Protect the data, dummy.

In a recent video interview with at the PwC Business Forum, PwC cyber security partner Kris McConkey said in ten seconds what we at Dataguise have been educating the market on for the past several years:

“A lot of organizations are going to be looking at how they secure data, as opposed to the systems, and will focus on keeping data encrypted but only readable by people with the right authority and access levels.”

It’s nice to see the concept of data-centric security finally being acknowledged and embraced by leading cyber security professionals. It’s not only nice, but it’s needed, now more than ever. Today, mobility and interconnectivity are parts of our digital lives. The boundaries between the digital and real worlds are disappearing, and so are the security perimeters enterprises have put in place to protect their data.

But how much time, effort, and money should be spent on protecting all of your data, versus your most sensitive data? As McConkey reiterates, it’s time for organizations to “figure out what kind of data they need to protect and figure out how to protect that better.”


Big data and the cloud are catching on fast, and the only thing holding many companies back from reaping the benefits of these promising technologies is data security — in other words, fear of a data breach or compliance violation. With data-centric security, you can protect the data that needs protecting. No more. No less. Resources can be spent accordingly. Legal fines can be avoided, brand reputations kept intact.

The old KISS (“keep it simple, stupid”) adage came to mind as I read the article — thus, my attempt at a clever and in-no-way-insulting title for this blog entry. At Dataguise, our product is pretty darn simple to use, and our customers see immediate ROI. Data security doesn’t have to be a big, complicated, fear-inducing concept. It just, simply, has to secure the data that needs to be secured.

We spent way more than ten seconds creating a three-part eBook series to educate customers on why big data platforms like Hadoop require a new, data-centric approach to security. You can download part 1 of the eBook series here: What’s Different About Data 2.0?

YouTube video shared via