Archive for June 2015
Today’s threat landscape is ever expanding, increasingly complex and consistently evolving. No business can ever be 100% secure in this environment, so the concept of building a bigger, stronger security perimeter offers no guarantees. The modern CIO and CISO realise that detection and remediation must now take precedence. They must form a key part of an enterprise security strategy, especially as security breaches are more a question of when rather than if.
The enlightened CIO and CISO, however, go one step beyond detection. They understand that endpoint data backup goes beyond just shifting data from A to B. In the current enterprise landscape, with its sophisticated security needs and mobile workforce, IT and security leaders realise that endpoint data protection is about giving companies real insight into corporate data. This includes a view of what’s happening on individual endpoint devices, no matter where they are, in near real-time.
To this end, today’s innovative and proactive CIOs and CISOs look for tools that can do the following:
- Deliver near real-time insight into data. The majority of enterprise data today is held on devices outside of the data centre. It is found at the endpoint – desktops, laptops and other mobile devices – with users that are constantly on the road, outside of the traditional enterprise perimeter. This makes data not only vulnerable but also hard to keep track of. The right endpoint data protection tool, such as CrashPlan from Code42, will allow the enterprise not only to protect data by backing it up, but also to find out when it is created, changed or deleted, by whom and from where. The ultimate solution does this silently from the cloud, in the background without ever asking the end user to proactively engage with it – it just needs to run seamlessly.
- Actively prevent access to sensitive information. With increasing reports of data breaches in the enterprise, data needs to be protected at all costs. Today, the CISO will admit that multi-factor authentication is the way forward. The best endpoint backup and sync/share tools use it to add a layer of security that makes access by attackers more difficult. Yet, only 37% of today’s organisations use multi-factor authentication, leaving themselves at risk.
- Go beyond compliance to regulation. With true globalisation of businesses and the rapid adoption of cloud services, endpoint data protection tools also have a role to play in helping you to go beyond compliance and meet regulation. Compliance alone is not enough. Take the EU’s new General Data Protection Regulation (GDPR). This regulation will harmonise and strengthen the current data protection laws in place across the EU member states. Essentially, it will mandate the way in which data is handled and where it is kept. Simply contracting with a US company that has built data centres in Europe will not keep your data safe. This is due to the USA PATRIOT Act. If requested, your data centre provider may still have to hand over your company’s data to third parties, such as the US National Security Agency (NSA). Your endpoint data protection solution should allow that to happen, of course. But with the right solution, such as CrashPlan, you hold the encryption keys, not your cloud data storage provider. Therefore, without your consent and individual access keys, third parties such as the NSA may be able to access your data in de-regulated form, but will not be able to decipher it. This will keep your business and your customers comfortable and secure – all while helping you to meet local / EU data privacy regulations.
- Commit to constant innovation. Whatever endpoint data protection product your business chooses, you have to ensure it is, as you are, committed to innovation. Your service provider should constantly be developing its product, with the key focus on driving better, more connected security throughout your organisation
Security for the modern business is of course about more than just the tools. Endpoint security should not just be seen as preventative. Instead it allows businesses to be competitive in the marketplace and unleashes their true potential. How can a simple security measure do that? Well, the reality is that having the right strategy, tools and people in place will free up the CIO and CISO from one more burden. This will give them time to help deliver new projects that could give your business a competitive edge in the market. They can focus on enabling the new devices your business needs, BYOD or virtualisation projects they need to undertake – all without worrying how they will protect the data once it has left the enterprise perimeter.
Ultimately, the right endpoint data protection and security tools in combination with a forward-thinking security strategy is an opportunity for the CIO and CISO to step into the light and drive for the modern business.
Read about Code42’s choice for EvoSwitch to accompany their European expansion strategy here.