Download presentation
Presentation is loading. Please wait.
Published byGeorgiana Porter Modified over 9 years ago
1
Security and the Questions Business Users should be asking the Techies
2
Protect web applications from attack Deploy a proven web application firewall (WAF) technology. The advantage Provide a powerful defence against common attacks, such as SQL injection and cross-site scripting. Streamline and automate regulatory compliance. Mitigate data risk. Your Question to techies What proven web application firewall (WAF) technology will you deploy to keep my site safe from attach?
3
Ensure access rights are aligned with business needs “Unstructured data now accounts for more than 90% of the digital universe.” – IDC 2011 Understand who has access to what data or, conversely, what data any given user or group can access, and how that access was assigned or inherited. Simplify the process of identifying where excessive access rights have been granted, if there are dormant users, and who owns each item and document. Help administrators and data owners establish a baseline snapshot of access rights and conduct rights reviews. Your Question to techies How do I aggregate permissions across the entire SharePoint deployment and automate the review process to keep rights aligned with business needs?permissions across the entire SharePoint deployment
4
Respond to suspicious activity in real time “96% of breaches were avoidable through simple or intermediate controls.” – Verizon Data Breach Report 2011 Native SharePoint activity auditing does not provide the ability to automatically analyse access activity and respond with an alert or block. Monitor, control and respond to suspicious activity in real time. Balance the need for trust and openness with security concerns. Your Question to techies What policy framework will you use to build rules across SharePoint’s web, file and database components to identify suspicious behaviour and complement native access controls?
5
Address compliance mandates “60% of organisations have yet to bring SharePoint into line with existing data compliance policies.” – AIIM 2011 Native SharePoint activity monitoring lacks an intuitive, easy-to-use interface for reporting and analytics. Without a third-party solution, businesses must first decode SharePoint’s internal representation of log data before they can access meaningful information. Generate compliance reports on time and tailored to each recipient’s needs. Drill down, filter and organise data. Enrich native data with relevant information such as type of data, department and data owner. Your Question to techies What enterprise-class technology that combines permissions and activity details to automate compliance reporting, is available as add on to native SharePoint?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.