Understanding BI Security Best Practices
How secure is your BI environment? The Microsoft business
intelligence stack contains multiple tools which each have different security
configuration options and interdependencies.
This session starts with a review of the security architecture of each
component in the BI stack and highlights vulnerabilities in the architecture
that must be addressed to properly secure your BI environment. In this session,
you'll also learn about the relationship across the security settings in the BI
tools, backend databases, and the Windows operating system. Building on this
foundation, you'll learn what steps are necessary to apply security best
practices in each component of the Microsoft BI stack.
Sorry, there are no downloads available for this session.
Stacia Misner has over 25 years of experience with improving business practices through technology and has been providing consulting and education services for Microsoft’s business intelligence technologies since 2000. She founded Data Inspirations in 2006. Stacia is a SQL Server MVP, MCITP, MCTS, and a frequent speaker at technical conferences, including Professional Association for SQL Server (PASS) and SQL Server Magazine’s Connections. She has over 14 years of experience in business intelligence architecture and implementation, data warehousing, OLAP, ETL, and reporting and analysis. During that time, Stacia has authored or co-authored multiple books about Microsoft business intelligence technologies.
The video is not available to view online.
- Session Files Explorer
The network name cannot be found.