data protection 1110Instituting controls on all the data passing through an enterprise is a daunting challenge, even for seasoned security professionals. Getting a handle on transmissions over the network and the precious corporate assets stored in databases has become a lot trickier as more and more data is created and shared. Further, developments which push corporate data outside the perimeter – such as use of mobility technology, external social networking and public cloud services – have heightened the need for data-specific security. The good news is that the C-suite, owing to data breach regulations and penalties, is more aware about the need for diligent security processes, and there are tools available for IT security administrators to assist in encryption and automate logging tasks.
Please login or register first to view this content.