Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Varonis gives its top predictions for Data Governance in 2012

November 2011 by Varonis

Varonis Systems Inc. announced its top-level predictions for the Data Governance field in 2012. David Gibson, Director of Technical Marketing and Strategic Sales at Varonis said: "We have just been through a turbulent year for data owners and next year will be no different. To try and cut through the data jungle we are concentrating on the four major areas that will be problems in 2012."

1) Secure Collaboration Goes Viral in 2012 - it will be the year data owners take back access control decisions from IT, and demand automation to analyse data, make better decisions, and eliminate costly, ineffective manual processes.

Gibson said: "Just as organisations demand automation to understand their sales trends, customer base, financial habits, and other critical processes, they will demand automation to understand their data-where it should reside, who should have access to it, and how it’s used. Organisations will realize that continuing on the current path will have devastating results for their businesses - doing nothing is not an option anymore."

2) Big data analytics will expand its focus to the biggest data of all-unstructured information sitting on file servers, NAS devices, and in email systems.

Gibson said: "Effective data governance requires harnessing the power of metadata through intelligent automation. It is not surprising that industry experts are now saying that the same kind of automation is necessary for more than good governance.

In order to harness the power of "Big Data," you’ll need to analyse and look for patterns in how and when these massive amounts of data are used, who uses it, in what sequence, and what it contains in order to effectively run a data-driven organisation. Widely known fact: the majority of big data in the enterprise is unstructured rather than structured."

3) We will see some IT departments taking drastic measures, such as shutting down "at risk" servers or access to e-mail if the proper audit trails are not in place.

Gibson said "One organisation we deal with has recently enforced a policy of - no visible audit trail, no email! Their iron rule is - if the auditing is not available in their email system they aren’t allowed to use email. So, in other words, if the communications can’t be traced and audited then they may shut down the email server. It hasn’t happened yet, but 2012 may be the year servers get shut down and email withdrawn if no audit trail of access activity exists."

4) Internal threats will still be a major worry for corporates in 2012 despite the demise of Wiki Leaks

Gibson said: "When it comes to data loss, threats from inside the organisation have become as worrisome, if not more so, than those from outside. In many of the security breaches in 2011, employees or contractors were able to delete or download thousands of files without raising concerns because often no one was able to determine what sensitive data they had access to and secure it before information could be stolen, view an audit trail of what they actually did access after the fact, and certainly not hear any alarms go off while the breach was in progress, when access activity was unusual. Corporates will have to address this issue properly in 2012."


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts