White Papers

Compliance Oriented Architecture (COA)

A Value Proposition for IT Security

Justifying the investment in the components of a compliance oriented architecture

IT departments are facing three big issues when it comes to protecting the data created and stored on the systems they manage. First, the value of the data is often only realised when it is legitimately shared in some way; second, that sharing is increasingly taking place across public networks and third, the users doing the sharing are doing so on a growing diversity of devices in locations that are convenient to them.

Whilst the three issues help create more efficient business processes and motivate employees through more flexible working practices, sensitive data is becoming far more vulnerable, which concerns regulators.

The only way to resolve the dichotomy of the need to share data flexibly and protect it from falling into the wrong hands is to put in place a compliance oriented architecture (COA). This short report explains the background to these issues and describes the components of a COA.

Organisation Size
SMB | Enterprise

Document Info
Posted: 22-Mar-2012 Format: PDF Length: 8 pages Activity: 34943 views

Tagged with



To access this report please complete the short form on the right >>

Get Your FREE White Paper NOW!

By submitting this form, you agree to its Terms.


  • Print
  • Send to a friend