10 Things IT Should Be Doing (but isn't)
sponsored by Varonis

Until organizations start to shift the responsibility to business data owners, it is IT that has to enforce rules for who can access what on shared file systems and keep those strictures current through data growth and user role changes.

There are, of course, best practices that when repeated often and consistently can ensure nearly optimum mapping of users to data since least-privilege access can significantly reduce the risk of data loss. However, for most organizations following unstructured data protection "musts" is very challenging because the data is being generated far too quickly, so even if the organization is small the data it creates and preserves can quickly outpace the IT department's ability to keep up with protections and access control lists. Nevertheless, here are the ten must-do actions for maximizing unstructured data protection.

(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
Available Resources from Varonis
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement