IT departments are facing three big issues when it comes to protecting the data created and stored on the systems they manage. First, the value of the data is often only realised when it is legitimately shared in some way; second, that sharing is increasingly taking place across public networks and third, the users doing the sharing are doing so on a growing diversity of devices in locations that are convenient to them.
Whilst the three issues help create more efficient business processes and motivate employees through more flexible working practices, sensitive data is becoming far more vulnerable, which concerns regulators.
The only way to resolve the dichotomy of the need to share data flexibly and protect it from falling into the wrong hands is to put in place a compliance oriented architecture (COA). This short report explains the background to these issues and describes the components of a COA.