Advisory


30 Sep
3 reasons why it’s difficult to implement ABAC data access in a cloud-based system
Category: Advisory, Blog, Data access
As we have discussed before, Attribute-Based Access Control (ABAC) is an established approach for controlling access rights based on matching a combination of criteria about users ...
24 Sep
The two fundamentals of a successful access control system
Category: Advisory, Blog, Data access
The list of criteria can easily grow when looking for the right access control approach for your business. At Torsion we recommend keeping two overarching criteria firmly at the to...
09 Sep
Types of Data Access Control
Category: Advisory, Blog, Data access, File Sh...
Generally speaking, the different types of access control can be distinguished by how access is granted (DAC and MAC) and why access is granted (RBAC and ABAC). Here, we guide you ...
17 Aug
5 tips for choosing the right file-sharing solution
Category: Advisory, Blog, Data access, File Sh...
1. Make data sharing a business function Let’s face it, a lot of file sharing happens at work both internally and externally. And the volume of information being shared is in...
07 Jul
Trust your people to control access
Category: Advisory, Blog, Data access, File Sh...
Forbes has published some latest research that identified five key trends that set data-leading organisations apart from peers. One of those key trends is ‘Trust’, in p...
02 Jun
Our top 5 scenarios for revoking data access
Category: Advisory, Blog, Data access, File Sh...
In our last blog we talked about the importance of revoking data access, to limit the amount of data sprawl that can easily get out of control. Here we give our top 5 scenarios in ...
20 May
The added benefits of Data Access Governance
Category: Advisory, Blog, Data Governance
Data Access Governance puts you in control of, and proving, that you know who has access to what information, why and when. It’s vital for any organisation that has employees...
21 Apr
Homeworking data breaches drive security changes
Category: Advisory, Blog, File Sharing, Inside...
08 Apr
Recording the ‘why’ for data access governance
Category: Advisory, Blog, Compliance, Data acc...
When it comes to proving to auditors that you are in control of your Data Access Governance, it’s just as important to record ‘why’ somebody has access to a parti...
01 Apr
Attribute Based Access Control
Category: Advisory, Blog, Data access
There are two main ways of controlling the authentication of who has access to what within an organisaion: Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC...