Securing the Breach with Data Encryption

Where is Your Data?

Data is in more places than ever before and enemies are not always obvious. Today, organizations are just as susceptible to insider threats as they are to outside attacks. Whether accidental or malicious, exposure of sensitive data is equally as devastating. It’s important to recognize that perimeter security does not account for internal threats and once the perimeter fails, the data is just as accessible externally.

Data At Rest

Encryption - Data at Rest

Determine where sensitive data resides by searching your storage and file servers, applications and data bases.

The only way to truly be safe is to encrypt the data itself. First, locate where your sensitive data resides within the organization. Data encryption can be employed in multiple locations and cover structured and unstructured data. Consider where it is stored, in databases, file servers, endpoint devices, storage networks—either on-premise, virtually or in the cloud. Realize that the value of data changes over time- new data will require an immediate plan, while certain archived data may no longer pose a security risk.

Data in Motion

Encryption - Data in Motion

Data encryption of voice, video and metadata, as it moves across your network is vital.

Do you really know what happens to your data while it is being transmitted to another location? From the moment data is in transit, you are actually no longer in control of it, and it can be easily and cheaply ‘tapped’ by cyber-criminals for a variety of unauthorized reasons. Furthermore, data travelling through networks is not just exposed to risks of cyber-attack; there are also genuine risks of transmission to wrong locations. Human error and technical equipment failings are real risks that can manifest more often than you would think. However, these risks can be eliminated by automatically encrypting the data while it’s in motion. If your data is sensitive – commercial, government or industrial – data, voice, video, or all three – it should be encrypted to protect your organization and its stakeholders, especially when it leaves your control.

Management of Data

After identifying the characteristics and location of your data, the next step is figuring out how to segregate and safeguard it among users. Statistically, 80% of security breaches are caused by insiders. Therefore, it’s vital that you invest in a platform that separates administrative duties and access policies to the encrypted data. With separation of duties, you can ensure that administrators have the control to move things around, but not delete, copy or view data.

This is just one aspect of good crypto management. Learn more about managing and securing encryption keys.

With its complete suite of products, Gemalto provides information security of sensitive data at all critical points in its lifecycle. From the physical and virtual datacenter to the cloud, Gemalto helps organizations remain secure, compliant and in control - Learn more about our data encryption solutions.