Top data trends for 2012
Data owners to take back access control decisions from IT, and Big Data focus to widen in scope
2012 will see an expansion in the focus of Big Data analytics and data owners taking back access control decisions from IT departments.
Those are two of the biggest data governance trends for 2012 identified by software company Varonis Systems.
David Gibson, director of technical marketing and strategic sales at Varonis said: “We have just been through a turbulent year for data owners and next year will be no different. To try and cut through the data jungle we are concentrating on the four major areas that will be problems in 2012.”
The four main trends predicted for 2012 are:
1) Secure Collaboration Goes Viral in 2012 – it will be the year data owners take back access control decisions from IT, and demand automation to analyse data, make better decisions, and eliminate costly, ineffective manual processes.
Gibson said: “Just as organisations demand automation to understand their sales trends, customer base, financial habits, and other critical processes, they will demand automation to understand their data—where it should reside, who should have access to it, and how it’s used. Organisations will realize that continuing on the current path will have devastating results for their businesses – doing nothing is not an option anymore.”
2) Big data analytics will expand its focus to the biggest data of all—unstructured information sitting on file servers, NAS devices, and in email systems.
Gibson said: “Effective data governance requires harnessing the power of metadata through intelligent automation. It is not surprising that industry experts are now saying that the same kind of automation is necessary for more than good governance.
In order to harness the power of “Big Data,” you’ll need to analyse and look for patterns in how and when these massive amounts of data are used, who uses it, in what sequence, and what it contains in order to effectively run a data-driven organisation. Widely known fact: the majority of big data in the enterprise is unstructured rather than structured.”
3) We will see some IT departments taking drastic measures, such as shutting down “at risk” servers or access to e-mail if the proper audit trails are not in place.
Gibson said “One organisation we deal with has recently enforced a policy of – no visible audit trail, no email! Their iron rule is – if the auditing is not available in their email system they aren’t allowed to use email. So, in other words, if the communications can’t be traced and audited then they may shut down the email server. It hasn’t happened yet, but 2012 may be the year servers get shut down and email withdrawn if no audit trail of access activity exists.”
4) Internal threats will still be a major worry for corporates in 2012 despite the demise of Wiki Leaks
Gibson said: “When it comes to data loss, threats from inside the organisation have become as worrisome, if not more so, than those from outside. In many of the security breaches in 2011, employees or contractors were able to delete or download thousands of files without raising concerns because often no one was able to determine what sensitive data they had access to and secure it before information could be stolen, view an audit trail of what they actually did access after the fact, and certainly not hear any alarms go off while the breach was in progress, when access activity was unusual. Corporates will have to address this issue properly in 2012.”