What is data security?
Data security includes the process and associated tools that protect sensitive information assets, be they in transit, at rest or in use (while processing).
Core element of Data Security is the CIA (Confidentiality, Integrity, Availability) triad security model, applied to the various phases of the data lifecycle (Create, Store, Use, Share, Archive, Destroy)
Data Security encompasses very diverse use cases from classic networks based on perimeter security, to cloud-based environments and IOT.
Since there no single-pane-of-glass solution for data security this creates the challenge of orchestrating policies and controls across all tools and consoles for data security, IAM, etc.
Why it matters
Knowing your data (data mapping, discovery & classification, etc) is the first step to prioritise investments and security controls.
Adaptive controls that evolve based on the data lifecycle are key to make all the other parts of your cybersecurity strategy more effective (IAM, cloud security, etc.).
When all security barriers have been breached, Data security.
© Eviden SAS 2024. All rights reserved.
Maturity
0-2 years
2-5 years
5+ years
The landscape
You cannot protect what you cannot see
Rising changes to identify, discover and track data across the new decentralized and distributed digital environments. Yet, to
properly protect sensitive data, organizations will need to adopt emerging technologies that improve discovery and classification of structured and unstructured data.
The increased use of public and hybrid Cloud has a significant impact on data security
Technologies like CASB, DLP and EDRM can and provide a good control on unstructured data, particularly in a cloud environment and for personal data protection.
Adapt to the regulatory landscape
Data security and privacy laws, such as GDPR in the EU, continue to impact choices in technologies to implement those legislations. In particular, Privacy by Design is now a must for all new implementations, both for structured and unstructured data.
Anticipation
Over the long term, it is vital to align data security (and encryption methods in particular) with upcoming technological trends like the rise of quantum technologies, with both the new capabilities (e.g. QKD) and challenges they present (need for quantum safe-encryption).
Key figures
of those technologies are either already adopted by most organizations or will be in the next two years.
of those technologies are expected to be adopted in the next 2 to 5 years cycle.
of those technologies are transformational and wide spread adoption will take over 5 years.