WHITE PAPER. Enterprise Information Protection - The Impact of Big Data INTELLIGENT BUSINESS STRATEGIES
|
|
- Ferdinand Hines
- 8 years ago
- Views:
Transcription
1 INTELLIGENT BUSINESS STRATEGIES WHITE PAPER Enterprise Infrmatin Prtectin - The Impact f Big Data By Mike Fergusn Intelligent Business Strategies March 2013 Prepared fr:
2 Table f Cntents Intrductin... 4 What is Enterprise Infrmatin Prtectin?... 5 Where Are We in Data Audit, Access Security and Prtectin Tday?... 8 Requirements fr Enterprise Infrmatin Prtectin? Infrmatin Classificatin Requirements Data Landscape Requirements User Requirements Device Requirements Change Management Requirements An Intrductin T Big Data Types f Big Data What Is Big Data? New Big Data Analytical Wrklads Technlgy Optins fr End-t-End Big Data Analytics The New Enterprise Analytical Ecsystem The Impact f Big Data n infrmatin Prtectin Using Big Data Analytics fr Security Analysis New Security Requirements T Prtect Infrmatin In Big Data Envirnments Implementing Infrmatin Prtectin in a Big Data Enterprise Using IBM Technlgies The IBM Big Data Platfrm Hadp - IBM InfSphere BigInsights IBM InfSphere BigInsights n IBM System zenterprise IBM PureData System fr Analytics (pwered by Netezza technlgy) IBM InfSphere Warehuse, Smart Analytics System and IBM PureData System fr Operatinal Analytics IBM DB2 Analytic Acceleratr (IDAA) IBM Big Data Platfrm Acceleratrs IBM Infrmatin Management fr the Big Data Enterprise IBM Prducts fr Enterprise Infrmatin Prtectin IBM System z In A IBM Big Data Envirnment Delivering Security Fr Big Data In a System z Envirnment Securing Infrmatin n IBM InfSphere Streams Securing Infrmatin n IBM System z InfSphere Warehuse and IBM DB2 Analytics Acceleratr Securing and Redacting Infrmatin n IBM BigInsights and IBM System z29 Securing and Redacting Infrmatin During Smart Cnslidatin Delivering Security Frm Big Data In a System z Envirnment Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 2
3 Cnclusin Appendices - Key Requirements fr Prtecting Data and Preventing Security Breaches.. 32 Data Landscape Requirements Sftware Access Requirements Envirnment Requirements Usage Requirements Vulnerability Assessment Requirements Preventin Requirements Enfrcement Requirements Perfrmance Requirements Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 3
4 INTRODUCTION The shift frm centralised cmputing in late ʻ80s and early ʻ90s increased cmplexity and made systems harder t manage The emergence f distributed cmputing led t a significant increase in distrubuted data Tday data is mre distributed than ever and ften still nt under cntrl Securing and prtecting ʻat rinkʼ sensitive data in a distributed envirnment is a majr challenge Big Data adds mre cmplexity andintrduces new requirements t keep data prtected In the late 1980ʼs and early 1990ʼs we saw a fundamental shift in cmputing when cmpanies started t mve away frm centralised systems twards client server cmputing and distributed systems. In truth hwever, what happened was nt s much distributed systems but mre like ʻstandalneʼ autnmus systems. Each system was designed t supprt a specific business functin and was cmprised f an applicatin deplyed n its wn servers with its wn data. The arrival f multiple servers in the enterprise spawned a new prblem hw t manage this new mre cmplex envirnment. This resulted in agent-based distributed systems management sftware emerging t help systems administratrs use the pwer f the netwrk t manage multiple servers acrss the rganisatin. While this helped peple manage and mnitr multiple systems, ne ʻsideeffectʼ f the rise f distributed cmputing that was nt well addressed was that the prblem f distributed data. The impact f distributed data was significant in that data became difficult t share, keep cnsistent and synchrnised especially as users f the different applicatins started t maintain data in different applicatin specific databases. The result was that data became much mre cmplex t manage. It needed t flw between systems t execute business prcesses. File transfers rcketed and demand grew fr data t be integrated t supprt crss-functinal management reprting and analysis. Batch jbs grew at a very rapid rate mving data between systems and the era f the data-warehuse was brn. Tday, we have mved n at pace, t web and mbile client enabled multi-tier cmputing, business prcess management and service riented architecture. But still the prblem f distributed data remains. If anything it is getting wrse. Clud cmputing is nw upn us, meaning that business applicatin systems nw exist utside the enterprise as well as inside it. Multiple data warehuses have als emerged as line f business has taken hld f business intelligence and analytics. Data warehuse appliances have emerged; creating yet mre data stres and fr many, master and reference data is still nt under cntrl. We are at the pint nw where data is heavily fractured making it harder and harder t manage. This is particularly the case fr security where ʻat riskʼ data needs t be prtected. The challenge is significant. And yet despite this challenge, anther wave f cmputing has arrived. That wave is Big Data, which is sweeping the industry by strm. Given the cmplexity already upn us in managing data and managing infrmatin security in a distributed cmputing envirnment, what then is the impact f big data n the enterprise? What is big data and hw much f a challenge des it pse t the already stretched need t enfrce enterprise infrmatin prtectin? This paper lks at this prblem by first defining what enterprise infrmatin security and privacy invlves, then lking at requirements that need t be met befre intrducing big data and identifying what impact this has n thse requirements. It then takes a lk f it at what ne vendr, IBM, is ffering in the area f big data and what it is trying t d t help custmers bring big data technlgies n bard while cntinuing t prtect and secure their infrmatin. Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 4
5 WHAT IS ENTERPRISE INFORMATION PROTECTION? Sensitive data culd be widely distributed making it difficult t manage and prtect In an infrmatin gvernance white paper I authred in Nvember , I utlined the infrmatin prtectin challenge. A variatin f Figure 1 in that paper is shwn in Figure 1 belw. This has been expanded in the areas f risk preventin and change management t shw the verall cmplexity that mst enterprises are facing when it cmes t tackling enterprise infrmatin prtectin. It is withut dubt a daunting prblem and well wrthy f a dedicated team t deal with it. Enterprise infrmatin prtectin requires a hlistic and systematic apprach t keep data prtected Infrmatin needs t be classified as sensitive in rder t knw what t prtect Infrmatin needs t be prtected acrss applicatins and envirnments with regular vulnerability tests t assess risk Figure 1 Lking at Figure 1 in a clckwise directin frm the bx entitled ʻInfrmatinʼ, tackling the challenge f enterprise infrmatin prtectin invlves: Classifying infrmatin t define what is sensitive and what is nt Understanding the existing data landscape t determine where that sensitive infrmatin is lcated in rder t prtect it Understanding the existing applicatin prtfli and the infrmatin these applicatins access and maintain Ensuring enterprise infrmatin prtectin cvers multiple envirnments Accunting fr different types f users and the devices they chse t access applicatins and infrmatin with Uphlding cmpliance regulatins and legislatin Assessing vulnerability t infrmatin security/privacy breaches 1 Infrmatin Gvernance: Audit and Prtectin n the IBM System z Platfrm Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 5
