Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Data security

What is data security?

  • Data security includes the process and associated tools that protect sensitive information assets, be they in transit, at rest or in use (while processing).
  • Core element of Data Security is the CIA (Confidentiality, Integrity, Availability) triad security model, applied to the various phases of the data lifecycle (Create, Store, Use, Share, Archive, Destroy)
  • Data Security encompasses very diverse use cases from classic networks based on perimeter security, to cloud-based environments and IOT.
  • Since there no single-pane-of-glass solution for data security this creates the challenge of orchestrating policies and controls across all tools and consoles for data security, IAM, etc.

Why it matters?

  • Knowing your data (data mapping, discovery & classification, etc) is the first step to prioritise investments and security controls.
  • Adaptive controls that evolve based on the data lifecycle are key to make all the other parts of your cybersecurity strategy more effective (IAM, cloud security, etc.).
  • When all security barriers have been breached, Data security.

Blue ball Green ball Yellow ball Red ball Purple ball Diagonal straight lines curves outlines X-labels-Years 0-2 years 2-5 years 5+ years Y-labels-Areas Data security
Maturity
0-2 years
2-5 years
5+ years
 

0-2 years

2-5 years

5+ years

The landscape

You cannot protect what you cannot see

Rising changes to identify, discover and track data across the new decentralized and distributed digital environments. Yet, to

properly protect sensitive data, organizations will need to adopt emerging technologies that improve discovery and classification of structured and unstructured data.

Real-time prevention

The increased use of public and hybrid Cloud has a significant impact on data security

Technologies like CASB, DLP and EDRM can and provide a good control on unstructured data, particularly in a cloud environment and for personal data protection.

Real-time prevention

Adapt to the regulatory landscape

Data security and privacy laws, such as GDPR in the EU, continue to impact choices in technologies to implement those legislations. In particular, Privacy by Design is now a must for all new implementations, both for structured and unstructured data.

Top-down identification

Anticipation

Over the long term, it is vital to align data security (and encryption methods in particular) with upcoming technological trends like the rise of quantum technologies, with both the new capabilities (e.g. QKD) and challenges they present (need for quantum safe-encryption).

Key figures

48%

of those technologies are either already adopted by most organizations or will be in the next two years.

33%

of those technologies are expected to be adopted in the next 2 to 5 years cycle.

18%

of those technologies are transformational and wide spread adoption will take over 5 years.