• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

A deeper look at Data Security readiness


By VARINDIA - 2014-09-22
A deeper look at Data Security readiness

 

Nishant Verma,
Country Manager India & SAARC, WinMagic

 

A key foundation or the first pillar of any data security solution should start with data encryption and key management. If a solution is built with the proper foundation, the risks associated with data loss or exposure are greatly reduced, including the negative impacts on the process and capabilities. But this begs the question: what is your organization thinking and approach to securing their environment? How far down the path have they gone in securing their environments and is encryption a key foundation? There are, of course, different levels of security that can be established across different areas or sectors of the business - encryption solutions are no different. 

More than ever before, data encryption and security are top of mind among most IT administrators as more and more regulations and laws are put in place to curb the risk of data loss. As organizations seek to improve their security models, they are faced with a myriad of options to lock down systems, processes and networks.   

However, in our experience organizations have avoided looking at a robust encryption solution because they feel:

• It can be too costly and expensive.

• It will slow down overall device performance.

• Process and capabilities become complicated and affect user experience.

• There are too many devices to secure and monitor leaving organizations at a loss from where to start. 

 

Nishant Verma, Country Manager India & SAARC, WinMagic, opines, "If the right data encryption solution is implemented, it is possible to fully secure your organizational data while reducing  IT costs and being completely invisible to the end-user." Also, the idea of maturing your processes and solution approach is critical to understanding and controlling your security. There are five levels of data encryption maturity that organizations can find themselves in:

Level 1 – Unaware

A level where there is no data protection solution utilized by an organization. As far as the business is concerned, there is no business driver to adopt encryption.

Organizations in this category are at a high level of risk in the event a device is lost or stolen. They typically haven’t evaluated their security needs and the risks associated with not adopting such a foundational approach to data security.

Level 2 – Tactical

This is a level where a company selectively deploys basic software or OS-based encryption to a defined and often very limited number of laptops devices. There are no central management capabilities and is managed via desk side support only. It is a baseline solution that may be “good enough” but lacks control and efficiency as it will generally encrypt only one type of device (like a laptop), in a silo’ed team or department.   

This tactical approach is often born out of the need for compliance to specific laws, legislation or regulations.

Level 3 – Defined

This level is defined as encryption being leveraged across most, if not all endpoint (laptops) devices and may begin to include some removable media. Centralized management is also introduced at this level. There is room for improvement as there are still devices and endpoints that do not have data security and could act as an access point to authorized users. 

In this instance, like the Tactical level, compliance is driving the need for encryption but in addition to this, there is a requirement for better audit and control capabilities. 

Level 4 – Managed

A level where most, if not all, devices are encrypted, including desktops. This is all controlled through a fully centralized management solution and gives administrators the granularity of control they need without being a hindrance to the end-user. 

Building on the same business drivers as the Defined category, Managed organizations also need to improve their overall IT management process and ensure they maintain a positive brand image. 

Level 5 – Optimized

At this level, organizations are taking complete control of all devices and are deploying encryption for all data no matter where it resides. Management capabilities enable a view and control of all endpoints, irrespective of platform, and key management capabilities for securing and encrypting data that resides in public or private cloud.

The big difference for Optimized organizations is that their need is to have a solution that can help decrease IT management costs and reduce or eliminate the impact on the end-user experience that could hurt productivity.

At this level, organizations are in the best position to reduce risks significantly and safeguard confidential data. 

There is no quick solution; it is an evolution. Companies must work through to fully optimize their data security strategies while reducing IT costs. WinMagic possesses the expertise and consultative approach to help customers determine their current and desired state on the Maturity Model. Their industry-leading encryption solutions ensure required capabilities are enable appropriately at all desired levels of the maturity curve.

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.