Database Security May Take Second Chair to Unstructured Content

As hackers continue to seek loopholes into corporate data, the focus from structured data, such as database records, may switch to unstructured data in the form of files (word documents, spreadsheets, presentations, transcripts, lab reports, etc.). Imperva’s Asia-Pacific vice president Stree Naidu said that “While most business applications use structured storage such as databases to maintain and process sensitive and critical data, users are constantly creating and storing more unstructured content, based on the information taken from these systems,”; further stating that information is accessible by just too many people that do not have a legitimate need for that information. Because of this, companies should take note and begin to think about the next generation of file access monitoring and governance tools needed to reduce exposure.

Get the Free Newsletter!

Subscribe to Cloud Insider for top news, trends & analysis

Latest Articles