Monday, April 27, 2009

Can you say for sure who has access rights to your sensitive data?

Report cites major challenges involved in implementing an effective access governance framework
Network World logo

IT Best Practices Alert

NetworkWorld.com | Network Management Research Center | Update Your Profile


Sponsored by APC
rule

Optimizing the Data Center
The Editors of Network World present this Executive Guide: Taking Virtualization Up a Notch. Read it and find out what you need to know about virtualization as it creeps into every corner of your data center. Learn More!

rule

Spotlight Story
Can you say for sure who has access rights to your sensitive data?

Linda Musthaler By Linda Musthaler
In a Ponemon Institute survey of almost 700 experienced IT practitioners from U.S. business and governmental organizations, more than half of the respondents can't say with confidence that the process of assigning access rights is well-managed and tightly controlled within their organizations. That means there are a lot of application or data owners and caretakers that believe their business data can be accessed by people who probably shouldn't have access at all. Where do you fall in this spectrum, and what can you do about it? Read full story

Linda Musthaler is a principal analyst with Essential Solutions Corporation.

Related News:

Editor's note: We will be changing how we send out Network World newsletters over the next few weeks. To ensure future delivery of your newsletters, please add nww_newsletters@newsletters.networkworld.com to your e-mail address book or 66.186.127.216 to your white-list file. Thank you.

Making user access policies work for you Regardless of a company's size, how it manages employee turnover, staff mobility, and increased use of consultants and contractors are causes for concern by auditors in terms of how user access rights are handled.

IT pros, remote workers fess up to security lapses Do employees have too much access to business and Internet resources online? Two surveys just released suggest they do, warning that user access rights are poorly assigned and management should wake up to the problem as ...

EMC tackles inappropriate access to its own data EMC is one of the biggest names in the world of managing and storing information, but until just a few months ago the company didn't have a good system for governing employee access rights to unstructured data.

Podcast: Mistakes Companies Make During Layoffs Recent analysis from Telonu.com show that 88% of laid off employees had rated their layoff experiences as poor. Telonu.com CEO Bari Abdul discusses these findings and talks about the ways that companies are making mistakes when doing their layoffs in the current economy. (14:52).

Windows 7 - 71-680 Beta Exam Microsoft Subnet blogger Randy Muller reminds everyone that the first Windows 7 Beta exam - 71-680: TS Windows 7, Configuring will be available in a week for Beta testing. If you pass this test it will be added to your transcript and even better - it is free!

Solution Based Training - a leap of faith? Microsoft Subnet blogger Brian Egler is a big fan of solution-based training. This is where we learn about technology by actually building something useful to see the capabilities. Too many times we see training that is based on a single product and a series of features. But we fail to see the big picture.

Microsoft Learning wants you back Microsoft Subnet blogger Randy Muller came across two interesting offers on the Born to Learn site today. Both of which are well worth the read if you haven't taken a certification test lately.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Evolution of Ethernet
Evolution of Ethernet From 3Mbps over shared coax to 40/100Gbps over fiber…and beyond.

Apple iPhoneys: The 4G edition
Apple iPhoneys: The 4G editioniPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.

Sponsored by APC
rule

Optimizing the Data Center
The Editors of Network World present this Executive Guide: Taking Virtualization Up a Notch. Read it and find out what you need to know about virtualization as it creeps into every corner of your data center. Learn More!

rule

Cut Campus Network TCO by 50%.
Learn how to reduce your campus networks' TCO by up to 50% without compromising high performance, security or reliability. Juniper Networks shows you how to achieve unparalleled consistency, flexibility and efficiency for the lowest possible TCO.
Click here to register for this Live April 30 Webcast.


Metzler: 2009 Handbook of Application Delivery
Successful IT organizations must know how to make the right application delivery decisions in these tough economic times. This handbook authored by WAN expert Jim Metzler will help guide you.
Download now

 

04/27/09

Today's most-read stories:

  1. Some IT skills see pay hikes during downturn
  2. Researchers show how to take control of Windows 7
  3. The evolution of Ethernet
  4. Intel CPU cache poisoning: dangerously easy on Linux
  5. The downfall of Sun
  6. Einstein systems to inspect U.S. government's Internet traffic
  7. Microsoft posts historic revenue stumble in quarterly earnings
  8. Apple dismisses netbook trend
  9. Cloud computing a 'security nightmare,' says Cisco CEO
  10. Top 10 technology skills
  11. Notebook replaces trackpad with LCD panel


Network World on Twitter: Get our tweets and stay plugged in to networking news


EMA: Refining privilege access security.
Close the security gaps in high-privilege access control and authentication by selecting the right security products for the job. This whitepaper, "Resolving the Privilege Management Paradox," details how. EMA outlines how to find products that offer strong shared access management, better control and clear visibility and multifactor authentication.
Click to download.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment