O'Reilly logo

Enterprise Security: A Data-Centric Approach to Securing the Enterprise by Aaron Woody

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Developing supporting processes

Once the enterprise has decided that data classification must occur and action must be taken to prevent misuse and loss of data, there must be processes in place to ensure actions can be taken to enforce and assign accountability for data protection in accordance with enterprise policies and standards. It is good to have a technology that can help the organization, but if it is not operationalized properly it will become a burden and not provide the intended value, therefore undermining security initiatives for secure data storage, transmission, and use. Because data is at the center of the enterprise whether accessed by automated processes, applications, or humans, any changes to secure data must be a collaborative ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required