+ All Categories
Home > Business > Why Data Centric Security Matters

Why Data Centric Security Matters

Date post: 28-Nov-2014
Category:
Upload: fasoo
View: 85 times
Download: 3 times
Share this document with a friend
Description:
Learn how to protect your business from losing precious data to hackers and competition.
20
Why Data-Centric Security Matters
Transcript
Page 1: Why Data Centric Security Matters

Why Data-Centric Security Matters

Page 2: Why Data Centric Security Matters
Page 3: Why Data Centric Security Matters

B a s e d

is what most organizations focus on!!!

Security

Perimeter

Page 4: Why Data Centric Security Matters

W h y I s T h a t

W r o n g ? ? ?

Page 5: Why Data Centric Security Matters

This doesn’t account for accidental

or malicious exposure of sensitive info

Page 6: Why Data Centric Security Matters

???

W h a t I s T h e

Proper Soluti on

Page 7: Why Data Centric Security Matters

Security

Data-Centric

Page 8: Why Data Centric Security Matters

It’s security for individual files which keeps data safe even

after it leaves a business network

Page 9: Why Data Centric Security Matters

A n

Example

Here’s

Page 10: Why Data Centric Security Matters

Company X invested a great deal of time, effort, and

money to secure its network

Page 11: Why Data Centric Security Matters

It went way beyond firewall to block hackers, executing smart policies, and security

controls

Page 12: Why Data Centric Security Matters

E v e r y t h i n g Wa sD o n e

Correct ly R i g h t? ? ?

Page 13: Why Data Centric Security Matters

Not Totally! Company X security measures neglected

enterprise based data-centric security

Page 14: Why Data Centric Security Matters

B e c a m e

Company X

This

Weakness

Page 15: Why Data Centric Security Matters

When Company X sent its VP to a conference, he ran into problems when he tried to

share some files

Page 16: Why Data Centric Security Matters

Once he shared these files to a Dropbox folder, the VP didn’t

realize it was already with non-Company peers

Page 17: Why Data Centric Security Matters

Competi ti on

I t W a s

Company X

Page 18: Why Data Centric Security Matters

Competition gained access to the files because no

authentication was required

Page 19: Why Data Centric Security Matters

Uncommon

T h e s eS i t u a ti o n s

Aren’t

Page 20: Why Data Centric Security Matters

Which could have been prevented with an enterprise

based data-centric file security system


Recommended