Cybersecurity Cloud & Data

Securing the data pores of an organization with dynamic approaches

Data security today has become of crucial concern. The complications are adding up with further digitization, since several applications make up an organisation’s structure. These companies offer some unique solutions.

According to cybersecurity company Trend Micro, 73% of organizations in India report they are likely to experience a data breach that impacts customer data in the next 12 months. Indian organizations ranked the top three negative consequences of an attack as lost IP, critical infrastructure damage/disruption, and cost of outside consultants and experts.

“Once again we’ve found plenty to keep CISOs awake at night, from operational and infrastructure risks to data protection, threat activity and human-shaped challenges,” said Vijendra Katiyar, Country Manager, India and SAARC, Trend Micro.

“To lower cyber risk, organizations must be better prepared by going back to basics, identifying the critical data most at risk, focusing on the threats that matter most to their business, and delivering multi-layered protection from comprehensive, connected platforms.”

Multi-layered is the key word here, with an organizational structure containing different nodes of inlets and outlets in the form of applications, cloud, etc.

The 5A Methodology for IAM

As communication between various entities within as well as outside an organization becomes digitized, layers of entry and exit points crop up within every structure. This in turn creates a need for securing these entries and exits.

Recently, CMS IT Services came out with a White Paper on following the five As of Identity and Access Management (IAM), namely, assurance, authentication, administration, automation, and analytics.

“Thinking of IAM as a 5A methodology presents it as offering a comprehensive suite of solutions for the whole expanse of areas and entities that are the business of a contemporary business,” the white paper says.

Policy Based Management for Cloud Security

Cloud is a particularly vulnerable area in business organizations as container breaches threaten every day. In 2018 and 2019 exposed breaches caused by cloud misconfigurations resulted in nearly 33.4 billion records in total.

According to the Ponemon Institute’s 2019 report, the average cost per lost record globally is $150. Multiplied by the number of records exposed, misconfigurations cost companies worldwide nearly $5 trillion in 2018 and 2019 alone.

As containers are created rapidly, the growing demands placed upon developers often leaves a security gap that exposes potential threats and risks in the configuration settings. As enterprises accelerate their adoption of cloud technologies, several companies provide the essential method with native tools and language to secure containers for enterprises deploying resources in cloud environments.

For example, Nirmata, a software solutions provider for governance, compliance, security, and automation of production Kubernetes workloads and clusters has created Kyverno, a policy engine designed for Kubernetes.

Nirmata’s mission is to enable the automated management of cloud native applications in an infrastructure agnostic manner. To achieve this, they insist, policy-based management is critical for achieving autonomy across roles while keeping alignment to organizational goals and standards. The company recently raised US $4 million led by Z5 Capital with participation from Uncorrelated Ventures, Samsung Next, and BGV.

A Frictionless API-Based Cloud-Native Approach

In a similar example, McAfee recently announced that MVISION Cloud, part of its secure access service edge (SASE) offering, MVISION Unified Cloud Edge (UCE), now provides enhanced security coverage for Microsoft Dynamics 365, a line of enterprise resource planning and CRM software applications.

This solution complements Dynamics 365 capabilities by using a frictionless API-based cloud-native approach that allows IT teams to seamlessly enforce data loss prevention (DLP) policies and collaboration controls, access control, address threats from insiders and compromised accounts, audit all user activity and secure corporate data as users collaborate in the cloud.

McAfee is one of the only cloud access security broker (CASB) vendor who has released API-integrated enterprise data and threat protection capabilities for Dynamics 365, providing enterprise users with an added layer of security, visibility and control.

Navanwita Bora Sachdev

Navanwita is the editor of The Tech Panda who also frequently publishes stories in news outlets such as The Indian Express, Entrepreneur India, and The Business Standard

Recent Posts

Indian gaming shifts from audience to creator “given India’s mobile-first gaming capabilities”

The Indian gaming industry is sitting on an industry explosion in the near future as…

19 hours ago

Transforming modern business operations: How Microsoft 365’s AI Integration is automating HR workflows & enhancing employee experiences

In today's fast-paced business world, when employee fulfillment and efficiency are crucial, technology has become…

21 hours ago

Outbound & inbound: India attracts businesses from UK, China & US while expanding to Middle East

The Tech Panda takes a look at how India has been attracting foreign businesses from…

2 days ago

UPI value & volume surpass records in March

India’s digital payments ecosystem achieved a record high in March, with UPI transactions reaching INR24.77…

2 days ago

AI-powered digital twins, Cobots, agentic AI, physical AI & edge computing are enabling an anticipatory AI-first manufacturing ecosystem

Tata Consultancy Services (TCS) (BSE: 532540, NSE: TCS), ), a leader in IT services, consulting, and business…

2 days ago

Misinformation & deepfakes help weaponize AI: Should AI be as open as the internet then?

The ability for AI to spread misinformation has been reaching hair-raising lengths, another and possibly…

4 days ago