Skip Navigation LinksWhy-Standard-SharePoint-Security-isn’t-enough-Protecting-your-Critical-Intellectual-Property

Nivo in sklop
200
IT PRO
Datum:
22.10.2014
Ura:
09:00 - 10:00
Dvorana:
Tartini
Jezik:
Angleški
Verzija:
SharePoint
2013

Why Standard SharePoint Security isn’t enough: Protecting your Critical Intellectual Property
Michael Noel
Povzetek predavanja

One of the biggest advantage of using SharePoint as a Document Management and collaboration environment is that a robust security and permissions structure is built-in to the application itself.  Authenticating and authorizing users is a fairly straightforward task, and administration of security permissions is simplified.  Too often, however, security for SharePoint stops there, and organizations don’t pay enough attention to all of the other considerations that are part of a SharePoint security stack, and more often than not don’t properly build them into a deployment. This can leave them exposed to high profile information leakage incidents which can directly affect the bottom line.

This session covers various tools, techniques, and technologies which can be easily integrated into SharePoint On-Premises, cloud, or hybrid environments that can help to protect your intellectual property. Data Leak Prevention, database encryption, Role Based Access Control, and transport security are outlined and discussed. The session is designed to be comprehensive, and includes all major infrastructure security topics for both on-premises, cloud, or hybrid environments, focusing on a discussion of various real-world designs and technologies that are built to be secure.

• Understand how the problem of data leakage adversely affects organizations today and how relying on standard security techniques is not enough
• Learn how to use native technologies to secure all layers of a SharePoint environment, including Data Leak Prevention, transport layer security, database encryption, and more.
• Examine tools and technologies that can help secure SharePoint, including Active Directory Rights Management Services, SQL Transparent Data Encryption, and Role Based Access Control.

POSEBNA ZAHVALA NAŠIM SPONZORJEM: