What is data security?

Data security includes the process and associated tools that protect sensitive information assets, be they in transit, at rest or in use (while processing).

Core element of Data Security is the CIA (Confidentiality, Integrity, Availability) triad security model, applied to the various phases of the data lifecycle (Create, Store, Use, Share, Archive, Destroy)

Data Security encompasses very diverse use cases from classic networks based on perimeter security, to cloud-based environments and IOT.

Since there no single-pane-of-glass solution for data security this creates the challenge of orchestrating policies and controls across all tools and consoles for data security, IAM, etc.

Why it matters

Knowing your data (data mapping, discovery & classification, etc) is the first step to prioritise investments and security controls.

Adaptive controls that evolve based on the data lifecycle are key to make all the other parts of your cybersecurity strategy more effective (IAM, cloud security, etc.).

When all security barriers have been breached, Data security.

Blue ball Green ball Yellow ball Red ball Purple ball Diagonal straight lines curves outlines X-labels-Years 0-2 Years 2-5 Years 5+ Years Y-labels-Areas Data security
Maturity
0-2 years
2-5 years
5+ years
 

0-2 years

2-5 years

5+ years

The landscape

You cannot protect what you cannot see

Rising changes to identify, discover and track data across the new decentralized and distributed digital environments. Yet, to

properly protect sensitive data, organizations will need to adopt emerging technologies that improve discovery and classification of structured and unstructured data.

The increased use of public and hybrid Cloud has a significant impact on data security

Technologies like CASB, DLP and EDRM can and provide a good control on unstructured data, particularly in a cloud environment and for personal data protection.

Adapt to the regulatory landscape

Data security and privacy laws, such as GDPR in the EU, continue to impact choices in technologies to implement those legislations. In particular, Privacy by Design is now a must for all new implementations, both for structured and unstructured data.

Anticipation

Over the long term, it is vital to align data security (and encryption methods in particular) with upcoming technological trends like the rise of quantum technologies, with both the new capabilities (e.g. QKD) and challenges they present (need for quantum safe-encryption).

Key figures

48%

of those technologies are either already adopted by most organizations or will be in the next two years.

33%

of those technologies are expected to be adopted in the next 2 to 5 years cycle.

18%

of those technologies are transformational and wide spread adoption will take over 5 years.