From the Blogosphere
Meeting Today’s Data Security Imperative | @CloudExpo #Cloud
Encryption strategies are critical for securing data today but must be deployed in a thorough, holistic way
By: Peter Galvin
Jun. 25, 2016 04:00 PM
Organizations are experiencing a new emphasis when it comes to cybersecurity. They are moving from securing the perimeter to securing the data within it, which is the result of the proliferation of connected devices in organizations today: smartphones, tablets and the IoT. Organizations used to focus their efforts on keeping attackers outside the perimeter, because just a few years ago, the network perimeter was much more static and limited. Today, the perimeter is everywhere - and constantly moving.
Furthermore, hackers have repeatedly demonstrated their ability to breach network perimeter security. And as the workplace and the devices and applications employees use have become increasingly distributed, the focus has changed to protecting the data and not just the perimeter.
Consequently, IT security teams are setting their sites on pervasive data security. Encryption strategies are critical for securing data today but must be deployed in a thorough, holistic way. Otherwise, data may be protected in one place but not in other multiple locations. That's a false sense of security that can lead to data disaster.
Encrypting for Data Security
In the quest to protect data, organizations are finding that encryption is a good partner. Every organization needs an encryption strategy, starting with the protection of an organization's most confidential or sensitive information. When encrypting this data, it is compulsory that key management is simple and easy. This way, no matter where your data is located, it's encrypted and it's secure.
However, a huge question for the majority of organizations is: Where exactly IS your data? Organizations fall into the trap of protecting data only when it exists in a particular area, but that same set of data exists in potentially many other places. If it's not protected everywhere, it is then vulnerable. Organizations need to understand, discover and know where all their sensitive data is located and ensure data is encrypted at rest, in use and in transit.
Data protection was once an item on a list to check off and then forget about. But in light of the most recent hacks on high-profile organizations, data protection is a boardroom discussion - and we've seen what happens to senior executives who haven't properly protected their sensitive data. In addition, customers are becoming more concerned about the safety of their data.
At this point, enterprises understand that they need encryption - yet some still hesitate. Why? Because encryption can get challenging - but it doesn't have to. Here are five top pervasive encryption techniques to help maximize data protection while minimizing the challenges:
Reader Feedback: Page 1 of 1
Latest Cloud Developer Stories
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
SYS-CON Featured Whitepapers
Most Read This Week