Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

9 Things Your Competitors Know About Data-centric Security

9 Things Your Competitors Know About Data-centric Security

Data-centric Security, at its heart, is just another lock. But what happens when that lock is picked (keys stolen, credentials compromised)? Over the coming quarters, effective monitoring and access analytics will become key to ensuring the success of this promising initiative.

Paul Kraus, Eastwind Networks

We will see data-centric security becoming more and more relevant and essential over other forms of security. Network security can be compromised, however data security will prevent data that is hacked, from being read.

Arun Umapathy NYC Devshop

At the moment, data-centric security is receiving a great deal of attention. However, in higher-risk environments, there is resistance to implementation. This speaks to education and change management that goes beyond next several quarters.

Howard Penrose, SMRP

Data-centric approach to security is a double-edged sword. Focus on protecting what needs to be protected can also lead to sprawling complexity if overdone. The best approach is to focus on as few classes of data as possible.

Kevin Barnes, SightCommerce

Data-centric security will continue to be a hot area, but the amount of data shown to human analysts will decline. It’s all about machines surfacing the interesting information.

Kane Lightowler, Carbon Black

The primary change within Data-centric security will be a trend toward developer targeted Platform-as-a-Service security solutions and away from costly and custom security hardware infrastructure.

Yaron Guez, Crypteron

As we move increasingly to cloud models, thus releasing control of infrastructure, security providers will focus more on the data itself and how we can manage, classify, and protect it.

Matthew Kozloski, Kelser Corporation

In relation to data-centric security we excel at authenticating data users and data encryption, but first we need to go back to the basics of data discovery and classification.

Andrew Bycroft, The Security Artist

The dual phenomena of cybercrime and big data make it critical that enterprises understand provenance, governance and data management as part of a holistic security story.

Nitin Donde, Talena

This post first appeared on Flarrio - Creating Competitive Edge Using Emerging, please read the originial post: here

Share the post

9 Things Your Competitors Know About Data-centric Security


Subscribe to Flarrio - Creating Competitive Edge Using Emerging

Get updates delivered right to your inbox!

Thank you for your subscription