The Structured Future of Data Access Governance

The Structured Future of Data Access Governance

When Data Access Governance (DAG) was first conceived, the logical place to implement such access control was on unstructured data such as shared file systems, collaborative platforms (e.g. SharePoint), and email systems. These massive unstructured data repositories seemingly contained the bulk of the corporate data, often quoted as representing well over 80% of all corporate data. Moreover, these data repositories appeared to be growing exponentially and therefore were the logical choice as the initial place for such extra controls. And…

Read More Read More

What is the Right to be Forgotten?

What is the Right to be Forgotten?

The Right to be Forgotten is defined as “the right to silence on past events in life that are no longer occurring.” The right to be forgotten leads to allowing individuals to have information, videos, or photographs about themselves deleted from certain internet records so that they cannot be found by search engines. As so many different compliance regulations roll out across the world, it’s important to understand the requirements from an organizational perspective as well as differences between regulations…

Read More Read More

Challenges with Native File System Access Auditing

Challenges with Native File System Access Auditing

Note: This blog is the first in a 4 part series, followed by a webinar to review all the challenges with File System access auditing. Sign up now for the webinar “Challenges with Relying on Native File System Logging“. Register now. An organization’s ability to efficiently and effectively capture file level access is paramount in order to not only proactively prevent data breaches or attacks, but to respond in the event your data has already been compromised. Often times, we…

Read More Read More

Part 5: Do Too Many Users Have Privileged Access Rights?

Part 5: Do Too Many Users Have Privileged Access Rights?

What Keeps You Up at Night? Insights from a Ponemon Data Access Governance Study: Do Too Many Users Have Privileged Access Rights? Do your users have privileged access rights they don’t need? According to a recent Ponemon report on the State of Data Access Governance, plenty of organizations are granting privileged access rights for “no apparent reason”. Others are even granting privileged access to every user at a certain job level, even if it is not required to do their…

Read More Read More

Part 4: Are You Securing Active Directory?

Part 4: Are You Securing Active Directory?

What Keeps You Up at Night? Insights from a Ponemon Data Access Governance Study: Are You Securing Active Directory? As an IT professional, you’ve likely made a number of different investments to protect the data within your organization. In order to help with the provisioning of user access rights, you may have invested in an Identity and Access Management (IAM) solution. You’ve likely adopted a SIEM and Data Loss Prevention (DLP) platform as well. And you should!  These technologies provide…

Read More Read More

Part 3: Are Users Putting Your Sensitive Data at Risk?

Part 3: Are Users Putting Your Sensitive Data at Risk?

What Keeps You Up at Night? Insights from a Ponemon Data Access Governance Study: Are Users Putting Your Sensitive Data at Risk? Previously in this blog series, we talked about understanding your organization’s data footprint. We also discussed methodologies for identifying where sensitive data exists. At this point, you’re probably realizing how much data lives across your organization and wondering… who is accessing all this information? The concern now isn’t solely about the data itself, but rather that users within…

Read More Read More

Part 2: Is Your Unstructured Data Safe?

Part 2: Is Your Unstructured Data Safe?

What Keeps You Up at Night? Insights from a Ponemon Data Access Governance Study: Is Your Unstructured Data Safe? In Part 1 of this blog series, we uncovered a lurking fear among administrators everywhere: the unknown of unstructured data. Over 60% of people do not know where their unstructured data lives across their organization. This is particularly scary because unstructured data accounts for over 80% of all data within any organization. Fortunately, as we discussed previously, there are tried and…

Read More Read More

What Keeps You Up at Night? Insights from a Ponemon Data Access Governance Study

What Keeps You Up at Night? Insights from a Ponemon Data Access Governance Study

Part 1: Do You Know Where Your Data Lives? Thinking of all the data that lives across your organization? It’s a spooky thought. According to a recent Ponemon study on the current state of Data Access Governance (DAG), 62% of people have no confidence or little confidence of where users are storing unstructured data. On the surface, it might seem like a daunting task to figure out where all your data lives. However, with the right tools and a plan,…

Read More Read More

Governing Data Access to Meet Security, Compliance and Operational Standards

Governing Data Access to Meet Security, Compliance and Operational Standards

Part 6: Governing Data Access to Meet Security, Compliance and Operational Standards In this 6th and final post of our “Moving from Checkbox Compliance to True Data Security” blog series, we’re going to see how all the work we’ve done in discovering where our data lives, collecting and analyzing relevant information about our data, monitoring activity, and restructuring access rights will pay off in a major way. As you’ve likely gathered already, “Governance” is a pretty important component of a…

Read More Read More

Restructuring Permissions to Achieve a Least Privilege Access Model

Restructuring Permissions to Achieve a Least Privilege Access Model

Part 5: Restructuring Permissions to Achieve a Least Privilege Access Model In part 4 of this 6-part blog series, ‘Moving from Checkbox Compliance to True Data Security,’ we discussed why it’s important to monitor file share activity before you begin to take any action so you can get a full understanding of: Who is leveraging their access privileges What types of operations each user performs Who is creating or contributing the most amount of content If you’ve completed that step and…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.