Express Computer
Home  »  News  »  Big data needs a data-centric security focus: Gartner

Big data needs a data-centric security focus: Gartner

0 22

Chief Information Security Officers (CISOs) should not treat big data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos, according to
Gartner, Inc.

Gartner predicts that, through 2016, more than 80 percent of organizations will fail to develop a consolidated data security policy across silos, leading to potential non-compliance, security breaches and financial liabilities.

“Businesses have traditionally managed data within structured and unstructured silos, driven by inherent requirements to deploy relational database management systems, file storage systems and unstructured file shares,” said Brian Lowans, Principal Research Analyst, Gartner.

However, the advent of big data and cloud storage environments is transforming the way in which data is stored, accessed and processed, and CISOs need to develop a data-centric security approach. Unfortunately this is not common practice today and its planning is critical to avoid uncoordinated data security policies and management,” added Lowans.
 
CISOs need to collaborate with trusted team members to develop and manage an enterprise data security policy that defines data residency requirements, stakeholder responsibilities, business needs, risk appetite, data process needs and security controls.
 
“Although the ability to apply a data security governance policy across data silos is also becoming paramount, the market has so far failed to offer CISOs the data-centric audit and protection (DCAP) products they need to operate across all silos with consistency,” said Earl Perkins, Research Vice President, Gartner.

“Instead, the use of different tools for each silo is complicating the implementation of any usinesswide data security plans due to different functionalities, network architectures and data
repositories,” added Perkins.

Access to public cloud services and infrastructure further complicates this process due to the potential access by cloud service providers and security vendors. Data flows will inevitably result
in a growing need to monitor and audit access, and to protect data across silos. Although vendors continue to develop product capabilities that are applicable to different silo repositories on premises and in the cloud, the market is also evolving toward a DCAP set of solutions, but we are not there yet.
 
“First, CISOs need to evaluate current implementations of DCAP solutions against data security policies that address database, unstructured, cloud storage and big data silos. Second, they need
to identify gaps in the current implementation of their data security policies and review the risks with business stakeholders against potential DCAP solutions,” said Lowans. 

While assessment and revisions to data access policy and its implementation through DCAP solutions will help dictate accountability, it will also require a level of ownership from business unit
stakeholders.
 
“Business stakeholders may not be accustomed to having strong relations with security teams, and CISOs will need to build partnerships with them to develop new management structures for data
security accountability and to identify cross-functional training needs,” concluded Lowans.

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 

Stay updated with News, Trending Stories & Conferences with Express Computer
Follow us on Linkedin
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image