Custom Search

News World

Mar 29, 2008

Security and Compliance



Even though distributed enterprise data continues to grow at a rate of 50 to 75 percent a year, current data management solutions do not always provide adequate security, ensure compliance, or give IT administrators a comprehensive view into internal enterprise file data access rights. In addition, users often have difficulty knowing which resources they can access and where those resources are located.

Ask Permission or Beg Forgiveness?

Contrary to popular belief, the majority of security breaches come from within an enterprise, not from external threats. The lack of adequate file and resource access management tools—along with the fact that most security tools don't focus on internal threats—allows casual users to access confidential data, either accidentally or maliciously.

Set Boundaries for the Entire Enterprise

Ultimately, to improve file data security, a comprehensive file data management solution should provide users with customized views of accessible files and resources, enable IT administrators to establish enterprise-wide policies that streamline access control, and allow auditors to easily generate security permission reports for compliance purposes. What's more, automated provisioning and management of namespaces based on users, groups, and share permissions reduces administrative workload.

Data Management, Security, and Compliance Belong Together

IT organizations are discovering that separate tools for data management, security, and compliance just add layers of complexity that reduce effectiveness in all three areas. However, a file data management solution that incorporates security and compliance gives IT administrators and users a more manageable environment. It also improves productivity by enabling users to view resources in a logical, intuitive manner and allowing administrators to easily control and audit permissions.

Brocade File Services for Security and Compliance

  • Brocade File Lifecycle Manger (FLM)
  • Brocade MyView

No comments:

IT Conversations

Moneycontrol Latest News

Latest new pages on Computer Hope

Latest from Infoworld

Door Lock

Door Lock Import Top Door Lock from China Contact Quality Manufacturers Now