The Imperative for Effective Data Flow Governance in Response to Data Security, Risk Mitigation, and Compliance Requirements

Thumb original whitepaper the imperative for effective data flow governance axway ovum whitepaper final

Ovum Studie: So reduzieren Sie das Risiko von Datenlecks

Im Rahmen einer Studie der Analysten von Ovum wurden hunderte IT-Entscheidungsträger weltweit dazu befragt, wie effektiv Datenflüsse in ihrem Unternehmen gesteuert werden.
Hier einige Ergebnisse:
· 23 % der Befragten haben innerhalb der letzten drei Jahre einen Sicherheitsaudit nicht bestanden.
· 17 % waren unsicher, ob sie einen derartigen Audit mithilfe ihrer vorhandenen FTP-Lösungen bestehen könnten.
· 4 % der FTP-gestützten Dateiübertragungen schlagen fehl – gleichzeitig basieren 32 % aller geschäftskritischen Prozesse auf FTP.

Da Datenlecks durchschnittlich Kosten in Höhe von 3 Millionen US-Dollar verursachen, ist das damit einhergehende Risiko beträchtlich. Trotzdem setzen immer noch 56 % der Befragten Einzellösungen in den Bereichen On-Premise Application Integration, B2B Integration und Cloud Integration ein. Somit wird eine reibungslose Datenflusssteuerung unmöglich gemacht.

Angesichts der immer komplexeren Anforderungen an Datensicherheit, Governance und Compliance überdenken viele IT-Teams aktuell ihre Integrationsstrategien.

Lesen Sie den Ovum-Bericht The Imperative for Effective Data Flow Governance in Response to Security, Risk Mitigation and Compliance Requirements, um Ihre aktuelle Sicherheitsposition eingehend zu bewerten und zu erfahren, wie Sie erforderliche Maßnahmen einleiten können.

View whitepaper
Ldo logo b2bkh axway
Date: 23 October 2014, 12:51 pm   |   Provider: Axway GmbH   |   Size: 694 KB   |   Language: English
Keep Reading:
Thumb original definitive guide to soar ebook

Definitive Guide to SOAR

Cybersecurity organizations have their work cut out for them. As the last line of defense in the fight against cyberthreats, they stand between their corporations’ valuable IT assets and cyberattackers. Today’s cyberattackers are more formidable and more sophisticated than ever before. Attackers are resourceful and ruthless in their efforts to steal data, commit fraud, abuse resources, and disrupt services.

Working accurately and quickly when the corporation is at risk and tensions are high is no easy feat, but it can be done, and this book ...

To the download
Thumb original uk defeating user threats with ueba

Defeating threats through user data: Applying UEBA to protect your environment

You’re facing a constant barrage of threats, some of which you don’t even know exist. The reality is that your users are behind many threats and breaches — whether maliciously or accidentally. Case in point: 69 per cent of organiations reported a recent insider data exfiltration attempt, and 28 per cent of breaches involved internal actors.1 As the typical point of entry for an attack, users are a difficult vector to monitor and secure. To confront the tidal wave of attacks, you need to hone your attention on users by harnessing the power of us ...

To the download
Thumb original uk security operations maturity model white paper

Security Operations Maturity Model

This white paper explores how to assess and evolve the principle programmes of the security operations centre (SOC): threat monitoring, threat hunting, threat investigation and incident response. LogRhythm developed the Threat Lifecycle Management (TLM) framework to help organisations ideally align technology, people and process in support of these programmes.

The TLM framework defines the critical security operations technological capabilities and workflow processes that are vital to achieve an efficient and effective SOC. LogRhythm’s Secu ...

To the download
Thumb original uk swift white paper

LogRhythm for SWIFT Customer Security Controls Framework

Society for Worldwide Interbank Financial Telecommunication (SWIFT) facilitates a huge number of financial transactions every day via the secure messaging system it provides to its members. In addition to banks, the system is also used by other major financial players. SWIFT does not maintain accounts or handle funds, but its network moves huge sums every day. Member institutions, if compromised, can be used to send fake messages that other members act upon in good faith. Such activity has resulted in both attempted and successful transfers of ...

To the download
Thumb original uk uws threat hunting 101 white paper

Threat Hunting 101: 8 threat hunts you can do with available resources

Threat hunting is the process of proactively searching for malware or attackers that reside on your network. The generally accepted method is to leverage a security information and event management (SIEM) solution that centrally collects log data from disparate sources — endpoints, servers, firewalls, security solutions, antivirus (AV), and more — providing visibility into network, endpoint, and application activity that might indicate an attack.

In this white paper, we will discuss the minimum toolset and data requirements you need for succ ...

To the download