6 Need t ensure that change des nt cmprmise security Defining plicies, prcesses, rles, tests and actins needed t prevent breaches in security Applying thse plicies t enfrce infrmatin security Managing change s that infrmatin security is nt cmprmised by changes made Maintaining infrmatin availability In additin t this, enfrcing enterprise infrmatin security and privacy als invlves integratin with ther infrastructure sftware. A gd example f this is crprate LDAP directries, which are needed t help enfrce rlebased access t infrmatin. Need t identify where ʻat riskʼ data is lcated Bth n-premises and clud based data may need t be prtected Users need t be identified and risk assessed Devices need t be cnsidered Privileged users must als be mnitred In rder fr enterprise infrmatin prtectin t be implemented, means defining what infrmatin has t be prtected and then lcating that data t be able t secure it. Fr mst rganisatins, that data is stred in databases and files scattered acrss a highly distributed landscape f multiple DBMS and file systems that run n a range f perating systems n servers in multiple lcatins. This includes bth n-premise and clud based platfrms. The fact that sensitive data culd be widely distributed acrss this landscape increases the risks f security being cmprmised. Finding, cntrlling access t and prtecting sensitive data cntent in this kind f envirnment is a real challenge withut the right tls t help yu. In terms f users, identity management, user risk classificatin, authenticatin, authrisatin and multi-device access security are all very much part f an enterprise infrmatin prtectin initiative t cntrl user access. Bth desktp and mbile devices need t be cnsidered with the added cmplicatin that mbile devices can be easily lst r stlen. Types f user are als imprtant when it cmes t infrmatin access and authrisatin. This wuld include external users such as custmers, partners and suppliers, internal business users and IT prfessinals. Sme IT prfessinals are ʻprivilegedʼ in that they have administrative pwer that allws them access t ptentially any data including sensitive custmer, emplyee and financial data. Fr this reasn, privileged IT prfessinals themselves need t be mnitred and duties separated t cntrl what they can and cannt d withut authrisatin. IT develpers wh build systems and IT peratins staff wh manage and run thse systems als need t be taken int accunt. IT develpers ften wrk with prductin data during develpment and testing. Therefre infrmatin has t be secured in develpment, testing and prductin envirnments. An enterprise infrmatin secirity strategy is needed Als infrmatin prduced frm accessing sensitive infrmatin may itself cntain subsets f that sensitive infrmatin. An example f this is reprting. Therefre sensitive infrmatin in shared reprts needs t be remved r redacted. If analytics wrk n sensitive data then again the infrmatin shuld remain prtected while still allwing reprts t be prduced and retain cntext. Enterprise infrmatin prtectin has t be hlistic, cvering all bases t avid infrmatin risks that might breach legislatin, cause nn-cmpliance with regulatins r adversely impact the rganizatin's ability t meet its wn business bjectives. It invlves being able t classify and lcate Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 6
7 Define what yu want t achieve and hw yu plan t measure success Establish resuces, define prcesses and plicies t prtect data Chse technlgies t help yu and assess hw gd yu are at prtecting infrmatin tday sensitive data, assess the vulnerability f the rganisatin t ptential breaches in security, implement preventin measures t avid putting data at risk, mnitr events that may signal a prblem and respnd in a timely manner t minimise the impact f these events when they ccur. Access cntrl, sensitive data masking and netwrk encryptin are central t it. In rder t d this, cmpanies need an enterprise infrmatin prtectin strategy t prtect infrmatin as it flws thrughut the enterprise. This enterprise infrmatin prtectin strategy needs t include: A set f bjectives Metrics that shw if yu are n track t meeting the bjectives Targets that need t be reached t prtect specific data Peple accuntable fr reaching infrmatin prtectin targets Infrmatin security initiatives t ensure targets are reached Peple, prcesses and technlgies t be used t prtect data Security reprts that need t be created Cmpanies then need t identify what the infrmatin risks are and what cntrls are in place t secure and prtect infrmatin t reduce these risks. These cntrls may be in the frm f access apprval prcesses, data masking and encryptin plicies, auditing, backup plicies, retentin plicies, and ther checks and balances. If a vilatin ccurs, then a damage limitatin prcess is needed t manage lsses and manage changes t prcedures t avid the same thing happening again. Als there need t be prcess in place t re-test security when changes are made s that risk expsure is nt increased as a result f the changes. Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 7
8 WHERE ARE WE IN DATA AUDIT, ACCESS SECURITY AND PROTECTION TODAY? Given the cmplexity f the infrmatin security challenge that mst cmpanies are facing, hw far alng are we in implementing enterprise security? A recent survey 2 f 9600 respnses in 138 cuntries asked the questin What prcess infrmatin security safeguards des yur rganisatin have in place?. The survey revealed the fllwing: Surveys indicate that there is still a lt f wrk still t be dne in prtecting at risk infrmatin 38% f respndents have n verall infrmatin strategy in place Many cmpanies lack an integrated apprach t enterprise infrmatin security Overall infrmatin security strategy in place 62% An established security baseline fr partners, custmers and 39.9% suppliers Centralized security infrmatin management prcess in place 43.3% Standards/ prcedures fr infrastructure deplyment established 43.4% Identity management strategy 41% Business cntinuity/ disaster recvery plans 39.1% Standards and prcedures in place fr prtable device security 40.5% Authenticatin based n user risk classificatin 34.4% Wireless security standards in place 42.8% Emplyee security awareness training running? 43% Clud security strategy 25.6% Mbile device security strategy in place 36.9% Security strategy fr emplyee use f persnal devices 42.9% What this survey clearly shws that there is much mre wrk t be dne with 38% f the respndents having n verall infrmatin prtectin strategy in place at all. Als, with the exceptin f the 62% figure indicating that respndents d have an verall infrmatin security strategy in place, all the ther percentage figures are belw 50%. The weakest areas are clud security, which is an area where applicatin usage is grwing in many rganisatins. The survey results als shws that mre thught is needed arund user security t authenticate internal and external users based n risk. Mre als needs t be dne arund mbile device security, identity management and n establishing a security baseline fr partners, custmers and suppliers. One area that stands ut in this study is that less than half f the cmpanies surveyed have a centralized security infrmatin management prcess in place. This indicates that the apprach taken t implementing infrmatin security is distributed and may nt be integrated in many rganisatins even thugh 62% f the 9600 respndents surveyed stated that they have an infrmatin security strategy in place. An integrated apprach t enterprise infrmatin prtectin taking int accunt all the areas highlighted in Figure 1 is needed fr cmprehensive prtectin f sensitive infrmatin. 2 Reference: PWC 2012 Glbal State f Infrmatin Security, Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 8
9 Transactin prcessing systems are a classic place where sensitive data resides Mainframe systems like IBM System z are imprtant platfrms t include in a infrmatin prtectin prgram The switch t the web as the preferred way f transacting business has seen transactin vlumes grw rapidly Mainframe ecmmerce systems have als becme an majr surce f big data in the frm f web lgs When it cmes t implementatin, the vast majrity f infrmatin classified as sensitive in mst rganisatins resides in ʻcre platfrmʼ databases. This includes sensitive data in: Cre peratinal transactin prcessing databases and files Enterprise data warehuses and data marts including data warehuse appliances Transactin prcessing systems are a classic place where sensitive data (e.g. custmer financial infrmatin) resides. Many f these systems run n mainframes making them an imprtant platfrm t include within the scpe f an enterprise infrmatin prtectin prgram. But what is the link t big data? The answer lies in the relatinship that mainframes and transactin prcessing have with the web. A majr strength f mainframe servers is their track recrd n very high availability and transactin prcessing. This is a key reasn why they are ften chsen as a platfrm fr e-cmmerce, and custmer self-service web cmputing. Mainframes als scale well in supprt f high transactin rates. Fr mst rganisatins, the attractin f the web is twfld. First, the web ffers glbal reach and secndly it reduces cst f perating by facilitating the intrductin f self-service transactin prcessing. This has given rise t the need fr 24x365 system availability. Als, the grwth in mbile device usage and the switch t n-line cmmerce as a preferred way f transacting business has seen transactin vlumes grwing at a phenmenal rate. The result is that increasing amunts f sensitive data are being captured in transactin system databases bth n-premise (ften n mainframes) and in the clud. In additin a side effect f skyrcketing n-line activity is the grwth in web lg data, which has been nthing shrt f spectacular. Web lgs are a ppular type f big data. They are ften analysed t derive additinal custmer insight that can be laded int existing data warehuses t enrich what we already knw. Given that web sites generating these web lgs are ften n mainframes, the mainframe has becme a majr surce f bth ʻbig transactinʼ structured data and multistructured (web lgs) big data. Bth f these need t be secured. Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 9
