ARCHIVED CONTENT
You are viewing ARCHIVED CONTENT released online between 1 April 2010 and 24 August 2018 or content that has been selectively archived and is no longer active. Content in this archive is NOT UPDATED, and links may not function.By Martin White
Every organizations has its secrets, and at times it feels as if the secrets get around faster than “approved” information. But how many organizations look to their search application as a source of leaks? Information security managers tend to focus on stopping external penetration into enterprise systems and pay far less attention to information management security. But without the proper permissions management, search applications can display a malevolent streak. Results lists display confidential information unless permissions are clearly established.
Read the complete article at: Can Your Search Application Keep a Secret?