• Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Special Offers
Business Intelligence Info
  • Business Intelligence
    • BI News and Info
    • Big Data
    • Mobile and Cloud
    • Self-Service BI
  • CRM
    • CRM News and Info
    • InfusionSoft
    • Microsoft Dynamics CRM
    • NetSuite
    • OnContact
    • Salesforce
    • Workbooks
  • Data Mining
    • Pentaho
    • Sisense
    • Tableau
    • TIBCO Spotfire
  • Data Warehousing
    • DWH News and Info
    • IBM DB2
    • Microsoft SQL Server
    • Oracle
    • Teradata
  • Predictive Analytics
    • FICO
    • KNIME
    • Mathematica
    • Matlab
    • Minitab
    • RapidMiner
    • Revolution
    • SAP
    • SAS/SPSS
  • Humor

Content-based security continues to plague companies

March 25, 2016   BI News and Info
TTlogo 379x201 Content based security continues to plague companies

As cloud computing, mobility and globalization have become further entrenched in organizations, content-based security risks have only proliferated, leaving companies to try and keep pace.

Content-based security issues can include assessing the various locations in which content can reside, given the cloud and mobility, and how best to secure that data. Organizations also must remain cognizant of avoiding creating undue data access hurdles.

Content compliance and data sovereignty have also become issues for companies as they seek to traverse the new landscape, in which a document may reside in a data center in a country whose content security laws differ from the country in which the company generating the content resides. Companies subject to regulatory compliance and data sovereignty requirements may need to consider how to best secure their content in new ways.

“There is absolutely a new world emerging,” Shawn Shell, vice president at Hitachi Consulting, said. “While cloud isn’t necessarily new, large companies — especially in regulated industries — are adopting data centers that they don’t directly own and control. At the regulatory level, governments around the world are struggling a bit, trying to figure out things like jurisdiction and data sovereignty, which is a deep issue. And PCs are no longer the ruling device in this ecosystem. We have devices that are very mobile. They are being carried on a person from jurisdiction to jurisdiction.”

The issue, Jonathan Bordoli, a solutions architect at Hitachi Consulting, noted, is that companies need to think about workers’ complex identities within and outside the four walls of a company to ensure that they have the right access to the right data. Employees must be able to view the documents they need to do their jobs, but they shouldn’t be privy to personally identifiable information if they aren’t in a financial department or human resources.

“First and foremost, it’s about someone’s identity,” Bordoli said. “They have an identity in an HR solution and one in a content management solution, and several outside the company in Google and Facebook. And so the first thing we need to think about is, ‘What is Jonathan’s identity, where is he known and how do we know him?’ And the next thing is, given the myriad of identities, how do I map those identities to the content sources — Salesforce, Oracle, a myriad of solutions, etc. We need to think of rules-based solutions that allow a mapping of an identity that I can take up through a token or a login, through to the information — is that security, is it encrypted — through to applying security rights as it’s stored in a document system.”

Bordoli also talked about the role that cloud computing and compliance play in relation to content-based security. “An opportunity that the cloud gives us is the chance to nominate where data should be stored. That’s one way to manage the situation. Cloud gives us the opportunity to regionalize data,” he explained.

Interestingly, Bordoli noted that cloud computing gives companies greater flexibility, whereas Shell discussed the increasing complexity introduced by the technology. “It’s fascinating that two divergent opinions with two people sitting three feet apart can be the right answer to the same question,” Shell said.

For more, check out the podcast above.

Let’s block ads! (Why?)


ECM, collaboration and search news and features

Companies, Contentbased, continues, plague, Security
  • Recent Posts

    • Ba’al comes to CPAC, Ted Cruz jokes about his Cancun trip
    • Optimizing data migration/integration with Power Platform
    • AI Weekly: Biden calls for $37 billion to address chip shortage
    • NOT WHAT THEY MEANT BY “BUILDING ON THE BACKS OF….”
    • Why Healthcare Needs New Data and Analytics Solutions Before the Next Pandemic
  • Categories

  • Archives

    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015
    • October 2015
    • September 2015
    • August 2015
    • July 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
© 2021 Business Intelligence Info
Power BI Training | G Com Solutions Limited