March 4, 2015 By Vikalp Paliwal 2 min read

As a customer, I trust the businesses I interact with to protect my personal data. I don’t want my credit card details or my transaction history to be shared, and I certainly don’t want details about where I am eating or which movie I am watching to become public knowledge.

With online privacy concerns at an all-time high, data security has become a mainstream conversation. It is no longer limited only to boardrooms, but is now also discussed in private living rooms. Along with terrorism and the Ebola virus, data security is one of the biggest potential threats to our nation at this moment in time.

Home Depot, Sony Pictures Entertainment and JPMorgan Chase are just a few of the recent examples of major security breaches caused by either internal users or outside malicious attacks.

Data has always been a strong driver for businesses, and the growing desire of many enterprises to leverage new technologies only exacerbates the already high risk of security and data breaches. In a recent Forbes article, IBM Security Vice President Marc van Zadelhoff makes it clear that with the industry-wide transitions toward the cloud, social, mobile and big data, data is outside the control of the enterprise perimeter and we need to change the way we secure it. From the old perimeter-type approach of firewall and antivirus solutions, we need to adopt the logical “perimeter” approach to secure data, wherever it resides.

When a data breach does occur, enterprises and their IT organizations are often not even aware of where their sensitive data lies. Consequently, they don’t have the right policies and separation of duties to protect sensitive data, especially when accessed by privileged users, as was the case in the recent Morgan Stanley data breach.

Download the free eBook: Bridging the Data Security Gap

Data security today needs to take a holistic approach, and IBM Security offers an effective and efficient solution set that understands and caters to customer processes and anxieties over their sensitive data. IBM InfoSphere Guardium™ can help your organization leverage the cloud, mobile, social and big data with confidence. In the end, this is the basis for your business’ success.

More from Data Protection

3 Strategies to overcome data security challenges in 2024

3 min read - There are over 17 billion internet-connected devices in the world — and experts expect that number will surge to almost 30 billion by 2030.This rapidly growing digital ecosystem makes it increasingly challenging to protect people’s privacy. Attackers only need to be right once to seize databases of personally identifiable information (PII), including payment card information, addresses, phone numbers and Social Security numbers.In addition to the ever-present cybersecurity threats, data security teams must consider the growing list of data compliance laws…

How data residency impacts security and compliance

3 min read - Every piece of your organization’s data is stored in a physical location. Even data stored in a cloud environment lives in a physical location on the virtual server. However, the data may not be in the location you expect, especially if your company uses multiple cloud providers. The data you are trying to protect may be stored literally across the world from where you sit right now or even in multiple locations at the same time. And if you don’t…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today