O'Reilly logo

Practical Guide to Enterprise Architecture, A by Elias K. Jo, Vikas Sharan, James Linn, Michael E. Stevens, Scott W. Ambler, James McGovern

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Data Security

The data that many organizations hold within the confines of their information technology systems is their most valuable asset. This holds especially true for financial services, banks, and insurance verticals. So far, this chapter has focused on the value of metadata repositories within the enterprise. To build upon this concept, we now focus on the data security architecture that should, ideally, extend the information contained with the repository.

Many large enterprises have groups of employees who are responsible for IT security. Some have even gone as far as creating a chief security officer position. Even with a large staff, organizations still experience breaches and lack any resources that allow them to quickly identify ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required