10 REQUIREMENTS FOR ENTERPRISE INFORMATION PROTECTION? Having defined what enterprise infrmatin prtectin is and lked at where rganisatins are in terms f tackling this challenge, the next questin t ask is What are the requirements fr enterprise infrmatin prtectin?. These requirements need t cver the cmplete range f cnsideratins shwn Figure 1 t prevent security breaches. Much f this list f requirements has already been defined in an infrmatin gvernance white paper 3 fcussed n infrmatin audit and prtectin. These are shwn in the Appendices at the back f this paper fr cnvenience. Rather than repeat thse requirements here, it is wrth adding additinal requirements t that list t cver everything shwn in Figure 1 in this paper that is nt cvered in the afrementined paper. The reader is asked t cmbine the riginal list f requirements shwn in the Appendices with the additin requirements fr a cmplete set. These additinal requirements are listed under the bx headings shwn in Figure 1 fr cnvenience. INFORMATION CLASSIFICATION REQUIREMENTS Structured infrmatin Need t classify data yu want t prtect as sensitive Need t attach plicies t sensitive data t gvern hw t prtect it It shuld be pssible t define cmmn data definitins fr all master data (e.g. custmer, prduct, asset, site, supplier etc.), reference data (cde sets), transactin types, hierarchies and metrics in a business glssary and then classify what data is sensitive It shuld be pssible t define and attach plicies t individual data item definitins and/r cmplete data entities t cntrl data privacy and access security fr master data, reference data, transactin data, relatinship data (hierarchies) and metrics Unstructured data Sme Unstructured cntent may als need t be prtected It shuld be pssible t define standard dcument and cntent types fr the rganizatin t describe what a dcument/image/rich media file is e.g. fr dcuments the dcument types culd include a supplier cntract, a marketing brchure, a custmer cntract, a equipment maintenance manual etc. It shuld be pssible t define an enterprise taxnmy fr the rganizatin t describe what a dcument/image/rich media file is abut e.g. a brchure is abut an insurance 3 Infrmatin Gvernance: Audit and Prtectin n the IBM System z Platfrm, Fergusn, Octber 2011 Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 10
11 prduct, a maintenance manual is abut a specific make and mdel f asset (equipment) It shuld be pssible t define and attach plicies t individual dcument and cntent items t cntrl privacy and access security assciated with specific dcument/cntent types abut a specific tpic e.g. t secure access t cntracts assciated with a specific custmer, financial reprts assciated with a business unit, r annual review dcuments assciated with all emplyees DATA LANDSCAPE REQUIREMENTS Sme data streams may be cnsidered sensitive USER REQUIREMENTS Need t manage users t gvern what infrmatin they can access DEVICE REQUIREMENTS It shuld be pssible t secure and prtect data in mtin even thugh it has nt yet been stred It shuld be pssible t centrally manage the identity f individual users r federate identity management s that a single view f all users accessing applicatins, infrmatin and sftware tls inside and utside the rganizatin can be seen t prevent creatin duplicate users and s that authenticatin and authrizatin can be managed centrally Device security Central management f mbile devices allws mbile infrmatin t be prtected It shuld be pssible t centrally manage mbile device security by creating cnfiguratin prfiles cntaining device security plicies, VPN cnfiguratin infrmatin, Wi-Fi settings, APN settings, accunt settings, mail settings, and certificates that permit mbile smart phnes and tablets t wrk with yur enterprise systems. It shuld be pssible t enfrce device authenticatin t secure access t a mbile device It shuld be pssible t cnfigure memry limits n mbile devices t limit the amunt f infrmatin they are allwed t hld n the device Mbile applicatin security Cntrl ver access t mbile applicatins and functinality is needed It shuld be pssible t enfrce mbile applicatin authenticatin via user ID and passwrd s that users have t lg in t applicatins that prvide access t sensitive data It shuld be pssible t enfrce rle-based access t applicatin functinality frm any device s that the user is nly authrized t use specific applicatin functinality It shuld be pssible t allw access t specific applicatins frm a mbile device fr a set perid after which access t thse applicatins autmatically expires Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 11
12 Data transmissin security Encrypt sensitive data flwing ver the netwrk t/frm any device It shuld be pssible t encrypt sensitive data flwing ver a public r private netwrk t a desktp r mbile device r encrypt the data in the data stre and decrypt befre sending nly if a user is authrized t see it Device Infrmatin security Need t prtect infrmatin being shared with thers frm any device It shuld be pssible t clear mbile device caches f applicatin specific infrmatin immediately an applicatin clses r after a defined perid It shuld be pssible fr a user t cntrl what subset(s) f infrmatin ther users r user grups are allwed t see when sharing that infrmatin frm a mbile device It shuld be pssible t enfrce rle-based access t applicatin and infrmatin services frm any device s that the user is nly authrized t see specific infrmatin It shuld be pssible t allw access t specific infrmatin frm a mbile device fr a set perid after which access t that infrmatin autmatically expires Security mnitring and audit It shuld be pssible t lg all mbile security vilatins and warnings fr auditing and reprting purpses CHANGE MANAGEMENT REQUIREMENTS Apprval prcesses help gvern wh can change plicies and privileges that impact n infrmatin security It shuld be pssible t define prcesses that require apprval when changes are made t: Infrmatin classificatins Security and privacy plicies Schema Data replicatin and synchrnizatin Access and manipulatin privileges Applicatin functinality Vulnerability testing is fundamental t identifying database risk and t ensuring that changes dnʼt increase the risk f a security breach It shuld be pssible t run vulnerability testing befre and after changes are made t ensure that security risk expsure has nt been increased as a result f the changes made. It shuld als be pssible t run vulnerability testing t lk fr database vulnerabilities when changes have nt been made. It shuld be pssible t c-rdinate cntrlled reversal f changes t infrmatin classificatin, schema, privileges and plicies t previus versins f privileges if changes result in security breaches Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 12
13 AN INTRODUCTION TO BIG DATA The spectrum f analytical wrklads is nw s brad that it cannt all be dealt with in a single enterprise data warehuse Nw that we have lked at infrmatin security requirements, the next step is t lk at big data and the impact this has n infrmatin security. Fr many years, cmpanies have been building data warehuses t analyse business activity and prduce insights fr decisin makers t act n t imprve business perfrmance. These traditinal analytical systems capture, clean, transfrm and integrate data frm multiple peratinal systems befre lading it int a data warehuse. Hwever, even thugh this traditinal envirnment cntinues t evlve, many new mre cmplex types (varieties) f data have nw emerged that businesses want t analyse t enrich what they already knw. In additin, the rate (velcity) at which much f this new data is being created and/r generated and the vlumes f data being analysed is far beynd what we have ever seen befre. TYPES OF BIG DATA Web lgs and scial netwrk interactin data High vlume transactin data Sensr data Text Analytical requirements and data characteristics will dictate the technlgy deplyed The mst ppular new types f data that rganisatins want t analyse include: Web data - e.g. web lgs, e-cmmerce lgs and scial netwrk interactin data Industry specific big transactin data - e.g., Telc call data recrds (CDRs), ge-lcatin data and retail transactin data Machine generated/sensr data - t mnitr everything frm mvement, temperature, light, vibratin, lcatin, airflw, liquid flw and pressure. RFIDs are anther example. Text - e.g. frm archived dcuments, external cntent surces r custmer interactin data (including s fr sentiment analysis) Custmers and prspects are creating huge amunts f new web data in the frm f scial netwrk interactins. A gd example is Twitter data. In additin, n-line news items, weather data, cmpetitr web site cntent, and even data marketplaces are nw available as candidate data surces fr business cnsumptin. Transactin data may als be archived t a lw cst big data stre Within the enterprise, web lgs are grwing as custmers switch t n-line channels as their preferred way f transacting business and interacting with cmpanies. That means that transactin data is n the increase. Large vlumes f structured data shuld therefre als be cnsidered a type f big data. Archived data warehuse data is als being resurrected fr analysis and increasing amunts f sensr netwrks and machines that generate data are being deplyed t instrument and ptimise business peratins. The result is an abundance f new data surces, rapidly increasing data vlumes and a flurry f new data streams that all need t be analysed. Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 13
