Top Banner
At all stages of your Business Intelligence project PROTECTING YOUR DATA
7

Protecting your Data at all stages of your Business Intelligence project

Jan 13, 2017

Download

Technology

Trustmarque
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Protecting your Data at all stages of your Business Intelligence project

At all stages of your Business Intelligence project

PROTECTING YOUR DATA

Page 2: Protecting your Data at all stages of your Business Intelligence project

Protecting your data is difficult enough, but when you add Business Intelligence into the mix many organisations get overwhelmed, unsure about where to start and what security measures to put in place. Such confusion leads many to either suspend their BI project, or to press on and hope for the best.

The key to mastering BI and data security lies in taking things one step at a time. Look at each phase of your BI project in turn, and consider how you can secure the data involved in that stage.

Introduction

BUSINESS INTELLIGENCE

Page 3: Protecting your Data at all stages of your Business Intelligence project

STAGE ONE

Securing your raw data

ITAMIdentifying whatdata you have

EmployeeEducation

(e.g. BYOD)

The first step of any BI project is to identify the raw data you want to analyse. After all, if you don’t know what data you can and want to use in your BI project, you can’t start your BI project.

Raw data comes in many forms – from data stored on legacy systems, customer data, organisational financial data – and it’s important to protect each and every type of data.

Page 4: Protecting your Data at all stages of your Business Intelligence project

STAGE TWO

Securing your raw data is just step one. Step two is securing your raw data whilst it’s in transit.

So how do you get your data from point A (wherever it’s sitting in its raw form) to point B (the BI project leader) so they can upload it to point C (the BI tool)? And what’s more, how do you do it securely?

Protecting the middle ground

Transfervia secure

email

File sharingservices

One Drive or Dropbox

SolutionImplementation of best

practice procedures

Page 5: Protecting your Data at all stages of your Business Intelligence project

STAGE THREE

BI projects can offer incredibly detailed and exciting insights, and so the temptation is often to act immediately, share those results across your company, and act on them immediately. But given how valuable these results are, organisations need to think carefully about how they’re going to store and access them.

Safeguarding your results

Cloud storage On premisestorage

Page 6: Protecting your Data at all stages of your Business Intelligence project

There is one way to protect your data at all stages of the BI journey – and that’s with a sophisticated endpoint security tool.

McAfee Endpoint Security 10 can help protect every endpoint within your organisation, meaning that your BI data is safe, no matter where it is.

With McAfeeEndpointSecurity 10

DOING IT ALL

®

Page 7: Protecting your Data at all stages of your Business Intelligence project

Don’t let your BI data be the weak point in your network.

Talk to Trustmarque about McAfee Endpoint Security 10.

www.trustmarque.com

[email protected]

0845 2101 500