The Growing Demands of Information Governance
Controlling access to information and its distribution becomes more critical as the mobile workforce increases in size and businesses become more global.
Regulatory requirements, litigation, and securing proprietary data demands extra scrutiny over how companies and workforces implement information governance.
KMWorld recently held a webinar featuring Barry Jinks, president and CEO of Colligo Networks, and Grant Shirk, vice president of marketing at Vera, who explained how to explore information governance from regulatory compliance to business performance and how to get the right information to the right people at the right time.
Jinks explained that the major drivers for digital transformation include cloud technologies, a distributed mobile workforce, 24/7 data demands, the consumerization of IT, increased regulatory pressures, and increased threats to data.
To meet these demands Colligo is extending SharePoint and Office365. The seven ways they are assisting enterprises with their data governance journey include:
- Ensuring right content is pushed to right users
- Tracking usage, adoption and compliance
- Capturing metadata when content is saved
- Capturing emails as records within SharePoint
- Deploying Mobile Content policies
- Providing governance even if user is offline
- Allowing productivity through discovery and collaboration
Over the last 18 months security, privacy, and access controls have become regulators’ top priorities, according to Shirk.
Issues ranging from security breaches to privacy concerns will be addressed with upcoming data protection regulations in Europe.
EU GDPR is set to take effect on May 25, 2018 and is fundamentally about protecting and enabling the privacy rights of individuals. The new rules apply to any data controller handling the data of any EU citizen, regardless of the company’s physical location.
The GDPR is a driver for global security investment, Shrik said, and Vera is prepared to help enterprises secure their data. With Vera’s platform, users can protect data directly by encrypting it at the source, enforcing access controls, and enable “always on” protection.
An archived on-demand replay of this webinar is available here.