Page 18 - index
P. 18
The reality is that both enterprise perimeters and cloud offerings are permeable to outside
attacks that target insider accounts or to a traditional inside employee compromise. Security
controls, commitments and protection methods must now take into account this change, and
add a layer of security directly around data.
At the end of the day, once a malicious insider is in, they are in. Enterprises that want business
efficiency and adaptability, need enhanced visibility into security controls. Ultimately, cloud
service providers need to address these needs.
Bottom line? With proper data controls, you can have your cake (sufficient use of privileged
accounts) and eat it too (simultaneous protection of that data).
About the Author:
Derek Tumulak joined the company in June 2012 because he felt Vormetric
was the best place for him to leverage the product management and
engineering expertise he’d amassed over 15 years in the information security
industry. As head of the product management organization, Tumulak is
responsible for product direction and strategy, working closely with
Vormetric’s enterprise, government and cloud service provider customers to
develop and deliver products that meet their data security needs in the face of a rapidly
intensifying threat landscape and the corporate mandate to leverage cloud technologies.
Tumulak has deep domain expertise, having spent three years as vice president of product
management for enterprise data protection at SafeNet. He also served as vice president of
product management and engineering for Ingrian (acquired by SafeNet) where he helped grow
the company from an early-stage startup to a leading provider of data security and compliance
solutions for enterprises, financial services, retail businesses and healthcare organizations.
Tumulak holds a bachelor’s degree in computer engineering from the University of Waterloo in
Canada.
18 Cyber Warnings E-Magazine – July 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide