sponsored by dataguise, Inc.
Posted:  01 Jun 2010
Published:  01 Jun 2010
Format:  PDF
Length:  14  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

Enterprise applications are the repositories for a wide variety of sensitive data. HR systems can contain information about employees and their dependents such as salaries, taxpayer IDs, names and addresses, and medical histories. Sales automation applications contain customer information such as credit card numbers, card expiration dates, addresses and telephone numbers. Supply chain applications contain proprietary information such as pricing and sales margins while financial applications contain financial performance data. The need to satisfy requirements for regulatory compliance, data theft prevention and sound corporate governance make it imperative that organizations implement the necessary controls to prevent exposure of this sensitive information.

Most enterprises take measures to protect the sensitive data in their production environments. These can include technical controls such as firewalls, two-factor authentication and columnlevel access controls, as well as policy controls such as user training, data handling procedures and regular audits. However, data from production applications is frequently copied to support application development, testing, QA and pilots. As a result, sensitive data managed in these applications can be inadvertently propagated throughout the extended enterprise and exposed to a wide variety of individuals who may not have a business need to access this information.






BROWSE RELATED RESOURCES
Application Infrastructure | Application Performance Management | Data Loss Prevention (DLP) | Data Security | Enterprise Applications Software | Performance Testing

View All Resources sponsored by dataguise, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement