10 Things IT Should Be Doing (but isn't) by VaronisWelcome, Guest      sign in | register | help

   Search for:        Advanced Search
Research Abstract
10 Things IT Should Be Doing (but isn't)
by Varonis

> View this now

Published on: September 2008
Type of content: WHITE PAPER
Format: Adobe Acrobat (.pdf)
Length: 2 pages
Price: FREE

Until organizations start to shift the responsibility to business data owners, it is IT that has to enforce rules for who can access what on shared file systems and keep those strictures current through data growth and user role changes.

There are, of course, best practices that when repeated often and consistently can ensure nearly optimum mapping of users to data since least-privilege access can significantly reduce the risk of data loss. However, for most organizations following unstructured data protection "musts" is very challenging because the data is being generated far too quickly, so even if the organization is small the data it creates and preserves can quickly outpace the IT department's ability to keep up with protections and access control lists. Nevertheless, here are the ten must-do actions for maximizing unstructured data protection.

> View Company Report
> View all content by this company
> Return to Search Results

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints

  TechTarget - The IT Media ROI Experts