14 WHAT IS BIG DATA? Big Data is abut high vlume transactin prcessing and advanced analytics Big data can be brken int tw areas: Big Data Transactin Prcessing (a.k.a. Big transactins) Big Data Analytics Big Data transactin prcessing is abut extreme vlumes f transactins that may update data in relatinal DBMSs, NSQL DBMSs r file systems. Typically, relatinal DBMSs are used as it is ften the case that s-called ACID prperties are fund missing in many NSQL DBMSs. This is nly a prblem if it is unacceptable t lse a transactin e.g. a Banking depsit Big Data is NOT just abut data vlumes Big Data can be assciated with bth structured and multistructured data Big Data Analytics is abut advanced analytics n traditinal structured and multi-structured data 4. It is a term assciated with the new types f wrklads and underlying technlgies needed t slve business prblems that we culd nt previusly supprt due t technlgy limitatins, prhibitive cst r bth. Big data analytics is therefre nt just abut data vlumes. It may be the case that data vlumes are mderate but that data cmplexity (variety f data type) and analytical cmplexity are significant. Big Data analytics is abut analytical wrklads that are assciated with sme cmbinatin f data vlume, data velcity (the rate at which data is generated) and data variety that may include cmplex analytics and cmplex data types. It can als be assciated with bth structured and multi-structured data. NEW BIG DATA ANALYTICAL WORKLOADS The emergence f new data surces and the need t analyse everything frm live data streams in real time t huge amunts f unstructured cntent tgether with traditinal structured cntent, has made many businesses realise that they are nw in an era where the spectrum f analytical wrklads is s brad that it cannt all be dealt with using a single enterprise data warehuse. New big data analytical wrklads have emerged that have taken us beynd the traditinal data warehuse. These are: The data warehuse is an intregal part f the extended analytical envirnment 1. Analysis f data in mtin 2. Explratry analysis f un-mdelled multi-structured data 3. Accelerating ETL and analytical prcessing f un-mdelled data t enrich data in a data warehuse r analytical appliance 4. Analysis f relatinship in a graph 5. Cmplex analysis f structured data 4 Multi-structured data can be semi-structured like r XML r unstructured data like text and vide Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 14
15 6. The strage and re-prcessing f archived data TECHNOLOGY OPTIONS FOR END-TO-END BIG DATA ANALYTICS New technlgies need t be added t traditinal envirnments t supprt big data analytical wrklads T supprt these new analytical wrklads, additinal technlgies have emerged beynd the traditinal data warehuse RDBMS. These include: Stream prcessing sftware Analytical RDBMSs Hadp slutins (culd be n-premise r in the clud) NSQL DBMSs e.g. graph DBMSs Stream prcessing sftware supprts realtime analytical applicatins designed t cntinuusly ptimise business prtatins There are multiple strage ptins fr supprting big data analytics n data at rest Sensitive data may reside n any and all f these new big data platfrms and s will need t be prtected here als Stream prcessing sftware, is used t supprt the autmatic analysis f data-in-mtin in real-time r near real-time. Its purpse is t identify meaningful patterns in ne r mre event streams and trigger actin t respnd t them as quickly as pssible. This sftware therefre prvides the ability t build real-time analytic applicatins whse jb it is t cntinuusly keep different parts f a business peratin ptimized. All f the ther technlgies mentined 5 supprt big data wrklads that analyse data at rest where data is stred prir t analysis taking place. Analytical requirements and data characteristics will dictate the technlgy deplyed in a big data envirnment. Hwever, the fllwing table tries t match the each wrklad analysing big data at rest t the apprpriate data strage platfrm. Big Data Analytical Wrklad Explratry analysis f un-mdelled multistructured data e.g. web lgs, unstructured cntent, filtered sensr data, Cmplex analysis f structured data r fr data warehuses that have ʻlightʼ mixed wrklads Strage and re-prcessing f archived data Accelerating ETL prcessing f structured and unmdelled data Scial Graph Link analysis Big Data Strage Platfrm Hadp Analytic RDBMS Appliance Hadp Hybrid: Hadp and Analytical DBMS NSQL Graph DBMS THE NEW ENTERPRISE ANALYTICAL ECOSYSTEM A new extended analytical envirnment is nw needed Lking at these technlgies, it is nt difficult t cnclude that dealing with big data invlves the use f multiple underlying technlgy platfrms each f which is ptimised fr specific big data analytical wrklads. These platfrms are in additin t the data warehuse. Big Data analytics can hwever include the traditinal data warehuse envirnment because sme 5 Fr mre infrmatin n these technlgies please refer t the paper Architecting a Big Data Platfrm fr Analytics, Fergusn, September 2012 Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 15
16 analytical wrklads may need bth traditinal and wrklad ptimised platfrms t slve a business prblem. Traditinal data warehuse envirnments need t be extended t supprt big data analytical wrklads Infrmatin management has a majr rle in keeping this envirnment integrated Figure 2 shws the extended end-t-end analytical envirnment needed t supprt the big data analytical wrklads discussed as well as traditinal ad hc query prcessing, analysis and reprting. Big Data des nt replace a data warehuse. On the cntrary, the data warehuse is an integral part f the extended analytical envirnment. Sme refer t this new envirnment as the ʻenterprise analytical ecsystemʼ r ʻlgical data warehuseʼ. It can be seen frm this architecture that event stream prcessing f datain-mtin can be dne n sensr data, r indeed any ther event data surce like financial markets fr example. When variatins in event data ccur, event-prcessing sftware analyses the business impact and can take actin if required. Filtered events can then be picked up by infrmatin management sftware and laded int Hadp fr subsequent histrical analysis. If any further insight is prduced using batch map/reduce analytical prcessing, that insight may then be fed int a data warehuse. Fr un-mdelled multi-structured data, this data can be laded directly int Hadp using infrmatin management sftware where data scientists can cnduct explratry batch analysis n this data in sandbxes. Alternatively search-based BI tls can be used t analyse the data using indexes built in Hadp with map/reduce utilities. If data scientists prduce any valuable insight, it can als be laded int the data warehuse t enrich the structured data already there and s make this insight available t traditinal BI tl users. Cmplex analysis f structured data is undertaken n analytical DBMS appliances using in-database analytics. Again, if any insight is prduced r any new predictive/statistical mdels created, then this can be mved int the data warehuse fr use by infrmatin cnsumers in reprts, dashbards and screcards. Strage and re-prcessing f archived data can be managed in Hadp with batch map/reduce applicatins r the afrementined frnt-end tls used t analyse this data. In-Hadp analytics (custm r pre-built) can be used as needed. Finally with respect t accelerating ETL prcessing n structured and un-mdelled data, infrmatin management tls can be used t explit Hadp analytics and/r in-database analytics in analytical DBMS appliances (r bth) fr this purpse. Traditinal data warehuse wrklads cntinue as nrmal. Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 16
