Data scrutiny

Share this article:
Data scrutiny
Data scrutiny
Instituting controls on all the data passing through an enterprise is a daunting challenge, even for seasoned security professionals. Getting a handle on transmissions over the network and the precious corporate assets stored in databases has become a lot trickier as more and more data is created and shared. Further, developments which push corporate data outside the perimeter - such as use of mobility technology, external social networking and public cloud services - have heightened the need for data-specific security. The good news is that the C-suite, owing to data breach regulations and penalties, is more aware about the need for diligent security processes, and there are tools available for IT security administrators to assist in encryption and automate logging tasks.
Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Research

Sign up to our newsletters

POLL

More in Research

2014 eBook on Encryption

2014 eBook on Encryption

The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.

PCI 2014: From compliance to security

PCI 2014: From compliance to security

The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.

Is SIEM up to the challenge?

Is SIEM up to the challenge?

This latest ebook from SC Magazine paints a lucid picture of today's SIEM capabilities and challenges to help you decide what might be the right implementation for your organization.