Cybersecurity Cloud & Data

Securing the data pores of an organization with dynamic approaches

Data security today has become of crucial concern. The complications are adding up with further digitization, since several applications make up an organisation’s structure. These companies offer some unique solutions.

According to cybersecurity company Trend Micro, 73% of organizations in India report they are likely to experience a data breach that impacts customer data in the next 12 months. Indian organizations ranked the top three negative consequences of an attack as lost IP, critical infrastructure damage/disruption, and cost of outside consultants and experts.

“Once again we’ve found plenty to keep CISOs awake at night, from operational and infrastructure risks to data protection, threat activity and human-shaped challenges,” said Vijendra Katiyar, Country Manager, India and SAARC, Trend Micro.

“To lower cyber risk, organizations must be better prepared by going back to basics, identifying the critical data most at risk, focusing on the threats that matter most to their business, and delivering multi-layered protection from comprehensive, connected platforms.”

Multi-layered is the key word here, with an organizational structure containing different nodes of inlets and outlets in the form of applications, cloud, etc.

The 5A Methodology for IAM

As communication between various entities within as well as outside an organization becomes digitized, layers of entry and exit points crop up within every structure. This in turn creates a need for securing these entries and exits.

Recently, CMS IT Services came out with a White Paper on following the five As of Identity and Access Management (IAM), namely, assurance, authentication, administration, automation, and analytics.

“Thinking of IAM as a 5A methodology presents it as offering a comprehensive suite of solutions for the whole expanse of areas and entities that are the business of a contemporary business,” the white paper says.

Policy Based Management for Cloud Security

Cloud is a particularly vulnerable area in business organizations as container breaches threaten every day. In 2018 and 2019 exposed breaches caused by cloud misconfigurations resulted in nearly 33.4 billion records in total.

According to the Ponemon Institute’s 2019 report, the average cost per lost record globally is $150. Multiplied by the number of records exposed, misconfigurations cost companies worldwide nearly $5 trillion in 2018 and 2019 alone.

As containers are created rapidly, the growing demands placed upon developers often leaves a security gap that exposes potential threats and risks in the configuration settings. As enterprises accelerate their adoption of cloud technologies, several companies provide the essential method with native tools and language to secure containers for enterprises deploying resources in cloud environments.

For example, Nirmata, a software solutions provider for governance, compliance, security, and automation of production Kubernetes workloads and clusters has created Kyverno, a policy engine designed for Kubernetes.

Nirmata’s mission is to enable the automated management of cloud native applications in an infrastructure agnostic manner. To achieve this, they insist, policy-based management is critical for achieving autonomy across roles while keeping alignment to organizational goals and standards. The company recently raised US $4 million led by Z5 Capital with participation from Uncorrelated Ventures, Samsung Next, and BGV.

A Frictionless API-Based Cloud-Native Approach

In a similar example, McAfee recently announced that MVISION Cloud, part of its secure access service edge (SASE) offering, MVISION Unified Cloud Edge (UCE), now provides enhanced security coverage for Microsoft Dynamics 365, a line of enterprise resource planning and CRM software applications.

This solution complements Dynamics 365 capabilities by using a frictionless API-based cloud-native approach that allows IT teams to seamlessly enforce data loss prevention (DLP) policies and collaboration controls, access control, address threats from insiders and compromised accounts, audit all user activity and secure corporate data as users collaborate in the cloud.

McAfee is one of the only cloud access security broker (CASB) vendor who has released API-integrated enterprise data and threat protection capabilities for Dynamics 365, providing enterprise users with an added layer of security, visibility and control.

Navanwita Bora Sachdev

Navanwita is the editor of The Tech Panda who also frequently publishes stories in news outlets such as The Indian Express, Entrepreneur India, and The Business Standard

Recent Posts

NCoE for AVGC-XR promises to reshape India’s gaming sector similar to IITs & IIMs transforming engineering & management

The Union Cabinet, under the leadership of Prime Minister Narendra Modi, has sanctioned the creation…

13 hours ago

The role of AI & Machine Learning in HRM: Beyond automation

The roles of Artificial Intelligence (AI) and machine learning in Human Resource Management (HRM) today…

2 days ago

A high res multispectral payload delivering the largest area coverage from India

Bangalore based KaleidEO Space Systems, a subsidiary of SatSure Analytics India Pvt Ltd, launched its…

3 days ago

Who’s who at Horasis India Meeting 2024 in Athens

Horasis India Meeting convened its 16th annual meeting on September 15th-16th in Athens, Greece. The…

4 days ago

M&A: The art of the deal

The Tech Panda takes a look at recent mergers and acquisitions within various tech ecosystems…

7 days ago

Big tech can’t risk being left out of the AI race even if it means over investing in it

With the Artificial Intelligence (AI) hype getting louder and louder, big tech has no choice…

1 week ago