October 29, 2020 By Leslie Wiggins 5 min read

If you are like most security leaders responsible for protecting your company’s crown jewels, you’ve certainly asked: Can malicious insiders access my organization’s sensitive and mission-critical data? Indeed, it’s a good question to ask, because there may be unseen torpedoes in motion that can sink your efforts to curtail this volatile behavior.

Too few organizations can fully visualize and understand what’s happening to sensitive and regulated data. Being able to accomplish these goals and protect the data powering your business is more important than it has ever been. With the data security market currently in flux — as niche players seek to merge with other players simply to survive in the face of increasingly rigorous client requirements, complex cloud migrations and a growing list of data privacy and cybersecurity compliance requirements — it can be difficult to objectively compare and contrast leading vendors.

This has the unintended impact of complicating an organization’s ability to develop a balanced and complete data security program. Building such a program is more important than ever. Why? Primarily, the goal is to avoid a breach, but equally important is the ability to fully meet data privacy and compliance requirements, avoiding fines and loss of customer trust. Some vendors tell organizations that a one-size-fits-all approach to data privacy and compliance is ‘good enough’ to accomplish these goals — and that they can still manage to increase a client’s return on investment (ROI).

See how Guardium compares

Data Breach Facts

Let’s unpack the facts. Data security breaches are more frequent and more expensive than in the past. The latest research shows that the global average total cost of a data breach is now $3.86 million. Even more pressing, the average cost of a data breach related to an insider is now $11.45 million, and insider threat issues are present in 50% of breaches. As the data demonstrates, insider threat-related breaches can be more costly. Why is this? With their credentials, insiders — or those posing as insiders — have more access to sensitive and regulated data and therefore are able to do more damage.

These realities mean that single-niche vendors, with their siloed and narrow scope, are less capable of addressing complex modern data security, data privacy and cybersecurity compliance requirements. Knowing this might explain why a startup attempting to pioneer agentless data security — which can’t support real-time use cases — decided to merge with an organization that provides technology that’s traditional and IT centric. It’s unclear how these vastly different architectures might fit together. As such, this vendor combination may create issues for clients’ efforts to deploy a robust, flexible and modern data security and compliance program through multiple legacy architectures.

To help you traverse this new and potentially confusing landscape, make sure you can achieve the best practices laid out below — and can comfortably answer the following questions about your data security solution — to confidently meet your organization’s specific data security and protection use cases.

1. Spot, Stop and Defend

Can your data security solution support real-time data activity monitoring? Can it leverage advanced analytics and behavioral analysis to spot and stop an insider breach or application hijack against mission-critical data?

Things to consider: Passive methods of data collection provided by the agentless approach only provide limited, after-the-fact support for compliance. This data collection technique may be appropriate to support auditing for data sources without mission-critical data, but it’s not enough to support compliance or security use cases for mission-critical or regulated data. For this sensitive use case, it is also imperative for data security specialists to leverage easy-to-understand analytics that can help identify user behavioral anomalies and trends.

The startup vendor mentioned above has been positioning agentless data collection as the right answer for all use cases. This acquisition could signal a change in direction and strategy that may give clients only using agentless data security pause. Both agent-based and agentless data collection are necessary for a complete data security program.

2. Reduce the Burden

How many steps do you have to take to connect to a remediation platform and open a ticket, integrate with a third-party application or create a report? It’s also worth taking into account whether your team needs any special skills to do these things.

Things to consider: Organizations generally have less budget and fewer resources to deploy across different initiatives. It’s important to invest in a solution that’s easy to use and that requires fewer specialized skills to use and maintain. For example, you shouldn’t need deep structured query language (SQL) skills just to run a report. It is nonsensical to have to go out to a command line and follow a bunch of steps just to open a ticket. This is what certain vendors expect from their clients’ data security specialists. It is difficult to imagine an organization that wants to require this level of skill, when the specialist’s attention should be focused on high-impact data security issues and quickly pulling and sharing reports. Ask yourself: Could my team quickly create a custom report on their own using this technology? 