17 Data virtualizatin simplifies access t multiple analytical data stres Master data management prvides cnsistent master data t all analytical platfrms Figure 2 Given that this new extended analytical envirnment has a mix f traditinal data warehuse and big data wrklad ptimised systems, there is als a need t simplify access t these data stres fr users with traditinal frntend tls. This is achieved thrugh data virtualisatin sftware, which is designed t present data as if it is available in a single data stre. Behind the scenes it uses pushdwn ptimizatin and ther advanced ptimizatin techniques t answer business queries. Als master data is available t feed cnsistent dimensin data t all analytical envirnments. Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 17
18 THE IMPACT OF BIG DATA ON INFORMATION PROTECTION Nw that we have intrduced big data and understd what it is, the next questin is What is the impact f big data n infrmatin prtectin? Big data has a prfund impact n infrmatin security New surces f infrmatin and new data stres New tls t access infrmatin Gverned sandbxes are needed by data scientists wishing t cnduct investigative analysis n big data New data surces f ptentially sentitive infrmatin may need t be prtected Prtecting big data is mre challenging because it may be multi-structured and held in varius frmats Als cpies f sensitive structured data may be mved t these new platfrms The impact f big data in the enterprise, is that intrduces: New surces f infrmatin Data in mtin as well as additinal data at rest Multiple analytical data stres in a mre cmplex analytical envirnment (with sme f these data stres pssibly being in the clud) Big Data Platfrm specific strage e.g. Hadp Distributed File System (HDFS), Analytical RDBMS Clumnar Data Stre, r a NSQL Graph database New analytical wrklads Sandbxes fr data scientists t cnduct explratry analytics New tls and applicatins t access and analyse big data Mre cmplex infrmatin management in a big data envirnment t Supply data t multiple analytical data stres Mve data between big data analytical systems and Data Warehuses All this impacts n data security. The data landscape is nw mre cmplex particularly because each big data analytical platfrm may have a different way t stre data ften with n standards in sight in this fast mving area f technlgy. New surces data need t be secured and prtected acrss hetergeneus big data platfrms. This includes big transactin data and e-cmmerce lgs in particular. Rich sets f structured and multi-structured data brught int a big data stre fr analysis culd easily attract cyber criminals. An example might be data surces like custmer data, lcatin sensr data frm smart phnes, custmer interactin data, n-line transactin data and web lgs all being brught int Hadp fr analysis. Security arund big data is therefre an issue. Big Data adds data-in-mtin and new file based analytical data stres t the data landscape thereby making it mre cmplex t manage security. Figure 2 shws that master data can be supplied t Big Data platfrms t analyse big data by varius dimensins. This data may be supplied in varius frmats depending n the big data platfrm it is being laded int. Fr example, data laded int Hadp, is likely t be supplied in files t distribute acrss a Hadp cluster. Sensitive data may als be taken frm traditinal data warehuses int these envirnments t help with big data batch analytics. New analytical wrklads mean new applicatins running n platfrms like Hadp and NSQL databases as well as analysis f data-in-mtin. Als new tls are accessing this data in ne r mre analytical data stres. Access cntrl envirnments therefre needs t be Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 18
19 New pwer users want access t a secure envirnment t cnduct explratry analysis n big data Sandbxes need t be prtected extended t manage access t big data analytical tls and applicatins as well as data held in new Big Data platfrms In additin a new type f user has emerged - the data scientist. Data scientists are highly skilled pwer users wh need a secure envirnment where they can explre un-mdelled multi-structured data and/r cnduct cmplex analyses n large amunts f structured data. Creating a prject envirnment where small teams f data scientists can wrk and cllabrate in ʻsandbxesʼ n Hadp and/r analytical RDBMS appliances is very much a part f big data analytics. Hwever sandbx creatin and access needs t be cntrlled, as des data ging int and cming ut f these sandbxes. USING BIG DATA ANALYTICS FOR SECURITY ANALYSIS It shuld be pssible t explit big data platfrms t analyse security infrmatin t help prtect data Finally, there is anther side t this. Big Data analytics may well be able t help fight the security prblem by being used t detect cyber crime. Analysing data in mtin t identify fraud is ne example f this. Als analysis f access activity t see what users access what data and what have they dne t that data. Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 19
20 NEW SECURITY REQUIREMENTS TO PROTECT INFORMATION IN BIG DATA ENVIRONMENTS New security requirments are needed t prtect and manage access t big data Based n what have learned, the intrductin big data int the enterprise demands that the requirements defined earlier fr enterprise infrmatin prtectin, be extended. This is t mve beynd structured data in existing transactin prcessing systems and data warehuses t als prtect data in big data envirnments. Nte that it is pssible t define requirements fcussed n infrmatin prtectin fr big data envirnments and infrmatin prtectin frm big data envirnments. The frmer is assciated with prtecting infrmatin in big data envirnments while the latter is abut using real-time big data analytics t prduce insights t help prtect infrmatin in big data and traditinal envirnments. The fllwing requirements are assciated with prtecting infrmatin in big data envirnments and shuld be added t thse already dcumented: It shuld be pssible t classify data streams cntaining sensitive data assciated with analyzing Big data in mtin as ʻat riskʼ and t knw where in a data stream that sensitive data resides It shuld be pssible t define r classify which files being laded int a Big Data platfrm (e.g. Hadp HDFS) cntain sensitive data and t knw where n a Big Data platfrm that data resides It shuld be pssible t define and apply plicies that encrypt sensitive structured data and multi-structured Big data in mtin and sensitive structured data and multi-structured big data at rest Need t encrypt and redact sensitive data n Big Data platfrms It shuld be pssible t define and apply plicies that redact sensitive structured data and multi-structured big data in mtin and sensitive structured data and multi-structured big data at rest in any big data analytical data stre It shuld be pssible t encrypt and redact structured sensitive data and multi-structured data when mving this data between big data and traditinal data stres during analytical prcessing Need t flag sentitive data files in Hadp and ther NSQL data stres Need t cntrl wh can access explratry ʻsandbxesʼ built n Hadp r ther analytical DBMSs It shuld be pssible t cntrl access t all sensitive data files stred in file based big data analytical data stres It shuld be pssible t mnitr and lg all administrative activity assciated with sensitive data streams and sensitive data files in big data envirnments It shuld be pssible t cntrl wh is allwed t create big data analytical sandbxes n tp f big data analytical platfrms e.g. Hadp HDFS and/r analytical DBMSs It shuld be pssible t cntrl wh is allwed t access data in big data analytical sandbxes built n tp f Hadp HDFS and/r analytical DBMSs Cpyright Intelligent Business Strategies Limited, 2013, All Rights Reserved 20
Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite
Vlume Licensing brief Licensing the Cre Client Access License (CAL) Suite and Enterprise CAL Suite Table f Cntents This brief applies t all Micrsft Vlume Licensing prgrams. Summary... 1 What s New in This
More informationResearch Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
More informationUC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments
Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4
More informationThe Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
More informationBusiness Intelligence represents a fundamental shift in the purpose, objective and use of information
Overview f BI and rle f DW in BI Business Intelligence & Why is it ppular? Business Intelligence Steps Business Intelligence Cycle Example Scenaris State f Business Intelligence Business Intelligence Tls
More informationLicensing Windows Server 2012 R2 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 R2 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 R2 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents
More informationTable of Contents. This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY.
