Monday, October 5, 2015

Graph technology for modern access management –

According to current estimates, the number increased in 2014 to privacy violations by 49 percent. More than one billion records have been stolen or compromised. – Which works out at 32 stolen or lost records per second. Incidents like the hacker attack on the financial institution JP Morgan Chase have also attracted the attention of the media. No wonder then that data security on the list of the most pressing concerns of CIOs

at the top. The increased regulation of data on the part of the security authorities and the rise of modern ways of working with employees at different locations, companies must ensure, that data can only be accessed by the right people. Identity and Access Management can develop a nightmare so quickly. A solution for companies to be able to sleep in peace, can the use of graph databases.

Unprotected data

Today we generate in two days more data than we have done it from the dawn of civilization until 2003. These include highly sensitive information, such as hospital reports or bank accounts, the move into the wrong hands serious abuse by itself. Continuously new laws come as the planned EU Data Protection Directive in force, the companies are taking more and more the responsibility with regard to the preservation of data. Rule violations compromise as not only a company’s image, but draw in many cases heavy fines of Data Protection Officer by itself. Against this backdrop, companies need a flexible strategy to safeguard their data.

to the right person to open the door

A study by Kaspersky Lab found that errors made by employees have for the first time overtaken software vulnerabilities as causing privacy violations. Companies must prevent such misconduct by clear guidelines so that people can not access data without authorization in advance.

It is inconceivable that all individuals have the same access rights to data, folders and servers within an enterprise. No one would allow the Assistant Director of a bank branch access to a top-Economic customer account, for example, on the idea. Nor will receive a simple official insight into the secret documents relating to international relations of the Chancellor. Companies need to guarantee that the door remains firmly closed to her wealth of data from external threats such as hackers and malicious scammers.

In theory, the solution seems obvious, but the problem of access management is indeed highly complex. Especially in growing companies, with expansion abroad and the increasing number of mobile and spatially separate workplaces, the topic of identity and access management to urgency. While most companies already have access management systems, but these are usually not the requirements of the modern working world has grown. Often they also allow only slow and time-consuming authentication processes.

A good access management is based on a holistic and intelligent system that can quickly and accurately verify the user rights of each person. Since hierarchies play a diminishing role in corporate structures, access to important information is no longer subject only to the position of an employee. A much more important factor, occupying the specific role of the employee within the company or within a specific project. A detailed and flexible approach is therefore required. Here Graph Databases can help.

It is in the nature of graph databases that they are suitable for searching in complex, interconnected data and can identify patterns quickly and easily. Within the Access Management The following questions can be formulated for example:

  • Who requires access to the data
  • In what connection is this person about the company? What does it hold?
  • From where trying the person to access the data?
  • it has previously attempted to access the data?
  • Works in the company? If so, for how long and in what capacity?
  • Why the person needs this data?

stuck in these issues a lot of information that must be available at a glance available , The query of all these responses is complex enough for a single person. Every day for a whole company away the complexity grows even many times – especially in a time when the people immediate access to the data via the Internet are accustomed. Can graph databases these search queries editing in real time, so that conventional methods, for example, time-consuming cache permissions unnecessary,

Companies that store all of this information and people always in conjunction with other criteria -. Such as duration of the professional relationship or position – look, can decide whether they grant access for inquiries or deny so in seconds. This identification process is crucial in this day and age, in any data loss can lead to devastating consequences. Often the cause is that the wrong people, whether external or internal, have access to sensitive information.

In modern working life users expect instant access to data, regardless of where they are located. At the same time the access management albeit vital function developed by constantly changing data to an increasingly complex regulations. Conventional methods of access management ranging from long no longer to keep up with the rapidly changing technologies step: This is a safe. With Graph Databases, however companies will always have the most important information at hand in order to identify people in real time and enable them to secure access to information.


No comments:

Post a Comment