The Move to Data-Centric Security

Mark Bower of Voltage Security on New Strategies to Protect Data
Organizations typically secure data where it resides and is transmitted. Data-centric security strategies focus on securing the data itself. Mark Bower of Voltage Security explains.

Evolving threats have proven that it is far too easy for unauthorized users to gain access to data at rest and in motion, contends Bower, vice president of product management at Voltage Security. The key, then, is to focus on securing the data.

"If you can protect the data itself in such a way that you can preserve the original structure, look and feel, behavior, intent and more importantly the value of that information," Bower says, "then you can protect it over its lifecycle, such that if it does fall into the wrong hands, either through malicious attack or through an insider access ... then you're not giving up live information to the attacker."

Big data analytics now gives organizations unprecedented access to their own data, as well as that belonging to customers and partners worldwide. But with big data comes an even bigger responsibility - often a regulatory obligation - to secure that data.

"With the rush to big data uses, sometimes the security and compliance aspects are afterthoughts," Bower says. "What I'm starting to see is the effects of that, where you've got very large projects that may actually be stopped dead if an organization isn't thinking about how to protect the data."

In a pre-RSA Conference interview about data-centric security, Bower discusses:

  • Common mistakes organizations make with data analytics;
  • New strategies for securing data;
  • How to deploy data-centric security.

Bower is a noted expert in data protection solutions, with more than two decades of industry and technology experience in this area. He is heavily involved in industry standards bodies, including the PCI Security Standards Council and the Security POS Vendors Alliance (SPVA). He has authored several patents for e-commerce technology innovations in POS software management and remote control based on his extensive experience in banking and payment solutions.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.