Is Data Centric Security the Future? Mar 8, 2016
This will be a particularly timely eWEEKchat conversation on how security is moving ahead in the nascent IoT age.
On Wednesday, March 9, at 11 a.m. PST/2 p.m. EST/7 p.m. GMT, @eWEEKNews will host its 41st monthly #eWEEKChat. The topic will be “Is Data-Centric Security the Future?” It will be moderated by Chris Preimesberger, who serves as eWEEK’s editor of features and analysis.
Some quick facts:
Topic: “Is Data-Centric Security the Future?”
Date/time: March 9, 2016 @11 a.m. PST/2 p.m. EST/7 p.m. GMT
Moderator: Chris Preimesberger: @editingwhiz
Tweetchat handle: Use #eWEEKChat to follow/participate, but it’s easier and more efficient to use real-time chatroom links.
Chatroom real-time links: We have two: http://tweetchat.com/room/eweekchat or http://www.tchat.io/rooms/eweekchat. Both work well. Sign in via Twitter and use #eweekchat for the identifier.
“Is Data-Centric Security the Future?”
Data-centric security is designed to protect data at all times while allowing it to flow freely and securely anywhere, without the need for plug-ins, proxies, gateways or changes in user behavior.
This defines a large trend in IT in which the primary function is the management and manipulation of data itself, rather than security focused primarily on the application, networking or storage. This type of security follows the data item or store around wherever it travels—on-premises or off.
This is as close to airtight a concept as there can be when it comes to securing the Internet of things, many industry observers say.
With the advent of virtualized IT systems, the worldwide explosion in the use of cloud and managed services, and the increasing usage of data storage and big data analytics inside clouds, data is often separated in so-called “chunks” for security purposes and spread in various locations. Later, when the entire file is needed, systems reassemble these chunks—usually with a just-in-time methodology.
All this movement has made conventional security a central problem, and data-centric security—centered around government-level encryption—may have come to the rescue as the only way to handle all this travel in a reliable fashion.
Some of the leading innovators in this space include Thales Security, which recently bought Vormetric for this purpose; IONU, whose data isolation platform creates a separate and secure zone where data is insulated from the outside world; Dataguise, which specializes in data-centric security for NoSQL server shops; and Vera, which does both file-centric and data-centric security.
These are just a few of the data points we’ll talk about on March 9. We also will pose questions such as:
–What do you personally see as the No. 1 advantage of using data-centric security?
–What other companies do you know will become data-centric security players in 2016?
–Do you see, or do you not see, data-centric security becoming mainstream in 2016?
Join us March 9 at 11 a.m. Pacific/2 p.m. Eastern/7 p.m. GMT for an hour. Chances are good that you’ll learn something valuable.