Ensuring that individuals only have access to the data they require
In large enterprises, data management, drive access and cloud usage rights can quickly become complicated and confusing.
In the process, it sometimes happens that some employees have far more access rights than they should have. For example, an employee in the marketing department might access the wrong drive and discover that they have access to an HR folder that contains sensitive and personal data.
This would constitute a violation of the GDPR and may result in a fine. That is why stringent data access management is a key requirement within organizations.
With sufficient data access management, organizations can determine who has ‘role-based’ access to particular data sets, based on:
- Hierarchy level
- Job role - Department
- Project membership
- Security level
- And more
Utimaco’s data encryption software u.trust LAN Crypt not only ensures that data is protected but also provides role-based access management.