

Watch now: How to create order and security with a data usage concept
File storage is the backbone of daily collaboration – but in
The webinar "Hands-on: Arm your data and authorization structure against unauthorized access", which took place on November 19.11.2024, XNUMX, was dedicated to optimizing data and authorization structures to ensure security, efficiency and compliance. The main content can be summarized as follows:
The webinar started with an overview of the problems of historically grown file servers and their security risks. It was explained how outdated structures can lead to inefficiency and security gaps.
One focus was on identifying and archiving obsolete data. It was shown how archiving old data can reduce the volume by up to 64%, which speeds up recovery in an emergency and increases clarity.
Various tools were presented, including the 3D data heatmap and authorization analysis reports to identify problematic structures and uncover optimization potential.
Permission management was highlighted as a key factor for security and compliance. It was recommended to simplify permission structures, avoid inheritance breaks and reduce direct permissions.
A central aspect was the role of data owners, who are responsible for maintaining authorizations and assuming responsibility for their data. Practical tips on establishing responsibilities were given.
Using practical examples, strategies for introducing modern data structures were presented, including the implementation of regular data retention policies and targeted data cleansing.
The webinar ended with a question and answer session in which participants' specific questions about archiving, authorization management and other functions of migRaven.one were answered.
This webinar provided a practical demonstration of how companies can increase their security standards, meet compliance requirements and at the same time increase the efficiency of their employees by optimizing their data and authorization structures.
You are currently viewing placeholder content from X. To access the actual content, click the button below. Please note that data will be passed on to third parties.
More information