Table f Cntents Tp Pricing and Licensing Questins... 2 Why shuld custmers be excited abut Micrsft SQL Server 2012?... 2 What are the mst significant changes t the pricing and licensing fr SQL Server?...
More informationLicensing Windows Server 2012 for use with virtualization technologies
Vlume Licensing brief Licensing Windws Server 2012 fr use with virtualizatin technlgies (VMware ESX/ESXi, Micrsft System Center 2012 Virtual Machine Manager, and Parallels Virtuzz) Table f Cntents This
More informationProcess Automation With VMware
Prcess Autmatin With VMware Intelligent Service Autmatin fr Real and Virtual Envirnments Intrductin This Whitepaper describes hw the UC4 platfrm integrates with the VMware vsphere Server and the VMware
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationData Protection Act Data security breach management
Data Prtectin Act Data security breach management The seventh data prtectin principle requires that rganisatins prcessing persnal data take apprpriate measures against unauthrised r unlawful prcessing
More informationNetwork Security Trends in the Era of Cloud and Mobile Computing
Research Reprt Abstract: Netwrk Security Trends in the Era f Clud and Mbile Cmputing By Jn Oltsik, Senir Principal Analyst and Bill Lundell, Senir Research Analyst With Jennifer Gahm, Senir Prject Manager
More informationA96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015
A96 CALA Plicy n the use f Cmputers in Accredited Labratries Revisin 1.5 August 4, 2015 A96 CALA Plicy n the use f Cmputers in Accredited Labratries TABLE OF CONTENTS TABLE OF CONTENTS... 1 CALA POLICY
More informationIn addition to assisting with the disaster planning process, it is hoped this document will also::
First Step f a Disaster Recver Analysis: Knwing What Yu Have and Hw t Get t it Ntes abut using this dcument: This free tl is ffered as a guide and starting pint. It is des nt cver all pssible business
More informationData Abstraction Best Practices with Cisco Data Virtualization
White Paper Data Abstractin Best Practices with Cisc Data Virtualizatin Executive Summary Enterprises are seeking ways t imprve their verall prfitability, cut csts, and reduce risk by prviding better access
More informationVCU Payment Card Policy
VCU Payment Card Plicy Plicy Type: Administrative Respnsible Office: Treasury Services Initial Plicy Apprved: 12/05/2013 Current Revisin Apprved: 12/05/2013 Plicy Statement and Purpse The purpse f this
More informationCOPIES-F.Y.I., INC. Policies and Procedures Data Security Policy
COPIES-F.Y.I., INC. Plicies and Prcedures Data Security Plicy Page 2 f 7 Preamble Mst f Cpies FYI, Incrprated financial, administrative, research, and clinical systems are accessible thrugh the campus
More informationCloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
More informationResearch Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013
Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,
More informationBuild the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration
Slutin Brief OpenStack Services OVERVIEW OnX understands clud adptin challenges f glbal enterprise cmpanies and helps Enterprises adpt OpenStack slutins thrugh targeted services. We ffer vertical industry
More informationWHITE PAPER. Vendor Managed Inventory (VMI) is Not Just for A Items
WHITE PAPER Vendr Managed Inventry (VMI) is Nt Just fr A Items Why it s Critical fr Plumbing Manufacturers t als Manage Whlesalers B & C Items Executive Summary Prven Results fr VMI-managed SKUs*: Stck-uts
More informationThe Cost Benefits of the Cloud are More About Real Estate Than IT
y The Cst Benefits f the Clud are Mre Abut Real Estate Than IT #$#%&'()*( An Osterman Research Executive Brief Published December 2010 "#$#%&'()*( Osterman Research, Inc. P.O. Bx 1058 Black Diamnd, Washingtn
More informationUsing PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
More informationGUIDANCE FOR BUSINESS ASSOCIATES
GUIDANCE FOR BUSINESS ASSOCIATES This Guidance fr Business Assciates dcument is intended t verview UPMCs expectatins, as well as t prvide additinal resurces and infrmatin, t UPMC s HIPAA business assciates.
More informationDisk Redundancy (RAID)
A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.
More informationVersion: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
More informationURM 11g Implementation Tips, Tricks & Gotchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC.
URM 11g Implementatin Tips, Tricks & Gtchas ALAN MACKENTHUN FISHBOWL SOLUTIONS, INC. i Fishbwl Slutins Ntice The infrmatin cntained in this dcument represents the current view f Fishbwl Slutins, Inc. n
More informationManaging Access and Help Protect Corporate Email Data on Mobile Devices with Enterprise Mobile Suite
Managing Access and Help Prtect Crprate Email Data n Mbile Devices with Enterprise Mbile Suite Last updated: 7/15/15 Balancing prductivity and security Emplyees want t be able t use their wn devices t
More informationThe ADVANTAGE of Cloud Based Computing:
The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has
More informationResearch Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012
Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.
More informationMobile Device Manager Admin Guide. Reports and Alerts
Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview
More informationSystem Business Continuity Classification
Business Cntinuity Prcedures Business Impact Analysis (BIA) System Recvery Prcedures (SRP) System Business Cntinuity Classificatin Cre Infrastructure Criticality Levels Critical High Medium Lw Required
More informationChange Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
More informationEnsuring end-to-end protection of video integrity
White paper Ensuring end-t-end prtectin f vide integrity Prepared by: Jhn Rasmussen, Senir Technical Prduct Manager, Crprate Business Unit, Milestne Systems Date: May 22, 2015 Milestne Systems Ensuring
More informationHow To Write A Byod
Limitatins f the Walled Garden This is the secnd part in a series designed t help rganizatins develp their BYOD (bring-yur-wn-device) strategies fr persnally-wned smartphnes and tablets in the enterprise.
