Skip to main content
DAG - Data Access Governance

DAG

CYBERSECURITY DICTIONARY

DAG - Data Access Governance

DAG is a data security technology that allows enterprises to gain visibility to sensitive unstructured data that exists across the organization, and enforce policies to control access to that data.

Unstructured data consists of human-generated files (spreadsheets, presentations, PDFs, etc.). Traditionally, sensitive data was relatively well protected in structured systems in applications. However, in modern businesses, an increasing amount of sensitive data is included in unstructured formats. This unstructured data often finds its way into storage solutions that are far less secure such as file shares, collaboration portals (such as SharePoint), cloud storage systems (such as OneDrive or Box), or email. DAG helps organizations first gain visibility to to this unstructured data no matter where it resides and then helps enforce policies to better govern access to this content, and ensure it is available only to users that should have access to it. DAG can complement a Data Loss Prevention (DLP) program.  

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

June 05, 2018

Who Moved My Governance

Your sensitive corporate data has been moved and without proper access control, it’s on the loose! How can you get it under control?

See Details

April 04, 2019

Five Steps for a Successful IDM Deployment

After jumping the hurdles of securing sign-off, are you ready for IDM success?

See Details

November 29, 2017

Five Steps to Ensuring a Successful Identity and Access Management Solution Deployment

After endless cost-benefit meetings, business case rewrites and months of organizational readiness activities, your identity and access management (IA...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.


Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.

Subscribe

Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.