Organisations Urged to Reconsider How They View and Protect Data
November 13 2017 - 8:30AM
Business Wire
A new IDC Perspective Report, entitled Is Data the New
Endpoint?, proposes that organisations need to change how they
think and view data itself as an endpoint, in order to improve how
it can be secured.
The report sponsored by Covata, states that: “Data is an asset
that is increasing in value, created and stored in an ever-growing
variety of devices. It is also increasing in volume, its value only
realised by sharing – and only with those who are authorised to
view it. And yet hackers are seemingly able to steal this data with
ease from those that are unable to secure it sufficiently.” The
authors also question why data breaches are still occurring when
billions of dollars are spent worldwide on various forms of IT
security.
Co-author of the report, Simon Piff, Vice President, Security
Practice for IDC Asia/Pacific, says: “Strategies to protect data
must evolve if we are going to successfully protect this valuable
resource in the future. It’s clear from the almost constant barrage
of headlines announcing the latest data breach that we are not able
to secure this asset with the strategies we have used in the past.
Perhaps by reconsidering our approach to how we think about data,
we can create improved strategies to secure this increasingly
valuable asset.”
This view is echoed by Covata’s CEO and Managing Director, Ted
Pretty: “To greatly reduce security issues, organisations should
implement solutions that follow data from its creation to its end
of useful life, and ensure only authorised users and processes can
access, use and amend the data.
“Traditional perimeter security strategies that have focused on
hardening the networks and systems supporting the data, rather than
the data itself, are what needs to change. A perimeter-focused
strategy is no longer sufficient, and many security technologies
are simply applying that same failed approach,” said Pretty.
The solution, asserts the report, is for organisations to
reconsider their overall security strategies. As the perimeter
“decomposes and becomes more fluid (e.g. cloud, mobile, IoT), data
must be elevated so that each data object can itself participate in
the security portfolio.”
“Clearly the security solutions we have in place today are not
sufficient to protect the data stored within systems, hence the
plethora of high-profile data breaches in the news,” states the
report. “It is time to rethink how we secure the data by
considering data as an endpoint with an active role to play in the
overall security strategy rather than as a passive element in
transactional systems … To be successful, organisations must
develop a program that focuses protection capabilities on the data
itself.”
Recommended actions for organisations and their technology
buyers:
- Consider how and where the data is
created, captured, transmitted and stored, and where the
vulnerabilities are greatest along this value chain
- Identify offerings that can secure that
data at its earliest point of creation and throughout its life
cycle, regardless of whether this is on- or off-premises
- Realise that not all data is of the
same value, and that value may differ from an internal (your own)
and external (the hacker’s) point of view, and then apply the
relevant levels of protection
- Establish a process that can constantly
evaluate this value based on impact to the business, impact of
legislation and impact of new threats and vulnerabilities
The full IDC Perspective Report is available via Covata’s
website at
http://covata.com/insights/whitepapers/idc-data-is-the-new-endpoint/.
About IDC
IDC is the foremost global market intelligence and advisory firm
helping clients understand technology and e-business trends to
develop sound, action-orientated business strategies. For
additional information on IDC, please visit idc.com.
About Covata
Covata is a leading provider of software solutions
that protect data and enable secure collaboration. Our data-centric
security platform empowers governments and businesses to
discover, protect and control their sensitive information. Our
products and platform support multiple use cases including search,
governance and compliance, user behavior and analytics and file
synchronization and sharing.
Covata also provides data discovery, transparent data
encryption, centralised permissions management, and activity
logging for sensitive and regulated information in SharePoint.
With offices and resources in the US, UK Europe and Australia
and coverage in all other regions, our customers span the public
sector and defense, aerospace, technology, finance, media and
sports industries.
We ensure security is never an afterthought, protecting
information and ensuring the safe and efficient sharing of data
across internal and external stakeholders, devices, networks and
geographic regions, providing organisations with control,
visibility and auditability of their sensitive information.
For further information, please visit covata.com.
©2017 Covata Limited or its affiliatesABN 61 120 658 497
View source
version on businesswire.com: http://www.businesswire.com/news/home/20171113005656/en/
LaunchTech CommunicationsKate Davis,
410-698-5211kate@golaunchtech.com
Covata (ASX:CVT)
Historical Stock Chart
From Nov 2024 to Dec 2024
Covata (ASX:CVT)
Historical Stock Chart
From Dec 2023 to Dec 2024