The convergence of mobile computing, cloud utilization, BYOD, and collaboration – among the fastest growing trends in computing today – has led to complexity in securing multiple systems, applications, platforms and devices. The difficulty in patching together an integrated security protocol to cover such a disparate and disperse computing environment is leaving many organizations vulnerable. For example, nearly half of companies that permit employees to use their own devices at work (a practice known as “BYOD”) reported experiencing a data or security breach as a result of an employee-owned device accessing the corporate network. And yet, 87% of executives say their employees are using personal devices for work-related purposes.
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Strategy for Holistic Security
1.
Holistic Security
Solution Brief
2.
WindTalker™: set your data free www.windtalkersecurity.com
Introduction _____________________________________________________________________________________
The convergence of mobile computing, cloud utilization, BYOD, and collaboration – among the fastest
growing trends in computing today – has led to complexity
in securing multiple systems, applications, platforms and
devices. The difficulty in patching together an integrated
security protocol to cover such a disparate and disperse
computing environment is leaving many organizations
vulnerable. For example, nearly half of companies that
permit employees to use their own devices at work (a
practice known as “BYOD”) reported experiencing a data or
security breach as a result of an employee-owned device
accessing the corporate network. And yet, 87% of
executives say their employees are using personal devices
for work-related purposes.1
Solution Parameters_____________________________________________________________________________
To provide protection that extends across all applications, devices, and platforms, the security must
reside within the data itself. By making data self-protecting at the point of creation, security becomes
inherent to the data itself, and independent of the infrastructure, applications, and devices that
create, access, or store the data. In this way, security can override the differences presented by a
diverse computing environment.
A consistent and single approach to applying security
simplifies security policy, decreasing IT management
time, costs, and the risk of vulnerability, while increasing
user-friendliness and end-user adoption.
By enabling data-level security, organizations can
embrace and maximize the cost-savings, productivity,
and collaborative benefits to be realized by advances in
mobility and decentralized data storage.
WindTalker™-enabled Holistic Security_______________________________________________________
WindTalker™ creates self-protecting data™, allowing a comprehensive solution for holistic data
protection that extends beyond the traditional constraints of network security.
• Data-level protection independent of network security – Data can roam freely, because the
protection comes from within the data itself. WindTalker is the only solution that creates self-
protecting data.
• Protection within the native file format – WindTalker requires no special end-user skills to protect
data -- redacting data is as easy as highlighting text. The robust WindTalker SDK allows
integration into new or existing applications via custom plug-ins.
• Protection independent of device, location or platform – Security can be applied to the edge
of any network, and across devices, and extended to BYOD or collaborative users.
• Dynamic Key Management (DKM)™ - Role Keys can provide access to any user, including
external contractors or collaborators, based on corporate or organizational policy. WindTalker’s
DKM enables state-of-the-art management of holistic security policies that are easy to adopt,
embrace and enforce.
1
CIO Magazine, Sept. 15, 2011
“New
compliance
mandates,
the
growing
use
of
cloud-‐based
applications,
and
the
proliferation
of
smart
phones
and
tablets
are
causing
IT
organizations
to
rethink
their
identity
management
and
user
provisioning
strategies
to
control
support
costs
and
better
manage
security.”
Source:
“10
Predictions
for
Technology
Trends
and
Practices
in
2012”
“One
of
the
best
ways
to
leverage
the
cost
and
efficiency
benefits
of
the
cloud
and
virtualization
while
keeping
sensitive
information
secure,
is
to
protect
the
data
using
a
security
solution
that
delivers
data-‐centric,
file-‐level
encryption
that
is
portable
across
all
computing
platforms
and
operating
systems
…”
Source:
How
Data-‐Centric
Protection
Increases
Security
in
Cloud
Computing
and
Virtualization