More informationSecurity Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview
Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the
More informationProfessional Leaders/Specialists
Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and
More informationHIPAA HITECH ACT Compliance, Review and Training Services
Cmpliance, Review and Training Services Risk Assessment and Risk Mitigatin: The first and mst imprtant step is t undertake a hlistic risk assessment that examines the risks and cntrls related t fur critical
More informationBYOD and Cloud Computing
BYOD and Clud Cmputing AIIM First Canadian Chapter May 22, 2014 Susan Nickle, Lndn Health Sciences Centre Chuck Rthman, Wrtzmans Sheila Taylr, Erg Infrmatin Management Cnsulting Clud cmputing Agenda What
More informationTHOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6
THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track Case Management System (CMS) is a cnfigurable, brwser based case management system fr all levels
More informationResearch Report. Abstract: Data Center Networking Trends. January 2012. By Jon Oltsik With Bob Laliberte and Bill Lundell
Research Reprt Abstract: Data Center Netwrking Trends By Jn Oltsik With Bb Laliberte and Bill Lundell January 2012 2012 Enterprise Strategy Grup, Inc. All Rights Reserved. Intrductin Research Objective
More informationOnline Learning Portal best practices guide
Online Learning Prtal Best Practices Guide best practices guide This dcument prvides Micrsft Sftware Assurance Benefit Administratrs with best practices fr implementing e-learning thrugh the Micrsft Online
More informationPOLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
More informationHow Does Cloud Computing Work?
Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationFirst Global Data Corp.
First Glbal Data Crp. Privacy Plicy As f February 23, 2015 Ding business with First Glbal Data Crp. ("First Glbal", First Glbal Mney, "we" r "us", which includes First Glbal Data Crp. s subsidiary, First
More informationChapter 7 Business Continuity and Risk Management
Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity
More informationHIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions 724-942-1337
HIPAA Cmpliance 101 Imprtant Terms Cvered Entities (CAs) The HIPAA Privacy Rule refers t three specific grups as cvered entities, including health plans, healthcare clearinghuses, and health care prviders
More informationAccess to the Ashworth College Online Library service is free and provided upon enrollment. To access ProQuest:
PrQuest Accessing PrQuest Access t the Ashwrth Cllege Online Library service is free and prvided upn enrllment. T access PrQuest: 1. G t http://www.ashwrthcllege.edu/student/resurces/enterlibrary.html
More informationImplementing SQL Manage Quick Guide
Implementing SQL Manage Quick Guide The purpse f this dcument is t guide yu thrugh the quick prcess f implementing SQL Manage n SQL Server databases. SQL Manage is a ttal management slutin fr Micrsft SQL
More informationMigrating to SharePoint 2010 Don t Upgrade Your Mess
Migrating t SharePint 2010 Dn t Upgrade Yur Mess by David Cleman Micrsft SharePint Server MVP April 2011 Phne: (610)-717-0413 Email: inf@metavistech.cm Website: www.metavistech.cm Intrductin May 12 th
More information2008 BA Insurance Systems Pty Ltd
2008 BA Insurance Systems Pty Ltd BAIS have been delivering insurance systems since 1993. Over the last 15 years, technlgy has mved at breakneck speed. BAIS has flurished in this here tday, gne tmrrw sftware
More informationContract Risk Management
Cntract Risk Management A Practical Apprach frm The Caridn Academy telephne +27 82 651 8897 facsimile +27 86 674 3384 email inf@caridn.net website www.caridn.za.net 1 1 Over-expenditure, fr example thrugh
More informationBest Practices for Optimizing Performance and Availability in Virtual Infrastructures
Best Practices fr Optimizing Perfrmance and Availability in Virtual Infrastructures www.nimsft.cm Best Practices fr Optimizing Perfrmance and Availability in Virtual Infrastructures PAGE 2 Table f Cntents
More informationNC3A SOA Techwatch Day Call for Presentations
NC3A SOA Techwatch Day Call fr Presentatins 1 February 2012 Hsted at NATO C3 Agency, The Hague, The Netherlands By NC3A Chief Technlgy Office (CTO) David Burtn Chief Technlgy fficer Versin 1, 1 December
More informationMobile Workforce. Improving Productivity, Improving Profitability
Mbile Wrkfrce Imprving Prductivity, Imprving Prfitability White Paper The Business Challenge Between increasing peratinal cst, staff turnver, budget cnstraints and pressure t deliver prducts and services
More informationKey Steps for Organizations in Responding to Privacy Breaches
Key Steps fr Organizatins in Respnding t Privacy Breaches Purpse The purpse f this dcument is t prvide guidance t private sectr rganizatins, bth small and large, when a privacy breach ccurs. Organizatins
More informationIntegrate Marketing Automation, Lead Management and CRM
Clsing the Lp: Integrate Marketing Autmatin, Lead Management and CRM Circular thinking fr marketers 1 (866) 372-9431 www.clickpintsftware.cm Clsing the Lp: Integrate Marketing Autmatin, Lead Management
More informationRSA-Pivotal Security Big Data Reference Architecture RSA & Pivotal combine to help security teams detect threats quicker and speed up response
RSA-Pivtal Security Big Data Reference Architecture RSA & Pivtal cmbine t help security teams detect threats quicker and speed up respnse ESSENTIALS RSA and Pivtal are cmbining t help custmers get: Better
More informationACTIVITY MONITOR Real Time Monitor Employee Activity Monitor
ACTIVITY MONITOR Real Time Mnitr Emplyee Activity Mnitr This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it is a library
More informationBasic concept of Cloud computing
Basic cncept f Clud cmputing Abstract:- Mnica R Kabra (Vivekanand Arts Sardar Dalipsingh Cmmerce and science cllege Aurangabad) Clud cmputing is becming a pwerful netwrk architecture t perfrm large-scale
More informationData Protection Policy & Procedure
Data Prtectin Plicy & Prcedure Page 1 Prcnnect Marketing Data Prtectin Plicy V1.2 Data prtectin plicy Cntext and verview Key details Plicy prepared by: Adam Haycck Apprved by bard / management n: 01/01/2015
More informationGetting Started Guide
AnswerDash Resurces http://answerdash.cm Cntextual help fr sales and supprt Getting Started Guide AnswerDash is cmmitted t helping yu achieve yur larger business gals. The utlined pre-launch cnsideratins
More informationTrustED Briefing Series:
TrustED Briefing Series: Since 2001, TrustCC has prvided IT audits and security assessments t hundreds f financial institutins thrugh ut the United States. Our TrustED Briefing Series are white papers
More informationState of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
More informationTraining Efficiency: Optimizing Learning Technology
Ideas & Insights frm 2008 Training Efficiency Masters Series Survey Results Training Efficiency: Optimizing Learning Technlgy trainingefficiency.cm Survey Results: Training Efficiency: Optimizing Learning
More informationUniversity of Texas at Dallas Policy for Accepting Credit Card and Electronic Payments
University f Texas at Dallas Plicy fr Accepting Credit Card and Electrnic Payments Cntents: Purpse Applicability Plicy Statement Respnsibilities f a Merchant Department Prcess t Becme a Merchant Department
