document DisclosureService

3rd Party

FASFileSecure Key

IRM / DRMFileSecure

DocumentSharing

App

BusinessApproval

Documentto Share

Person Bound Device bound Location Bound Time Bound

Page 7: Data Security Trends & Data Access

•Data VirtualizationBefore

Page 8: Data Security Trends & Data Access

•Data VirtualizationAfter

Page 9: Data Security Trends & Data Access

•Data VirtualizationThinking on Service Model

Page 10: Data Security Trends & Data Access

• We go to a single global User ID• One official, multiple unofficial• BYOD will be UAD• Home Automation is within Cloud

• Security is around Data• Data in Rest is not an Issue• Structured & Unstructured Data

• Structured Data to stay on Premise• Unstructured Data to be on Internet

• Full Life Cycle & Distribution Management• Dimensions: Workflow, Access, Change & Distribution

• Deviation Workflow is key to identify incorrect usage• We need to describe/document all workflows• We need business approval for each step

•Data Security Trends & Data AccessFrom IT in Control to Business in Control