Data security

What is data security?

  • Data security includes the process and associated tools that protect sensitive information assets, be they in transit, at rest or in use (while processing).
  • Core element of Data Security is the CIA (Confidentiality, Integrity, Availability) triad security model, applied to the various phases of the data lifecycle (Create, Store, Use, Share, Archive, Destroy)
  • Data Security encompasses very diverse use cases from classic networks based on perimeter security, to cloud-based environments and IOT.
  • Since there no single-pane-of-glass solution for data security this creates the challenge of orchestrating policies and controls across all tools and consoles for data security, IAM, etc.

Why it matters?

  • Knowing your data (data mapping, discovery & classification, etc) is the first step to prioritise investments and security controls.
  • Adaptive controls that evolve based on the data lifecycle are key to make all the other parts of your cybersecurity strategy more effective (IAM, cloud security, etc.).
  • When all security barriers have been breached, Data security.

Blue ballGreen ballYellow ballRed ballPurple ballDiagonal straight linescurvesoutlinesX-labels-Years0-2 years2-5 years5+ yearsY-labels-AreasData security
Maturity
0-2 years
2-5 years
5+ years
 

0-2 years

2-5 years

5+ years

The landscape

Real-time prevention

Adapt to the regulatory landscape

Data security and privacy laws, such as GDPR in the EU, continue to impact choices in technologies to implement those legislations. In particular, Privacy by Design is now a must for all new implementations, both for structured and unstructured data.

Real-time prevention

The increased use of public and hybrid Cloud has a significant impact on data security

Technologies like CASB, DLP and EDRM can and provide a good control on unstructured data, particularly in a cloud environment and for personal data protection.

Top-down identification

Dealing with the upcoming IoT wave of largely unprotected objects

a specific effort will be required in the field of data security to leverage Lightweight encryption, specifically designed to support objects with limited computational resources.

Top-down identification

Anticipation

Over the long term, it is vital to align data security (and encryption methods in particular) with upcoming technological trends like the rise of quantum technologies, with both the new capabilities (e.g. QKD) and challenges they present (need for quantum safe-encryption).

Key figures

38%

of those technologies are either already adopted by most organizations or will be in the next two years.

28%

of those technologies are expected to be adopted in the next 2 to 5 years cycle.

34%

of those technologies are transformational and wide spread adoption will take over 5 years.