NextLabs routinely advises customers whose businesses handle Controlled Technical Data (CTD) such as ITAR, EAR, and data controlled by non-US Jurisdictions, to take a proactive, systematic approach to managing CTD throughout its lifecycle. Many of these enterprises have been in business for a number of decades, during which time they have created substantial CTD organically, and acquired additional CTD through various business transactions and transformations. The CTD routinely spans every type of electronic storage that has ever been used in the enterprise. A portion of this CTD, in some cases a substantial portion, has reached Legacy CTD status, which means that it is no longer actively used in the normal business operations of the enterprise. more “A Systematic Approach to Controlled Technical Data”
In their recent article on Big Data Management and Trends, Gartner identifies Enterprise Data as one of the key challenges facing organizations. The challenge is consolidating data from disparate sources across the extended enterprise and transforming it into critical business intelligence.
“You have many data disparate sources – from your enterprise’s ‘dark data’ and partner, employee, customer and supplier data to public, commercial and social media data – that you need to link and exploit to its fullest value.”
By Soujanya Madhurapantula, Senior Product Manager at NextLabs
I have had the same conversation with a lot of our customers… it keeps me awake at night.
Here is how many customers have described it to me:
We have millions of documents sitting in our enterprise application servers that we know are accessible to all our users. We are subject to regulations that require us to identify classified documents within these large sets of data, and segregate them into restricted servers. It is also important for us to restrict users from storing documents in the wrong servers. We are not sure how to segregate this data and put them into the right physical servers. This project is so complex, we do not even know where to start. more “Data Segregation: Missing piece in securing Enterprise Content”
By Mandy Pang, Senior Product Manager
SharePoint 2014 Key Security Takeaways – Our Top 5
- The conference attendees were buzzed on Attributes. Specifically, attribute-based security models for SharePoint. Role-based models are no longer making the cut – they leave collaboration vulnerable. Attribute-based solutions have fine-grained control.
- Clouds, of course was big, even bigger was the topic of protecting data in-transit to/from cloud and at rest in the cloud. Securing Office 365 was another hot topic. There was a great deal of discussion around the need for comprehensive end-to-end protection of intellectual property while satisfying the regulations set forth by a company’s compliance office. If the data or IP was to be accessed by or transmitted to an employee or contractor outside of the company’s firewall, then concern was expressed on how to safeguard the data.
- SPC14 was global with a good portion of attendees coming from Europe. Interestingly enough, a lot of European companies are looking to the U.S., particularly Silicon Valley, for solutions on automated information rights management.
- The architects, developers, and I.T. leaders with which I spoke were eager to learn about how to automate fine-grained access control for all work-product in a SharePoint environment.
- Extensibility was also discussed. At SPC14 the conversations were about information rights management extensibility – starting off with one Microsoft solution such as SharePoint, then extending the same information rights management solution to Office 365 and other products.