3. Modernize to Reduce Total Cost of Ownership (TCO)

Business pressures have changed, and organizations are pressing IT teams to start moving infrastructure to the cloud while supporting hybrid environments. To meet these demands while protecting current investments, businesses are looking to modernization to help reduce overall costs and to make it easier to maintain their data security solutions.

Things to consider: Architectural modernization brings with it some built-in benefits that make it easier to use and maintain solutions. Organizations should be able to deploy solutions on-premises today, then shift to public or private clouds when needed. Modernization also can provide benefits such as autoscaling, native disaster recovery, low latency with high performance, in-place upgrades and multi-tenancy for a better overall experience and reduced TCO. There are few vendors who can currently deliver this modern approach. Other vendors are resting on relative strength in supporting multiple legacy architectures, which can result in slowing down a client’s cloud migration.

4. Gather and Go

Do your teams have to manually normalize the audit data that’s being collected, and then update the work they’ve done every time a new data source version is released? How frequently does this rework need to be done?

Things to consider: Data security specialists should be able to readily use monitoring and audit data in their data security solution. This is only possible when the solution automatically normalizes data for consumption (e.g., for reporting and analytics). This rapid access supports audit requirements and security use cases without having to spend the extra time and unnecessary expense to make that data usable.

5. Break Down Silos

To be effective in this age of ever-more-distributed data and rising threats, data security can no longer exist in a silo. Data security capabilities must be automated and orchestrated to work as part of the bigger security ecosystem and to help security teams collaborate. Basic integration is no longer sufficient to support the broader data security ecosystem and the sheer number of different data sources and data security tools that organizations are trying to tie together and leverage.

Things to consider: Without the ability to support automation, orchestration and collaboration, teams end up working in silos across different data security tools, which drives up costs, slows down data security and protection activities and stalls time to value.

Looking across these five best practices, there is one vendor uniquely positioned to help your organization execute. There is one data security vendor with a vision that is centered around our client requirements — around modernization and around depth and breadth of capabilities — and that has been consistently market-leading along the way.

Don’t be torpedoed by vendors who opportunistically change their strategy to fit their technology. Go with a thought leader and visionary. Hear from our customers — and see how they’re deriving significant value from their data security investments.

Download the report

More from Data Protection

Data security tools make data loss prevention more efficient

3 min read - As businesses navigate the complexities of modern-day cybersecurity initiatives, data loss prevention (DLP) software is the frontline defense against potential data breaches and exfiltration. DLP solutions allow organizations to detect, react to and prevent data leakage or misuse of sensitive information that can lead to catastrophic consequences. However, while DLP solutions play a critical role in cybersecurity, their effectiveness significantly improves when integrated with the right tools and infrastructure. Key limitations of DLP solutions (and how to overcome them) DLP…

Defense in depth: Layering your security coverage

2 min read - The more valuable a possession, the more steps you take to protect it. A home, for example, is protected by the lock systems on doors and windows, but the valuable or sensitive items that a criminal might steal are stored with even more security — in a locked filing cabinet or a safe. This provides layers of protection for the things you really don’t want a thief to get their hands on. You tailor each item’s protection accordingly, depending on…

What is data security posture management?

3 min read - Do you know where all your organization’s data resides across your hybrid cloud environment? Is it appropriately protected? How sure are you? 30%? 50%? It may not be enough. The Cost of a Data Breach Report 2023 revealed that 82% of breaches involved data in the cloud, and 39% of breached data was stored across multiple types of environments. If you have any doubt, your enterprise should consider acquiring a data security posture management (DSPM) solution. With the global average…

Cost of a data breach: The evolving role of law enforcement

4 min read - If someone broke into your company’s office to steal your valuable assets, your first step would be to contact law enforcement. But would your reaction be the same if someone broke into your company’s network and accessed your most valuable assets through a data breach? A decade ago, when smartphones were still relatively new and most people were still coming to understand the value of data both corporate-wide and personally, there was little incentive to report cyber crime. It was…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today