{"id":4269,"date":"2017-05-29T21:49:26","date_gmt":"2017-05-29T21:49:26","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=4269"},"modified":"2017-05-31T02:49:02","modified_gmt":"2017-05-31T02:49:02","slug":"data-respect-5-elements-consider","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/","title":{"rendered":"Data Respect- 5 elements to consider"},"content":{"rendered":"<p>Data respect cannot be compared\u00a0to the respect for the sacrifice of those who gave their lives in defense of our freedom.<\/p>\n<p>By no means, is this post, even an attempt to\u00a0make that comparison.<\/p>\n<p>Unfortunately, forgetting is one of our signature traits as human beings. \u00a0We forget some of the most significant milestones, accomplishments and sacrifice. We forget the pain and suffering of others while we indulge in our self made cocoons.<\/p>\n<p>Unless reminded, we would forget the blood shed to defend\u00a0our liberty.<\/p>\n<p>I love that <a href=\"http:\/\/n.pr\/2s7iyla\">Memorial Day<\/a> forces us to remember. And not just remember, but insists, that we show respect. It is a phenomenal opportunity to focus on &#8216;respect&#8217; in its various forms.<\/p>\n<h4><\/h4>\n<h2>\u00a0<strong>Data Respect is one such form.<\/strong><\/h2>\n<p><strong>This post focus is your \u00a0<a href=\"https:\/\/ibm.co\/2rOGNr9\">Unstructured<\/a><\/strong> data. We will explore your\u00a0<a href=\"http:\/\/bit.ly\/2rgBTCt\"> <strong>Structured<\/strong> <\/a>data in\u00a0the near future.<\/p>\n<p>Data Respect is the platform from which Data Access Governance springs. It is the\u00a0\u00a0acknowledgement that an automated, scalable, inter-operable platform to govern data exists.<\/p>\n<p>Employees create documents, spreadsheets, presentations, and other files on corporate file shares, SharePoint sites and the Cloud.\u00a0\u00a0Manual methods for the management and security of \u00a0these types of data present significant challenges in the face of legacy point products.<\/p>\n<p>Modern cyber security teams seek automated, effective solutions \u2013 not standalone technology that must be manually operated.<\/p>\n<p>Solutions that\u00a0seamlessly integrate or communicate with Identity Access Management (IAM) systems, HR systems, and other applications to facilitate automated workflows to secure sensitive data must be accounted for in the data strategy process. \u00a0The strategy must\u00a0demand the \u00a0application of a consistent permissions model and enforce least-privileged access control.<\/p>\n<p>Data Respect &#8211; 5 considerations<\/p>\n<ul>\n<li>\n<h5><b><span style=\"font-size: x-large;\">Permissions Reporting and Remediation<\/span><\/b><\/h5>\n<\/li>\n<\/ul>\n<p>A solution that makes it easy to see who has access to sensitive content or what a particular user is able\u00a0to across file severs, NAS, SharePoint, Office365, OneDrive, Box, and Dropbox is essential.<\/p>\n<p>Additionally, it must\u00a0flag risky conditions in a browser based portal where you can model and simulate permissions before\u00a0being applied to a production environment.<\/p>\n<p>Furthermore, inherent in its\u00a0process must be the power and flexibility to \u00a0allow the Data architect to set a standard permissions model and apply it uniformly across all access control lists (ACLs).<\/p>\n<ul>\n<li><b>Sensitive Data Discovery<\/b><\/li>\n<\/ul>\n<p>Secondly, a solution that\u00a0scans the contents of hundreds of document types, even image files using advanced Optical Character Recognition (OCR) technology is important. \u00a0It must also use out-of-the-box rules to meet government and industry compliance standards or add custom criteria specific to your organization\u2019s standards.<\/p>\n<ul>\n<li><strong>Data Classification and Marking<\/strong><\/li>\n<\/ul>\n<p>It must also be able to read and write file classification tags to enhance governance and increase the effectiveness of your encryption or data-in-motion security tools.<\/p>\n<ul>\n<li><strong>Extend your Identity Access (IAM)\u00a0Strategy<\/strong><\/li>\n<\/ul>\n<p>An open and flexible architecture is critical \u00a0and must\u00a0seamlessly integrate with any Identity Access Management (IAM) system\u00a0of your choice to extend roles and entitlement reviews into unstructured data.<\/p>\n<ul>\n<li><b>File Activity Monitoring<\/b><\/li>\n<\/ul>\n<p>A full audit trail of every file touch with all the details must be maintained. Your chosen solution\u00a0should be able to detect what happened to a\u00a0missing file or see who has been looking at sensitive content.\u00a0 Activity collection also helps to identify and revoke stale or excessive permissions without interruption to your organization.