Excerpt from article published by Datanami
Even though 2013 was a distinguishing year for data breaches (think Target, the IRS and tens of millions of records stolen), according to a recentreport by the Identity Theft Resource Center (ITRC), 2015 represented the second highest year in number of data breaches on record (count: 781) since the ITRC began tracking breaches in 2005. In addition, these data breaches spanned healthcare, financial services, education, government and more – no industry was (or, rather, is) safe.
Additionally, as we continue to modernize our workplaces with remote offices, teams or team members, as well as our workspaces with multiple devices (laptop, desktop, smartphone, tablet, etc.), it is imperative that organizations ensure that their data is kept safe – even from their own employees. Certain data should only be accessed by certain members of the business, which can cause a huge headache for management in terms of allowing access to the right people. However, this is where graph databases can provide some pain relief.
[Content Extracted]
Guarding the Door
Good access management requires a comprehensive and intelligent system in place for quick and accurate identification of an individual’s right to view certain information. As workplaces become less driven by hierarchy, access to important information is no longer determined by an employee’s rank, it depends on other factors such as their specific role within the company and certain projects they might be working on.
This means a more granular and flexible approach to control is needed – and where graph databases can help.
By their nature, graph databases are designed to query intricate connected data and can be used to identify problems and patterns in a quick and easy way.
Keywords: emil eifrem Employee Access Management