Data access


07 Jul
Trust your people to control access
Category: Advisory, Blog, Data access, File Sh...
Forbes has published some latest research that identified five key trends that set data-leading organisations apart from peers. One of those key trends is ‘Trust’, in p...
01 Jul
Collaboration Security: What is it and why does it matter
Category: Blog, Data access, Data Governance, ...
Collaboration Security is the practice of ensuring data shared through collaboration platforms is secure. The rise of collaboration platforms such as Teams, Sharepoint and File Sha...
21 Jun
Join our partner webinar – with free beer tasting!
Category: Data access, Data Governance, News
Secure Important Data Assets through Automated Business Process Management and Access Control Join our Virtual Beer Tasting Thursday 8th July | 4pm Is there a risk that your docume...
02 Jun
Our top 5 scenarios for revoking data access
Category: Advisory, Blog, Data access, File Sh...
In our last blog we talked about the importance of revoking data access, to limit the amount of data sprawl that can easily get out of control. Here we give our top 5 scenarios in ...
13 May
How to achieve Zero Trust Data Access Governance
Category: Blog, Compliance, Data access, Insid...
Zero Trust has recently become a key buzzword in cybersecurity. When it comes to preventing data breaches and securing your data access, a Zero Trust model is really worth consider...
08 Apr
Recording the ‘why’ for data access governance
Category: Advisory, Blog, Compliance, Data acc...
When it comes to proving to auditors that you are in control of your Data Access Governance, it’s just as important to record ‘why’ somebody has access to a parti...
01 Apr
Attribute Based Access Control
Category: Advisory, Blog, Data access
There are two main ways of controlling the authentication of who has access to what within an organisaion: Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC...
25 Mar
How to get control of external sharing
Category: Blog, Data access, File Sharing
10 Mar
Do you have data blind spots?
Category: Advisory, Blog, Data access, Insider...
According to a new report by Cloudsphere (In the Dark: Why Enterprise Blind Spots are Leaving Sensitive Enterprise Data Vulnerable to Breaches) 32% of enterprises experienced unaut...
23 Feb
Data Access Governance: Revoking data access
Category: Advisory, Blog, Data access
Within an organisation, people naturally change jobs and roles and of course the businesses itself evolves. But as this happens it’s really difficult to stay on top of file a...