Page 41 - index
P. 41
Fortunately, the technology is now simple to deploy and manage. With recent developments
that leverage the hardware encryption capabilities of today’s CPUs, it also has minimal
impact on performance. Access control has also created thorny problems in the past, with
traditional solutions making it nearly impossible for system maintenance, backup and other
management tasks to continue without radical changes in operation. Implemented correctly,
encryption with access control solves these problems – by never decrypting data except for
authorized users and programs, system level tasks can complete without potential exposure
of data. Monitoring and analyzing data access is a newer problem – but can be addressed
straightforwardly by collecting data access information from encryption and access control
solutions and analyzing data using a security information and event management (SIEM)
solution or big data for security implementation.
Instead of being viewed as expensive, intrusive and complex, data-centric security should be
looked at as a catalyst enabling business, government and educational institutions alike to
achieve their internal objectives, reduce risks and meet the needs of customers. There’s no
excuse for unprotected data, regardless of where it lies. Remember when it comes to data
security, it’s always easy to ignore insider threats until someone gets hurt.
About the author
Alan Kessler joined the company in 2012 because he firmly believes
that Vormetric has the potential to become the frontrunner in the data
security industry. As CEO, Kessler is further accelerating Vormetric’s
business momentum by expanding the company’s global footprint,
targeting untapped market opportunities, achieving operational
excellence, and extending Vormetric’s leadership position in helping
enterprises mitigate business risk across physical, virtual and cloud
environments. Kessler has a proven track record of directing global corporate strategy and
operations for security, enterprise software and storage systems leaders such as HP,
TippingPoint (a division of 3Com), Attune Systems and Palm, Inc. Kessler holds a
bachelor's degree in business from San Jose State University and an MBA from the
University of California, Berkeley. Alan can be reached online at @kessalan and at our
company website http://www.vormetric.com/.
41 Cyber Warnings E-Magazine – August 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide