Story image

How graph analytics can help with data compliance

23 Sep 15

Business need to ensure they are complying with the rules and regulations around how data is accessed and used, according to Teradata, who says big data has the potential to transform the way businesses operate.

Alec Gardner, general manager for advanced analytics at Teradata ANZ, says graph analytics can help businesses keep track of data handling processes to maintain regulation compliance and best practices.

“Regulations and guidelines around how data is accessed and used mean that companies employing big data technology need to have tight information controls in place to handle it properly,” Gardner says.

“Most data management regulations have one thing in common: they require that the business exerts tight controls over access to the data so that only approved people can access specific resources,” he explains.

“By modelling resources and users as a graph, companies can gain visibility and insight into key patterns of permission and usage.”

Gardner says graph analytics uses graphs to identify the relationships between datasets. “It shows the interconnectedness revealing the most sensitive and mission-critical resources within a company,” he explains.

“It then links those resources to employees who can access them, and shows how frequently they use those privileges.”

By doing this, it can help keep track of information access and compliance, Gardner says.

Teradata has identified four key ways in which graph analytics can help ensure information compliance:

Segregate duties
By segregating duties, organisations can spread out essential functions, and the access to perform them, says Gardner. “This reduces the chance of fraud and errors. Companies have to be able to separate authorisation, custody, record keeping, and reconciliation to prevent fraud.”

By mapping how duties are allocated, Gardner says companies can make changes if too much power resides in one person.

Identify data that is exposed or sensitive 
“Companies can pinpoint their most sensitive information and then use graph analytics to see who can access it,” explains Gardner. “This helps to spot areas that are at the most risk of compliance failures.”

Monitor ‘super-users’
According to Gardner, every company has ‘super-users’ who have greater access than most other employees. “Graph analytics can help keep track of what are these super-users are accessing, and whether they are accessing it from secure or unsecured locations,” he says.

Help implement governance rules, policies, and procedures
To ensure compliance, Gardner says companies have to adopt consistent rules, policies, and procedures that are modelled and implemented from the top down to govern usage. He says graph analysis can show how these rules will affect users before implementation, and then help with enforcement once they are adopted.

“Because almost any size of dataset can be expressed as a graph, graph analytics can help companies make sense of the controls needed across millions of resources, data sources, and users,” Gardner explains. “Graph analytics provides transparency into the access and control of any network, helping businesses maintain information compliance.”

Virtustream launches cloud automation and security capabilities
Virtustream Enterprise Cloud enhancements accelerate time-to-value for enterprises moving mission critical apps to the cloud.
TCS collaborates with Red Hat to build digital transformation solutions
“By leveraging TCS' technology skills to build more secure, intelligent and responsive solutions, we aim to deliver superior end-user experiences."
Twitter suspects state-sponsored ties to support forum breach
One of Twitter’s support forums was hit by a data breach that may have ties to a state-sponsored attack, however users' personal data was exposed.
How McAfee aims to curb enterprise data loss
McAfee DLP aims to help safeguard intellectual property and ensure compliance by protecting sensitive data.
HPE promotes 'circular economy' for end-of-use tech
HPE is planning to show businesses worldwide that throwing old tech and assets into landfill is not the best option when it comes to end-of-use disposal.
2018 sees 1,500% increase in coinmining malware - report
This issue will only continue to grow as IoT forms the foundation of connected devices and smart city grids.
CSPs ‘not capable enough’ to meet 5G demands of end-users
A new study from Gartner produced some startling findings, including the lack of readiness of communications service providers (CSPs).
Oracle announces a new set of cloud-native managed services
"Developers should have the flexibility to build and deploy their applications anywhere they choose without the threat of cloud vendor lock-in.”