Do you know where your data is?

Issue 8 2022 Editor's Choice, Security Services & Risk Management

The essence of cybersecurity is protecting your data. Whether it is personal information, customer databases, financial statuses, strategic plans or whatever else a company needs to operate efficiently, successfully and compliantly, data is at its core, and losing this data to unauthorised people or through ransomware is the greatest cyber threat to a business.

Additionally, knowing where that data is, and how sensitive it is, has also become a critical factor for enterprises. In the past, back in the mainframe days and even beyond the initial client/server architectures, it was fairly simple to know where your data was.

Today, however, knowing the location and classification (how important or sensitive any piece of data is) is not as easy, as we have internal services and computing devices containing important data, cloud services that are beyond the direct control of the business, and even SaaS applications which keep your data in their own storage system. The third decade of the 21st century has also seen a dramatic move to mobile working and home offices, which adds yet another location where corporate data can reside and be transferred to and from.

The issue is not so much where the data is, but what data is there, and how (or if) it is protected to ensure compliance with data security and privacy laws. Data on a server may be encrypted and have a whole range of cyber products protecting it, but what about the data on an employee’s mobile device or a spreadsheet that gets sent out to clients or other third parties? This creates a problem for enterprises and, whether the action is accidental or malicious, the consequences can remain the same.

Data Security Posture Management

According to Gartner, “Data security posture management (DSPM) provides visibility as to where sensitive data is, who has access to that data, how it has been used and what the security posture of the data store or application is. This requires a data flow analysis to determine the data sensitivity. DSPM forms the basis of a data risk assessment (DRA) to evaluate the implementation of data security governance (DSG) policies.” [1]

Flow Security is a relatively new company in the data management space, focusing on Data Security Posture Management (DSPM, also a relatively new concept). Flow has designed a data security platform that “discovers, classifies and protects sensitive data in and outside application environments.” Put simply, Flow’s DSPM manages the ‘data journey’, it provides cybersecurity teams with the ability to protect data efficiently by allowing them to understand where, when and how it is used.

The idea is not simply to show where the data is, but more importantly, to reduce the potential for data loss or breach due to excessive permissions (allowing people to access data they don’t need for their jobs or not disabling data access when people leave or change jobs, etc.) when access is detected from a strange location, and when cloud systems are configured incorrectly.

Naturally, since data flows into, out of and through companies continually, DSPM needs to be a real-time process, not something one does after a breach. According to Jonathan Roizin, CEO of Flow Security, Flow’s data security platform is “the first that analyses data not only at-rest but also in-motion to secure data wherever it flows”.

The system automatically finds and classifies data, and then delivers a mapping of data flows as well as data stores within and external to the company, even including data stored in the illusive ‘shadow IT’ data stores.

Data security survey

Flow Security’s Annual Cloud Data Security Survey from September 2022 [2], which collated data from 200 security decision-makers in the US and UK, indicates that the highest priority in cloud data security in 2022 is monitoring “sensitive data sent to external services, and insecure interfaces and APIs (52%).” Furthermore, data access governance was seen as a high priority for 28% of respondents in 2021, while it is now a high priority for 48% of the decision-makers surveyed.

The respondents also noted that about 31% of their corporate data is being handled and/or stored by external services. Moreover, “88% of CISOs say they are investing a high level of effort in discovering network data flows, and 52% are not satisfied with this process.”

Roizin says Flow Security solves this problem for enterprises in real time by discovering and classifying data, and also enforcing corporate data protection policies. In other words, what data can be included in an email and what can’t – in a South African context, if someone sends out ID numbers in an email, this would raise an alert and prevent the data from leaving the company.

Having gained a foothold in the US and the EU, Flow Security is also looking to Africa to expand its market, with a few customer sites already adopting its data security platform to meet this critical business requirement.

Find out more at www.flowsecurity.com

[1] www.securitysa.com/*gartner4

[2] www.securitysa.com/*flow1


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Cybersecurity operations done right
LanDynamix SMART Security Solutions Technews Publishing Information Security
For smaller companies, the costs associated with acquiring the necessary skills and tools can be very high. So, how can these organisations establish and maintain their security profile amid constant attacks and evolving technology?

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.