<\/p>\n<h2>\u00a0Data Respect &#8211; Does your Data Governance strategy pass the acid test?<\/h2>\n<p>It does if you can:<\/p>\n<ul>\n<li><strong>Implement least-privileged access controls<\/strong><\/li>\n<li><strong>Track the precise forensic history of file access<\/strong><\/li>\n<li><strong>Automate security and compliance policies<\/strong><\/li>\n<li><strong>Decrease operations expense and storage costs<\/strong><\/li>\n<\/ul>\n<p>Go ahead, salute\u00a0the memory of our veterans and respect your data!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data respect cannot be compared\u00a0to the respect for the sacrifice of those who gave their lives in defense of our freedom. By no means, is this post, even an attempt to\u00a0make that comparison. Unfortunately, forgetting is one of our signature traits as human beings. \u00a0We forget some of the most significant milestones, accomplishments and sacrifice. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,175],"tags":[383,381],"class_list":["post-4269","post","type-post","status-publish","format-standard","hentry","category-cloud","category-data-management","tag-data-management","tag-unstructured-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Respect- 5 elements to consider - TechTonic Times<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Respect- 5 elements to consider - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Data respect cannot be compared\u00a0to the respect for the sacrifice of those who gave their lives in defense of our freedom. By no means, is this post, even an attempt to\u00a0make that comparison. Unfortunately, forgetting is one of our signature traits as human beings. \u00a0We forget some of the most significant milestones, accomplishments and sacrifice. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-29T21:49:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-05-31T02:49:02+00:00\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Data Respect- 5 elements to consider\",\"datePublished\":\"2017-05-29T21:49:26+00:00\",\"dateModified\":\"2017-05-31T02:49:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/\"},\"wordCount\":600,\"commentCount\":2,\"keywords\":[\"data Management\",\"unstructured data\"],\"articleSection\":[\"Cloud\",\"Data Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/\",\"name\":\"Data Respect- 5 elements to consider - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"datePublished\":\"2017-05-29T21:49:26+00:00\",\"dateModified\":\"2017-05-31T02:49:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Respect- 5 elements to consider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Respect- 5 elements to consider - TechTonic Times","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/","og_locale":"en_US","og_type":"article","og_title":"Data Respect- 5 elements to consider - TechTonic Times","og_description":"Data respect cannot be compared\u00a0to the respect for the sacrifice of those who gave their lives in defense of our freedom. By no means, is this post, even an attempt to\u00a0make that comparison. Unfortunately, forgetting is one of our signature traits as human beings. \u00a0We forget some of the most significant milestones, accomplishments and sacrifice. [&hellip;]","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/","og_site_name":"TechTonic Times","article_published_time":"2017-05-29T21:49:26+00:00","article_modified_time":"2017-05-31T02:49:02+00:00","author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Data Respect- 5 elements to consider","datePublished":"2017-05-29T21:49:26+00:00","dateModified":"2017-05-31T02:49:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/"},"wordCount":600,"commentCount":2,"keywords":["data Management","unstructured data"],"articleSection":["Cloud","Data Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/","name":"Data Respect- 5 elements to consider - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"datePublished":"2017-05-29T21:49:26+00:00","dateModified":"2017-05-31T02:49:02+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/data-respect-5-elements-consider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Respect- 5 elements to consider"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/4269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=4269"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/4269\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=4269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=4269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=4269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}