Feeds

Collaboration, complexity and compliance

It can all be cured by leeches, right?

  • alert
  • submit to reddit

SANS - Survey on application security programs

Workshop The trouble with some terms we use in IT is that they take on a life of their own and suggest an unrealistic simplicity. Take “collaboration” for example. To define it requires a decision: either to focus on a limited set of interactions between specific individuals, or more realistically, to recognise that collaboration refers to just about every aspect of how we work together to do our jobs.

Collaboration is a complex, sprawling mess of activity - from sales guys passing tidbits of leads to each other, to researchers looking to identify whether anyone has tried a similar experiment, or designers exchanging lists of options or, well, you get the idea. It’s no wonder, then, that what we call “collaboration tools” are a similarly mixed bag of capabilities - from email and messaging, to document management and portals.

It is said that our houses reflect the kind of people we are – and this must also apply to the state of our unstructured information, reflecting the complexity and chaotic nature of our interactions. Many organisations face problems when their collaborative environments develop independently and without structure, usually resulting in pockets of information that are difficult to access, system fragmentation, sprawl and duplication. We could accept the situation and move on, hoping for some über-solution in the future that might bind together those pesky records, calls, emails and document exchanges. Meanwhile many organisations are faced with an equally complex - and sometimes contradictory - set of regulatory criteria. In a previous article we cited Sarbanes-Oxley, which as a consequence requires transparency across all such pools of information. And in e-discovery cases such as this one, the defence of “Oh dear, I can’t find it” has been given short shrift.

It would be great to come up with some clear advice at this point, to recommend the technological equivalent of leeches – “Just pop a couple down your codpiece before you go to bed.” In past studies we’ve seen that “classification” can hold the key to better information governance in general, the benefits of which can be seen in the context of collaboration. In the article about identity management and compliance cited above, we also saw the importance of pre-defined provisioning by role and subsequent auditability of access, particularly for specific assets that require locked-down access. These principles are just as appropriate for collaboration technologies such as email and Sharepoint, as for other applications and services.

Whatever measures are considered however, they will need to work in the real world, for example against the background of continued data growth and the “keep-everything” attitude many organisations still have to managing information – which, of course, runs counter to almost every regulation we know. Solutions will need to work for the majority, not just for the few, taking into account the great leveller that is complexity – that is, sooner or later, whatever is put in place will start to creak at the seams.

Is there a final answer, to cut the Gordian knot of complexity and address the problems of managing collaboration, and meeting compliance requirements, without either getting in the way of the job? Should we be looking to draconian measures, such as overnight deletion of information that has not been correctly logged and classified? Or maybe you have discovered tools which really can collate, annotate and index all of our unstructured data assets? If you have, do let us know. ®

3 Big data security analytics techniques

More from The Register

next story
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.