Do you know where your data is?

Issue 8 2022 Editor's Choice

The essence of cybersecurity is protecting your data. Whether it is personal information, customer databases, financial statuses, strategic plans or whatever else a company needs to operate efficiently, successfully and compliantly, data is at its core, and losing this data to unauthorised people or through ransomware is the greatest cyber threat to a business.

Additionally, knowing where that data is, and how sensitive it is, has also become a critical factor for enterprises. In the past, back in the mainframe days and even beyond the initial client/server architectures, it was fairly simple to know where your data was.

Today, however, knowing the location and classification (how important or sensitive any piece of data is) is not as easy, as we have internal services and computing devices containing important data, cloud services that are beyond the direct control of the business, and even SaaS applications which keep your data in their own storage system. The third decade of the 21st century has also seen a dramatic move to mobile working and home offices, which adds yet another location where corporate data can reside and be transferred to and from.

The issue is not so much where the data is, but what data is there, and how (or if) it is protected to ensure compliance with data security and privacy laws. Data on a server may be encrypted and have a whole range of cyber products protecting it, but what about the data on an employee’s mobile device or a spreadsheet that gets sent out to clients or other third parties? This creates a problem for enterprises and, whether the action is accidental or malicious, the consequences can remain the same.

Data Security Posture Management

According to Gartner, “Data security posture management (DSPM) provides visibility as to where sensitive data is, who has access to that data, how it has been used and what the security posture of the data store or application is. This requires a data flow analysis to determine the data sensitivity. DSPM forms the basis of a data risk assessment (DRA) to evaluate the implementation of data security governance (DSG) policies.” [1]

Flow Security is a relatively new company in the data management space, focusing on Data Security Posture Management (DSPM, also a relatively new concept). Flow has designed a data security platform that “discovers, classifies and protects sensitive data in and outside application environments.” Put simply, Flow’s DSPM manages the ‘data journey’, it provides cybersecurity teams with the ability to protect data efficiently by allowing them to understand where, when and how it is used.

The idea is not simply to show where the data is, but more importantly, to reduce the potential for data loss or breach due to excessive permissions (allowing people to access data they don’t need for their jobs or not disabling data access when people leave or change jobs, etc.) when access is detected from a strange location, and when cloud systems are configured incorrectly.

Naturally, since data flows into, out of and through companies continually, DSPM needs to be a real-time process, not something one does after a breach. According to Jonathan Roizin, CEO of Flow Security, Flow’s data security platform is “the first that analyses data not only at-rest but also in-motion to secure data wherever it flows”.

The system automatically finds and classifies data, and then delivers a mapping of data flows as well as data stores within and external to the company, even including data stored in the illusive ‘shadow IT’ data stores.

Data security survey

Flow Security’s Annual Cloud Data Security Survey from September 2022 [2], which collated data from 200 security decision-makers in the US and UK, indicates that the highest priority in cloud data security in 2022 is monitoring “sensitive data sent to external services, and insecure interfaces and APIs (52%).” Furthermore, data access governance was seen as a high priority for 28% of respondents in 2021, while it is now a high priority for 48% of the decision-makers surveyed.

The respondents also noted that about 31% of their corporate data is being handled and/or stored by external services. Moreover, “88% of CISOs say they are investing a high level of effort in discovering network data flows, and 52% are not satisfied with this process.”

Roizin says Flow Security solves this problem for enterprises in real time by discovering and classifying data, and also enforcing corporate data protection policies. In other words, what data can be included in an email and what can’t – in a South African context, if someone sends out ID numbers in an email, this would raise an alert and prevent the data from leaving the company.

Having gained a foothold in the US and the EU, Flow Security is also looking to Africa to expand its market, with a few customer sites already adopting its data security platform to meet this critical business requirement.

Find out more at www.flowsecurity.com

[1] www.securitysa.com/*gartner4

[2] www.securitysa.com/*flow1


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A closed security concept for test halls and perimeter
Dallmeier Electronic Southern Africa Editor's Choice
At its factory facilities in Vilsbiburg, Germany, Flottweg SE relies on tailored video security technology from Dallmeier for perimeter security and workplace safety.

Read more...
What to do in the face of growing ransomware attacks
Technews Publishing Cyber Security Security Services & Risk Management
Ransomware attacks are proliferating, with attackers becoming more sophisticated and aggressive, and often hitting the same victims more than once, in more than one way.

Read more...
Texecom launches the Midnight Black Collection
Technews Publishing Perimeter Security, Alarms & Intruder Detection Products
Working in harmony with darker environments, the Midnight Black Collection has been created for businesses and sites that require or prefer a security solution which offers discreet protection that compliments their surroundings.

Read more...
SAN market set for growth
Technews Publishing News IT infrastructure
Storage-area network (SAN) market to hit US$ 26,86 billion in revenue by the end of 2029 due to factors like widespread adoption of Hybrid SAN-NAS solutions.

Read more...
Optimising remote technical support
Technews Publishing Asset Management, EAS, RFID Products
Sanden Intercool Kenya improves efficiency, removes manual processes with FIELDForce from MACmobile, making its technical backup and support staff more productive, while also optimising record keeping.

Read more...
Advanced server performance and energy efficient design
Editor's Choice IT infrastructure Products
Dell PowerEdge server portfolio expansion offers more performance, including up to 2.9x greater AI inferencing while Dell Smart Flow design and Dell Power Manager software advancements deliver greater energy efficiency.

Read more...
Free-to-use solar score for South African homes
Technews Publishing Editor's Choice
The LookSee Solar Score is one of the first of its kind to provide insight into the potential of solar power for South Africa’s residential properties.

Read more...
CA Southern Africa unmasks container security
Technews Publishing IT infrastructure Cyber Security
Adoption of software containers has risen dramatically as more organisations realise the benefits of this virtualised technology.

Read more...
Gallagher to showcase new Controller 7000 single door
Technews Publishing Access Control & Identity Management Products
Gallagher will be showcasing its latest access control innovation, the Controller 7000 Single Door on its stand at Intersec Dubai from 17-19 January 2023.

Read more...
Fast, reliable and secure cloud services
Technews Publishing Editor's Choice Cyber Security IT infrastructure
Security and speed are critical components of today’s cloud-based services infrastructure. Cloudflare offers a range of services supporting these goals beyond what most people think it does.

Read more...