AUG 13, 2014 5:00am ET

Related Links

Beyond Big Data: Consider the Impact of Emerging Technologies on Data Management
September 19, 2014
Customer Experience Increasingly the Focus of Big Data Projects
September 19, 2014
Big Data is More Than Just Hype
September 18, 2014

Web Seminars

Essential Guide to Using Data Virtualization for Big Data Analytics
September 24, 2014
Integrating Relational Database Data with NoSQL Database Data
October 23, 2014

Be Prepared: Breach and Data Theft ‘Inevitable’

Print
Reprints
Email

Cyber security attacks directed against enterprises have increased both in numbers and sophistication over the past decade, to a point where breach and data theft have become inevitable, says research firm ABI. This has led to the demand for solutions and services aimed at enterprise-wide data loss, protection and prevention, the firm says.

Get access to this article and thousands more...

All Information Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to:

  • Full access to information-management.com including all searchable archived content
  • Exclusive E-Newsletters delivering the latest headlines to your inbox
  • Access to White Papers, Web Seminars, and Blog Discussions
  • Discounts to upcoming conferences & events
  • Uninterrupted access to all sponsored content, and MORE!

Already Registered?

Filed under:

Advertisement

Comments (2)
I agree that "Cyber security attacks directed against enterprises have increased both in numbers and sophistication over the past decade, to a point where breach and data theft have become inevitable" and I think it is concerning that less than 14% of breaches are detected by internal security tools according to the annual international breach investigations report by Verizon. Detection by external third party entities unfortunately increased from approximately 10% to 25% during the last three years. Specifically notification by law enforcement increased from around 25% to 33% during the last three years.

Unfortunately, current approaches with monitoring and intrusion detection products can't tell you what normal looks like in your own systems and SIEM technology is simply too slowly to be useful for security analytics.

Advancements in Big Data security analytics may help over time, but we don't have time to wait, so we need to protect our sensitive data itself.

I also agree that "An effective data protection strategy requires systems that protect data across databases, applications, networks and endpoint devices" and I think the good news can be found in studies showing that users of data tokenization experience up to 50 % fewer security-related incidents (e.g. unauthorized access, data loss, or data exposure) than non-users.

Protecting the data flow with data tokenization looks like a promising approach.

Ulf Mattsson, CTO Protegrity

Posted by Ulf M | Thursday, August 14 2014 at 8:27AM ET
The problem is that every solution out there claims to have "DLP" capabilities, however the function of a DLP system is to be a precise tool that monitors and can really protect sensitive data.

Security and compliance officers must understand and require that their DLP system is able to have answers to questions such as, "What data do I want to protect?", "Can my DLP system classify data correctly in real-time?" and Can my DLP system fingerprint my data without choking, so the system accurately detects data? or "Can I truly prevent a data breach?"

Plus any real DLP system must have: - Real-time inspection of sensitive data - 100% Detection Accuracy on fingerprinted data - Coverage of ALL Ports ALL Protocols ALL Channels - Plug & Play - easy to use (Unified Policy Making, Workflow, Deployment, etc.) - Effective Data Classification - Zero False Positives - Prevent Data Leakage

If your DLP system cannot accomplish these basic requirements, it's time to CHANGE to or consider a different Data Loss Prevention solution which can.

Wendy Cohen CISO GTB Technologies, Inc. The Content-Aware Data Protection Co.

Posted by Wendy C | Monday, August 18 2014 at 10:08AM ET
Add Your Comments:
You must be registered to post a comment.
Not Registered?
You must be registered to post a comment. Click here to register.
Already registered? Log in here
Please note you must now log in with your email address and password.
Twitter
Facebook
LinkedIn
Login  |  My Account  |  White Papers  |  Web Seminars  |  Events |  Newsletters |  eBooks
FOLLOW US
Please note you must now log in with your email address and password.