Data Security, Governance, and Privacy

  • Source: Guardium
  • Written By:
  • Published:
  • (Originally Published On:) )
To meet regulatory requirements such as the US Sarbanes-Oxley Act (SOX), IT managers are now receiving the board-level visibility and budgets required to improve enterprise data security. For example, companies need secure and verifiable audit trails that track the activities of database administrators (DBAs) and other privileged insiders. But have you considered the seven essential elements of database security?

Featured Software Research:

Analyzing Big Data: The Path to Competitive Advantage

Big data is different from ordinary database information because of the massive volume, the variety, and the velocity. And the data mix now includes product reviews, video, blogs, tweets, and more. But the biggest current challenge may be to articulate a compelling business case for using big data. Find out how companies in various industries are finding value in the data they have already collected and making it actionable. Read More

Convergence, Collaboration, and Culture: The Evolution of Governance, Risk, and Compliance

  • Source: IBM
  • Written By:
  • Published:
Traditional governance, risk, and compliance (GRC) programs are siloed initiatives that are not equipped to manage the complexity of the dynamic modern regulatory and compliance environment. Organizations thus need to adopt a programmatic approach and tightly integrate risk management initiatives with ongoing business processes. BI and reporting can help, as well as provide a powerful mechanism for gaining a deep understanding of key factors that impact corporate performance. Read More

You may also be interested in these related documents:

Governance from the Ground Up: Launching Your Data Governance Initiative

Although most executives recognize that an organization’s data is corporate asset, few organizations how to manage it as such. The data conversation is changing from philosophical questioning to hard-core tactics for data governance initiatives. This paper describes the components of data governance that will inform the right strategy and give companies a way to determine where and how to begin their data governance journeys. Read More

Data Masking: Strengthening Data Privacy and Security

Many business activities require access to real production data, but there are just as many that don’t. Data masking secures enterprise data by eliminating sensitive information, while maintaining data realism and integrity. Many Fortune 500 companies have already integrated data masking technology into their payment card industry (PCI) data security standard (DSS) and other compliance programs—and so can you. Read More

Content Security for the Next Decade

The need to share information is greater than ever, with increasingly complex company-wide processes. The movement of digital data, both within a company and across its porous boundaries, carries more and more risk as regulations for data protection and personal privacy are tightened. Discover how to stay ahead of the competition by putting the technology in place that allows you to share content widely, but safely. Read More
comments powered by Disqus