Organisations Urged to Reconsider How They View and Protect Data

A new IDC Perspective Report, entitled Is Data the New Endpoint?, proposes that organisations need to change how they think and view data itself as an endpoint, in order to improve how it can be secured.

The report sponsored by Covata, states that: “Data is an asset that is increasing in value, created and stored in an ever-growing variety of devices. It is also increasing in volume, its value only realised by sharing – and only with those who are authorised to view it. And yet hackers are seemingly able to steal this data with ease from those that are unable to secure it sufficiently.” The authors also question why data breaches are still occurring when billions of dollars are spent worldwide on various forms of IT security.

Co-author of the report, Simon Piff, Vice President, Security Practice for IDC Asia/Pacific, says: “Strategies to protect data must evolve if we are going to successfully protect this valuable resource in the future. It’s clear from the almost constant barrage of headlines announcing the latest data breach that we are not able to secure this asset with the strategies we have used in the past. Perhaps by reconsidering our approach to how we think about data, we can create improved strategies to secure this increasingly valuable asset.”

This view is echoed by Covata’s CEO and Managing Director, Ted Pretty: “To greatly reduce security issues, organisations should implement solutions that follow data from its creation to its end of useful life, and ensure only authorised users and processes can access, use and amend the data.

“Traditional perimeter security strategies that have focused on hardening the networks and systems supporting the data, rather than the data itself, are what needs to change. A perimeter-focused strategy is no longer sufficient, and many security technologies are simply applying that same failed approach,” said Pretty.

The solution, asserts the report, is for organisations to reconsider their overall security strategies. As the perimeter “decomposes and becomes more fluid (e.g. cloud, mobile, IoT), data must be elevated so that each data object can itself participate in the security portfolio.”

“Clearly the security solutions we have in place today are not sufficient to protect the data stored within systems, hence the plethora of high-profile data breaches in the news,” states the report. “It is time to rethink how we secure the data by considering data as an endpoint with an active role to play in the overall security strategy rather than as a passive element in transactional systems … To be successful, organisations must develop a program that focuses protection capabilities on the data itself.”

Recommended actions for organisations and their technology buyers:

  • Consider how and where the data is created, captured, transmitted and stored, and where the vulnerabilities are greatest along this value chain
  • Identify offerings that can secure that data at its earliest point of creation and throughout its life cycle, regardless of whether this is on- or off-premises
  • Realise that not all data is of the same value, and that value may differ from an internal (your own) and external (the hacker’s) point of view, and then apply the relevant levels of protection
  • Establish a process that can constantly evaluate this value based on impact to the business, impact of legislation and impact of new threats and vulnerabilities

The full IDC Perspective Report is available via Covata’s website at http://covata.com/insights/whitepapers/idc-data-is-the-new-endpoint/.

About IDC

IDC is the foremost global market intelligence and advisory firm helping clients understand technology and e-business trends to develop sound, action-orientated business strategies. For additional information on IDC, please visit idc.com.

About Covata

Covata is a leading provider of software solutions that protect data and enable secure collaboration. Our data-centric security platform empowers governments and businesses to discover, protect and control their sensitive information. Our products and platform support multiple use cases including search, governance and compliance, user behavior and analytics and file synchronization and sharing.

Covata also provides data discovery, transparent data encryption, centralised permissions management, and activity logging for sensitive and regulated information in SharePoint.

With offices and resources in the US, UK Europe and Australia and coverage in all other regions, our customers span the public sector and defense, aerospace, technology, finance, media and sports industries.

We ensure security is never an afterthought, protecting information and ensuring the safe and efficient sharing of data across internal and external stakeholders, devices, networks and geographic regions, providing organisations with control, visibility and auditability of their sensitive information.

For further information, please visit covata.com.

©2017 Covata Limited or its affiliates
ABN 61 120 658 497

Contacts:

LaunchTech Communications
Kate Davis, 410-698-5211
kate@golaunchtech.com

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.