Download presentation
Presentation is loading. Please wait.
Published byAlvin Walton Modified over 9 years ago
1
We go to a single global User ID One official, multiple unofficial BYOD will be UAD Home Automation is within Cloud Security is around Data Data in Rest is not an Issue Structured & Unstructured Data Structured Data to stay on Premise Unstructured Data to be on Internet Full Life Cycle & Distribution Management Dimensions: Workflow, Access, Change & Distribution Deviation Workflow is key to identify incorrect usage We need to describe/document all workflows We need business approval for each step Data Security Trends & Data Access From IT in Control to Business in Control
2
Unaware Is the specific data exchange announced to the Secure Cell exchange mechanism? Unexpected Does the data exchange fit in the workflow and is the data package expected in that context? Unauthorised Is the initiator been authorised to execute the process or access the system? Unapproved Has the specific exchange been approved by the owner within the business? Data in Motion Rules or Questions 1 of 2 All to be answered with a Yes
3
Unknown Are the source, Sender, Target and Receiver known? Unhealthy Has the data any virus, worm, inline SQL or other harmful content? Unknown format Has the data any unexpected or unknown format? Not meeting specifications Has the data the specifications as provided? Data in Motion Rules or Questions 2 of 2 All to be answered with a Yes
4
BYOD will be Use Any Device (UAD) Solving Home Automation & Business IT Security
5
BYOD will be Use Any Device (UAD) Looking at accessing a Business Application
6
Sharing Unnstructured Data Store it AnyWhere
7
Data Virtualization Before
8
Data Virtualization After
9
Data Virtualization Thinking on Service Model
10
We go to a single global User ID One official, multiple unofficial BYOD will be UAD Home Automation is within Cloud Security is around Data Data in Rest is not an Issue Structured & Unstructured Data Structured Data to stay on Premise Unstructured Data to be on Internet Full Life Cycle & Distribution Management Dimensions: Workflow, Access, Change & Distribution Deviation Workflow is key to identify incorrect usage We need to describe/document all workflows We need business approval for each step Data Security Trends & Data Access From IT in Control to Business in Control
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.