Provided by: SecurityTube.net
Topic: Data Management
Current methodology in nearly every organization is to create data validation gates. But when an organization implements a cloud-based strategy, these security-quality gates may inadvertently become bypassed or suppressed. This webcast discusses a methodology to encapsulate the validation at the object level, thus allowing each object to have validated or sanitized data at any given point in time. Two kinds of patterns will be discussed, a validated object pattern and a tokenized object pattern. Examples of use-cases will be detailed for the delegates.