Let’s say you’re the CISO. What is your single most important objective?
I think it’s spelled out in your title “information security,” and the single most important objective for you, or any CISO, is to protect the corporations’ information – the data. More specifically, it is to prevent the exfiltration of data.
The problem is, we in the security industry have been selling solutions to protect “where” the data is or how you access the data, but not the data itself. We’ve been beating at the leaves of the tree trying to kill it.
We need to get to the roots. And the roots of this tree protect the organizations’ data, preventing exfiltration of the data.
Now, imagine a burglar peering through the window of your home and inside they see your laptop, television, and other valuables. The intruder goes to the back of your home, finds an open window, and enters. Immediately after they enter your home, everything of value disappears. There is nothing for the burglar to steal. Arguably, if this were possible, no one would ever need to lock their doors.
Well, we haven’t figured out how to magically make all of your valuables disappear if an intruder enters your home, however – we can show you how to achieve the equivalent protection for your corporate network. If an organization can successfully protect (encrypt) their data, both at rest and in motion, theft truly becomes irrelevant. Moreover, many of the traditional security technologies being sold today also become far less relevant.
Like the home intrusion example, by protecting the data, the need for the traditional perimeter defense (firewall) breaks down. When you deploy a data protection platform utilizing CENTRI vault-less encryption all data, on all servers, is encrypted. All data in motion is encrypted. The only users able to access (decrypt) the data are the users you allow based on your AD users/groups settings. So, if your network is ‘infiltrated’ by a malicious user, it won’t matter. Even if they are successful stealing files, the data will be useless.
So, when I ask a CISO, “If I can show you how to protect your data, why would you care if anyone else is on your network?” I often hear responses like, “Well, they’re not supposed to be there…” or “I don’t know who they are or what they are doing…”
These are emotional responses. And, the response makes sense if you’re referring to your home. If I came home and found benign forensic evidence (fingerprints or footprints) that someone was in my home, although nothing was missing and no damage was done, I would still be uncomfortable just knowing someone had been in there.
However, when we are talking about network/Internet communications, does it really matter? As long as your data is protected at all times, in all states, and only your users can access the data based on your AD settings, do you still need a firewall? The answer is no.
Today, CENTRI is available to protect what matters most: your data.
Isn’t it time to stop beating at the leaves?
Thanks for reading,
About the Author Grant Asplund is the Vice President of Sales and Business Development at CENTRI. Grant has over 30 years of experience in sales, marketing, business development and management in enterprise software. He enjoys sharing his thoughts on security online and presenting at industry events. Connect with Grant on LinkedIn.