More informationMagenta HR in partnership with breath ehr
BREATHEHR ONLINE HR SYSTEM AND PORTAL Magenta HR in partnership with breath ehr Magenta HR Cnsulting Ltd. 24 Canning Street, Edinburgh EH3 8EG Tel. 0131 2272769 www.magentahr.cm inf@magentahr.cm 6 December
More informationDefining Sales Campaign Automation How e-mail, the Killer App, is best applied to marketing
Defining Sales Campaign Autmatin Hw e-mail, the Killer App, is best applied t marketing Summary: Cmpanies tday are steadily adpting strategies and technlgies t reach prspects, custmers, and partners thrugh
More informationSystem Business Continuity Classification
System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality
More informationHP Email Archiving software for Microsoft Exchange
HP Email Archiving sftware fr Micrsft Exchange PST Imprt Tls Cmpnents and Deplyment Best Practices Table f Cntents Overview... 2 Prerequisites... 2 Cmpnents... 2 Archive Credentials... 2 PST Lader... 2
More informationPerformance Test Modeling with ANALYTICS
Perfrmance Test Mdeling with ANALYTICS Jeevakarthik Kandhasamy Perfrmance test Lead Cnsultant Capgemini Financial Services USA jeevakarthik@gmail.cm Abstract Websites and web/mbile applicatins have becme
More informationImplementing an electronic document and records management system using SharePoint 7
Reprt title Agenda item Implementing an electrnic dcument and recrds management system using SharePint 7 Meeting Finance, Prcurement & Prperty Cmmittee 16 June 2008 Date Reprt by Dcument Number Head f
More informationFINANCIAL SERVICES FLASH REPORT
FINANCIAL SERVICES FLASH REPORT Draft Regulatry Cmpliance Management Guideline Released by the Office f the Superintendent f Financial Institutins May 5, 2014 On April 30, 2014, the Office f the Superintendent
More informationThe Importance of Market Research
The Imprtance f Market Research 1. What is market research? Successful businesses have extensive knwledge f their custmers and their cmpetitrs. Market research is the prcess f gathering infrmatin which
More informationFeature Guide. Virto Commerce Platform
Feature Guide Virt Cmmerce Platfrm Fr mre infrmatin abut Virt Cmmerce, visit virtcmmerce.cm r call + 1 323 570 5588 t speak t a representative. Virt Cmmerce Platfrm: Fundatin fr Yur Business Virt Cmmerce
More informationUsing PayPal Website Payments Pro with ProductCart
Using PayPal Website Payments Pr with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 3 What is Website Payments Pr?... 3 Website Payments Pr and Website Payments Standard...
More information2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY
2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY OFFICE OF INFORMATION TECHNOLOGY AUGUST 2008 Executive Summary The mst recent CSU Stanislaus infrmatin technlgy (IT) plan was issued in 2003.
More informationSystems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More informationOrganisational self-migration guide an overview V1-5 April 2014
Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins
More informationIntegrating With incontact dbprovider & Screen Pops
Integrating With incntact dbprvider & Screen Pps incntact has tw primary pints f integratin. The first pint is between the incntact IVR (script) platfrm and the custmer s crprate database. The secnd pint
More informationACTIVITY MONITOR. Live view of remote desktops. You may easily have a look at any user s desktop.
Web Develpment Offshre Develpment Outsurcing SEO ACTIVITY MONITOR This pwerful tl allws yu t track any LAN, giving yu the mst detailed infrmatin n what, hw and when yur netwrk users perfrmed. Whether it
More informationWhite Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc. www.patrol-it.com
White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm White Paper fr Mbile Wrkfrce Management and Mnitring Cpyright 2014 by Patrl-IT Inc. www.patrl-it.cm 2
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U
More informationTITLE: RECORDS AND INFORMATION MANAGEMENT POLICY
TITLE: RECORDS AND INFORMATION MANAGEMENT POLICY REFERENCE NUMBER: 14/103368 RESPONSIBLE DEPARTMENT: Crprate Services APPLICABLE LEGISLATION: State Recrds Act 1997 Lcal Gvernment Act 1999 Crpratins Act
More informationService Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S
Service Level Agreement (SLA) Hsted Prducts Netp Business Slutins A/S Cntents 1 Service Level Agreement... 3 2 Supprt Services... 3 3 Incident Management... 3 3.1 Requesting service r submitting incidents...
More informationGartner Magic Quadrant Salesforce Automation 2009
Gartner Magic Quadrant Salesfrce Autmatin 2009 Sage CRM Slutins Opinin Brief Released July 24, 2009 Q. What is the Gartner Magic Quadrant (GMQ) fr SFA? A. The Gartner Magic Quadrant fr SFA is an analyst
More informationSaaS Listing CA Cloud Service Management
SaaS Listing CA Clud Service Management 1. Intrductin This dcument prvides standards and features that apply t the CA Clud Service Management (CSM) SaaS ffering prvided t the Custmer and defines the parameters
More informationDocument Management Versioning Strategy
1.0 Backgrund and Overview Dcument Management Versining Strategy Versining is an imprtant cmpnent f cntent creatin and management. Versin management is a key cmpnent f enterprise cntent management. The
More informationCMS Eligibility Requirements Checklist for MSSP ACO Participation
ATTACHMENT 1 CMS Eligibility Requirements Checklist fr MSSP ACO Participatin 1. General Eligibility Requirements ACO participants wrk tgether t manage and crdinate care fr Medicare fee-fr-service beneficiaries.
More informationConfiguring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp
Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is
More informationProcess of Setting up a New Merchant Account
Prcess f Setting up a New Merchant Accunt Table f Cntents PCI DSS... 3 Wh t cntact?... 3 Bakcgrund n PCI... 3 Why cmply?... 3 Hw t cmply?... 3 PCI DSS Scpe... 4 Des PCI DSS Apply t Me?... 4 What if I am
More informationStandardization or Harmonization? You need Both
Standardizatin r? Yu need Bth Albrecht Richen and Ansgar Steinhrst Recently the CFO f a majr cnsumer electrnics cmpany stated, We dn t need standardizatin f ur wrldwide prcesses, we need harmnizatin. Is
More informationIn-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future
In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt
More informationITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days
ITIL Service Offerings & Agreement (SOA) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management
More informationAML Internet Manor Court, Manor Farm House, London Road, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email:
AML Internet Manr Curt, Manr Farm Huse, Lndn Rad, Derby, Derbyshire, DE72 2GR. Tel: 01332 650 009 Fax: 01332 650 850 Email: Backup@AmlInternet.c.uk Cntents Page Situatin Analysis 3 AML Internet - The Slutin
More informationALM in the Cloud an Overview of Oracle Developer Cloud Service. Introduction. By Dana Singleterry
ALM in the Clud an Overview f Oracle Develper Clud Service Intrductin By Dana Singleterry In recent years the wrld f applicatin develpment has adpted new methdlgies that aim t imprve the quality and speed
More informationCLOUD COMPUTING: SECURITY THREATS AND MECHANISM
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel
More information