How to Ensure that ‘Agile’ Data Is Adequately Secured

How to Ensure that 'Agile' Data Is Adequately Secured

It’s not unusual for companies to have siloed data, but it’s not OK for that data to remain siloed—not if a company wants to stay competitive. The ability to integrate data from disparate sources in order to analyze and make sense of it is not only key to doing business today; it’s the difference between a company’s success and failure. But so, too, is data security.

And therein lies the rub. Companies are trying to strike a delicate balance between an agile data model and strong data security. Companies must be able to zero in quickly on customer needs and just as quickly provide products and services that meet those needs. But this pace cannot come at the price of data security, privacy and compliance. And nowhere is this more true than at the database level, where all of this information is stored.

The level of integration and agility that companies must achieve today requires a high-level of flexibility and security. It’s a huge challenge: When your most sensitive and valuable data is being integrated across multiple silos of data, it takes a combination of products and processes to ensure that data at rest and in motion is saved in a secure and well-governed manner. Implemented in a strategic way, these capabilities can protect against some of the most sophisticated security threats companies are facing today—and in doing so provide competitive advantage.

True data security in this dynamic new model requires

Advanced encryption: Encryption is not a new feature in databases, but encryption must be implemented in an increasingly more strategic and systematic way to protect data from cyber criminals and insider threats. Advanced encryption involves the selective and transparent encryption of data, configuration and logs.  This includes granular, role-based access, standards-based cryptography, advanced key management, granular separation of duties, and state-of-art algorithms that drastically decrease exposure. Advanced encryption is important due to the rise in frequency and complexity of internal and external security threats, expanding security requirements, and the growing use of the cloud among companies large and small.

Redaction: Companies need to balance protection of data with the ability to share it. Redaction enables companies to share information with minimal effort by concealing or masking sensitive information—such as names and Social Security numbers--when data is exported for sharing purposes. Companies must also be able to implement policy-based redaction using both custom and out-of-the-box rules, including partial masking, full masking and concealment. Some purposes require sample data for testing or anonymized information for data analysis that need policy-based redaction using consistent data outputs based on dictionary and deterministic masking.

Element-level security: While redaction in and of itself is important, companies need to be able to do it in real-time, as close to the data as possible. Security at the element, or property, level--based on an employee’s role--enables companies to protect sensitive information during queries and updates. Element-level security should be extended into document elements and built into indexes for performance. Rich XML and JSON document models can even describe in the data itself, using a concept called markings, how element-level security should protect all parts of the document. This allows security definitions to actually travel with the data in contrast to definitions in a schema table.

Certification: There are a lot of options out there, and it can be difficult to determine which products are needed in the first place--not to mention which actually do what they say they will do. Certification such as Common Criteria ensures that a product can be evaluated to determine that is meets specific security properties at a certain level of assurance.

These data security features are important across company sizes and industries. Take, for instance, the activities involved in serving customers in healthcare, or the financial industry. A doctor or financial analyst should have access to a great deal of patient or customer information; on the other hand, a call center user should have a restricted view.

Implementing this type of security at the application level leaves too many open entry points, giving attackers plenty of opportunity to bypass security and collect information. Implementing security rules in a database schema reduce the business agility, as schema changes are costly and brittle. 

True data security has to be enforced at the database level in real-time and at rest, and better yet, based on information in the data itself and not schemas. A certified multi-model database with capabilities such as encryption at rest, redaction and element-level security ensures that companies can meet their security goals, while quickly adapting to evolving customer needs .

With data driving business decisions, companies must be able to effectively manage the entities and relationships that define the business. And with this enhanced data agility comes the need for enhanced security. Companies must ensure that they are implementing not only database technology that supports the integration needed to connect the dots between disparate data, but also the security required to protect that data.



Featured

  • Keynote Speakers Announced for ISC West 2025

    ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), unveiled its 2025 Keynote Series. Featuring a powerhouse lineup of experts in cybersecurity, retail security, and leadership, each keynote will offer invaluable insights into the challenges and opportunities transforming the field of security. Read Now

    • Industry Events
    • ISC West
  • Study: Video Doorbells Have a 71% Service Attach Rate

    Parks Associates recently announced a new white paper, Consumer IoT Product Development: Managing Costs, Optimizing Revenues, which provides companies with a business-planning blueprint to evaluate how a consumer IoT solution will perform across its lifetime. Subscription services, such as video storage and professional monitoring, can be critical for covering ongoing cloud and support costs Read Now

  • Michigan City Fights Retail Crime With AI-Powered Video Surveillance, 911 Camera Sharing

    To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Read Now

  • TSA Intercepts 6,678 Firearms at Airport Security Checkpoints in 2024

    During 2024, the Transportation Security Administration (TSA) intercepted a total of 6,678 firearms at airport security checkpoints, preventing them from getting into the secure areas of the airport and onboard aircraft. Approximately 94% of these firearms were loaded. This total is a minor decrease from the 6,737 firearms stopped in 2023. Throughout 2024, TSA managed its “Prepare, Pack, Declare” public awareness campaign to explain the steps for safely traveling with a firearm. Read Now

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3