This page contains a Flash digital edition of a book.
W: www.universitybusiness.co.uk | T: @UB_UK


one of the two major atacks on the University of Maryland”


operating systems, directories and other sources. The most rigorous data security for HEIs, however,


ABOVE: John Butler, VP Ellucian Europe


comes from a multi-layered solution: where a system designed for universities – and the unique data management functions they require – works in conjunction with encryption and data privacy software. These solutions are designed to encrypt all application data such as credit cards, social security numbers and sensitive personal information. Data can be encrypted at rest and when it leaves the database over the network or via backups. Just such a multi-layered defence system is provided


by Ellucian’s Banner Data Defense, which combines Banner-specific database encryption scripts, documentation, reports and installation policies with Oracle’s Advanced Security Option and Audit Vault and Database Firewall products. The package is further enhanced by best practices from Ellucian’s services team, which has been extensively trained and supported by product development. The solution is designed to encrypt all Banner


application data, including sensitive personal information, student grades, payroll and general ledger information. In addition, it also serves to monitor actively all database traffic to detect and block threats and to provide a platform to improve compliance reporting by consolidating audit data from databases, operating systems, directories and other sources. The package is tailored to operate seamlessly as one, operating with Banner, Ellucian’s powerful student information system. This provides HEIs with the best technology available in the


business sector, with education-specific functionality. The combined database firewall capability


provides a first line of protection for databases and consolidates audit data from databases, operating systems, directories and more. A highly accurate SQL grammar-based engine monitors and blocks unauthorised SQL traffic before it reaches the database. From the network, database activity is linked with detailed audit data for easy compliance reporting and alerting. Widely used in the United States, Banner Data


Defense is integral to security at Texas Tech University, where Kay Rhodes, associate vice-chancellor and chief information officer, says: “Our investment in the solution helps protect us against the risk of an atack, and against the costs that we would incur if we had a breach. In addition to the financial impact, a breach can damage the reputation of the system and diminish the trust of the people who are impacted. We want to protect the valuable personal data that people entrust to us.” Jim Brunjes, vice-chancellor and chief financial


officer for the Texas Tech University System adds: “Our colleges have well-regarded reputations for their engineering and sciences programmes. If we have a data breach, people would question the quality of our programmes if we couldn’t protect our own data.” Whatever data security system is considered, it is


worth considering it in the context of the financial and reputational loss that would result from a breach. Relationships with service users are enhanced when security and protection measures are fit for purpose. UB


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42  |  Page 43  |  Page 44  |  Page 45  |  Page 46  |  Page 47  |  Page 48  |  Page 49  |  Page 50  |  Page 51  |  Page 52  |  Page 53  |  Page 54  |  Page 55  |  Page 56  |  Page 57  |  Page 58  |  Page 59  |  Page 60  |  Page 61  |  Page 62  |  Page 63  |  Page 64  |  Page 65  |  Page 66  |  Page 67  |  Page 68  |  Page 69  |  Page 70  |  Page 71  |  Page 72  |  Page 73  |  Page 74  |  Page 75  |  Page 76  |  Page 77  |  Page 78  |  Page 79  |  Page 80  |  Page 81  |  Page 82  |  Page 83  |  Page 84  |  Page 85  |  Page 86  |  Page 87  |  Page 88  |  Page 89  |  Page 90  |  Page 91  |  Page 92