Data access


17 Feb
The Who, What, When and Why of Data Access Governance
Category: Advisory, Blog, Data access, Data Go...
When it comes to Data Access Governance and proving to auditors that you are in control of your data access and sharing, you have to demonstrate the ‘who’, ‘when&...
06 Jan
Why data governance tools haven’t worked…until now
Category: Blog, Data access, Data Governance, ...
There are certainly tools out there which aim to solve the problem of ‘who has access to what’. In fact some of these tools have been around for a long time. However, I’m not sure ...
10 Nov
Automating data access governance during furlough
Category: Advisory, Blog, Data access, Data Go...
Another unexpected challenge created by the pandemic relates to furloughs and how to keep your data secure whilst team members are not active. What is your business doing with them...
22 Oct
What is Identity Governance?
Category: Blog, Compliance, Data access, Data ...
Identity Governance is the central policy of user identity management and access control. Identity governance helps support information security and regulatory compliance/data gove...
22 Jul
Data access security for temporary job roles and functions
Category: Advisory, Blog, Data access, File Sh...
As hundreds of businesses move staff into temporary roles or take on temporary workers, how can you securely assign access to the data your changing workforce needs. Because of the...
03 Jul
Watch Again: CONFIDENT DATA GOVERNANCE FOR HOMEWORKING
Category: Advisory, Data access, Data Governan...
19 May
Torsion in the Press: Compare the Cloud
Category: Compliance, Data access, Data Govern...