March 6, 2015 By Mark Simmonds 3 min read

Life used to be so much simpler, particularly when it came to data management. With centralized data and processing, you could just lock the computer room door and say goodnight. This may have been convenient for the data center staff, but it was far less so for end users. Back then, the focus was on structured data and nice tables of data in normalized forms that were easy to query and easy to manage.

Widespread Changes

Little did we know — oh, boy, how little did we know! — about the value of all the other data that would soon be digitized and stored, data we would still ignore for a long time: dark data. Then, big data woke us up and made us aware that combining and integrating as much data as possible about a situation, issue, event, person, company, product, etc. could help build new insights and help us understand more by taking different perspectives with a problem. Being able to take into account customer sentiment, geospatial information, social media, multimedia, sensor data and time sensitivity as part of our analytics strategies could help us predict the next best action with degrees of confidence. Of course, all this represented a great opportunity for both the consumer and the business.

Then came the cloud, a great opportunity for businesses to become more agile through cloud and service enablement of information and IT resources. The cloud also represented the opportunity to keep data, processes and applications off-premises in a public cloud while keeping other data and services closer to home in a private cloud.

Now, enter the smart-connected device, an always-on channel kept within arm’s reach that stays with us as we travel the globe. It represents the opportunity to conduct business anytime, anywhere. In fact, it is estimated that there are more smart-connected devices than people on the planet and that data through the mobile channel has a compound annual growth of more than 57 percent. Mobile adds two new and very important dimensions — geographic location and time sensitivity — driving business analytics closer to real time to be able to analyze and influence the consumer in the mobile moment.

Implementing Controls

So, now you have more data in terms of volume and new types of data and compressed time in which to analyze and manage it. You have to secure it all by putting rigorous controls in place. Data is everywhere and is being accessed in the following places:

  • On-premises
  • Off-premises
  • Solid-state memory
  • Hard disks
  • Laptops or PCs
  • Servers
  • Data marts
  • Operational databases
  • Test and development databases
  • Hadoop clusters
  • Temporary repositories
  • File shares
  • The cloud
  • Flash drives
  • Mobile devices

Many companies don’t even know what they have or where all of it is. Throw into the mix the ever-increasing amount of industry and regulatory compliance, and you really start to wonder how you will ever cope.

Cybercriminals know all about your data management challenges and how to take advantage of them. They have been very clever in finding new and faster ways to breach and extract data. It can take weeks and months to discover a breach, by which time the damage has been done. What’s needed is a way to sense what is happening or what might happen with real-time monitoring, alerting and prevention for all your data across the entire enterprise.

Data Protection Solutions

IBM InfoSphere™ information protection solutions can help reduce the costs and risks of breaches with a more proactive and preventative approach to ensure the security and privacy of all your data, regardless of platform and data source, across the entire enterprise. From discovering what you have, performing vulnerability assessments, putting the right controls in place to protect and secure your information and proving you are compliant with the latest legislation and regulations, IBM can provide your organization with an end-to-end enterprise solution.

If you want to learn more, check out the slide deck from my recent presentation at IBM InterConnect 2015.

Image Source: iStock

More from Data Protection

Router reality check: 86% of default passwords have never been changed

4 min read - Misconfigurations remain a popular compromise point — and routers are leading the way.According to recent survey data, 86% of respondents have never changed their router admin password, and 52% have never adjusted any factory settings. This puts attackers in the perfect position to compromise enterprise networks. Why put the time and effort into creating phishing emails and stealing staff data when supposedly secure devices can be accessed using "admin" and "password" as credentials?It's time for a router reality check.Rising router risksRouters…

Preparing for the future of data privacy

4 min read - The focus on data privacy started to quickly shift beyond compliance in recent years and is expected to move even faster in the near future. Not surprisingly, the Thomson Reuters Risk & Compliance Survey Report found that 82% of respondents cited data and cybersecurity concerns as their organization’s greatest risk. However, the majority of organizations noticed a recent shift: that their organization has been moving from compliance as a “check the box” task to a strategic function.With this evolution in…

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today