The essence of cybersecurity is protecting your data. Whether it is personal information, customer databases, financial statuses, strategic plans or whatever else a company needs to operate efficiently, successfully and compliantly, data is at its core, and losing this data to unauthorised people or through ransomware is the greatest cyber threat to a business.
Additionally, knowing where that data is, and how sensitive it is, has also become a critical factor for enterprises. In the past, back in the mainframe days and even beyond the initial client/server architectures, it was fairly simple to know where your data was.
Today, however, knowing the location and classification (how important or sensitive any piece of data is) is not as easy, as we have internal services and computing devices containing important data, cloud services that are beyond the direct control of the business, and even SaaS applications which keep your data in their own storage system. The third decade of the 21st century has also seen a dramatic move to mobile working and home offices, which adds yet another location where corporate data can reside and be transferred to and from.
The issue is not so much where the data is, but what data is there, and how (or if) it is protected to ensure compliance with data security and privacy laws. Data on a server may be encrypted and have a whole range of cyber products protecting it, but what about the data on an employee’s mobile device or a spreadsheet that gets sent out to clients or other third parties? This creates a problem for enterprises and, whether the action is accidental or malicious, the consequences can remain the same.
Data Security Posture Management
According to Gartner, “Data security posture management (DSPM) provides visibility as to where sensitive data is, who has access to that data, how it has been used and what the security posture of the data store or application is. This requires a data flow analysis to determine the data sensitivity. DSPM forms the basis of a data risk assessment (DRA) to evaluate the implementation of data security governance (DSG) policies.” 
Flow Security is a relatively new company in the data management space, focusing on Data Security Posture Management (DSPM, also a relatively new concept). Flow has designed a data security platform that “discovers, classifies and protects sensitive data in and outside application environments.” Put simply, Flow’s DSPM manages the ‘data journey’, it provides cybersecurity teams with the ability to protect data efficiently by allowing them to understand where, when and how it is used.
The idea is not simply to show where the data is, but more importantly, to reduce the potential for data loss or breach due to excessive permissions (allowing people to access data they don’t need for their jobs or not disabling data access when people leave or change jobs, etc.) when access is detected from a strange location, and when cloud systems are configured incorrectly.
Naturally, since data flows into, out of and through companies continually, DSPM needs to be a real-time process, not something one does after a breach. According to Jonathan Roizin, CEO of Flow Security, Flow’s data security platform is “the first that analyses data not only at-rest but also in-motion to secure data wherever it flows”.
The system automatically finds and classifies data, and then delivers a mapping of data flows as well as data stores within and external to the company, even including data stored in the illusive ‘shadow IT’ data stores.
Data security survey
Flow Security’s Annual Cloud Data Security Survey from September 2022 , which collated data from 200 security decision-makers in the US and UK, indicates that the highest priority in cloud data security in 2022 is monitoring “sensitive data sent to external services, and insecure interfaces and APIs (52%).” Furthermore, data access governance was seen as a high priority for 28% of respondents in 2021, while it is now a high priority for 48% of the decision-makers surveyed.
The respondents also noted that about 31% of their corporate data is being handled and/or stored by external services. Moreover, “88% of CISOs say they are investing a high level of effort in discovering network data flows, and 52% are not satisfied with this process.”
Roizin says Flow Security solves this problem for enterprises in real time by discovering and classifying data, and also enforcing corporate data protection policies. In other words, what data can be included in an email and what can’t – in a South African context, if someone sends out ID numbers in an email, this would raise an alert and prevent the data from leaving the company.
Having gained a foothold in the US and the EU, Flow Security is also looking to Africa to expand its market, with a few customer sites already adopting its data security platform to meet this critical business requirement.
Find out more at www.flowsecurity.com
|Tel:||+27 11 543 5800|
|Articles:||More information and articles about Technews Publishing|
© Technews Publishing (Pty) Ltd. | All Rights Reserved.