Data-Centric Security: The Way Forward

 This article was written by Top Ten Reviews

The news can’t focus on every data breach anymore, because there are so many of them. Scores of data breaches happen every year. The current focus is on health systems because they provide such a wealth of information; but any company, which collects customer data, is vulnerable. Data breaches don’t just put companies at risk. Consumers, whose personal information is on the line, are affected significantly. The threat of identity theft looms closer with every instance of breached security.

2014’s Most Serious Data Breaches

The biggest data breaches of 2014 tell a frightening story (see the infographic below). E-Bay, Chase, the Home Depot, Community Health Systems, and Michaels suffered the most devastating breaches, but they certainly weren’t the only companies to have secure data stolen. E-Bay lost 145 million people’s information. On top of the 76 million people affected by the Chase breach, seven million small businesses also had information stolen.

What’s worse is the time it takes these companies to figure out something’s wrong. The fastest response time was three months, as this infographic shows. It took Michaels, a popular craft store chain, 11 months to discover their data breach. That is a significant amount of lost time.

Community Health Systems reported that their breach may have cost the company as much as 150 million dollars. The average cost of a data breach in 2014 was 3.5 million, and that number gets bigger every month. But with employees unwisely clicking suspicious attachments and 68 percent of companies in a recent survey failing to use any sort of email encryption, the problem seems almost insurmountable.

So what can be done about it?

Data-Centric Security

Crypteron offers a security platform, which focuses on securing the data itself. Instead of adding external encryption programs and security options to exiting cloud and storage platforms, the Crypteron solution builds the security directly into the data storage apps.

The way they provide data-centric security is by reducing the “circle of trust.” The number of people, servers, and devices that traditionally have access to sensitive data is large. The larger that circle is, the more unwieldy and difficult security becomes. Crypteron’s app is the only thing authorized to access the sensitive data, which eliminates all those other vulnerable points from the equation. (But not even Crypteron themselves can read your sensitive data; only the customer holds both the encryption keys and the data.)

Better Encryption, Easier Use

Crypteron’s solution is simpler than many other security solutions. Instead of adding hardware, changing infrastructure, or a large number of data access points, Crypteron’s focus is the developer. Simply put, a company’s data storage in the public cloud is encrypted via Crypteron’s military grade encryption app options. Since only the app itself is trusted with the data encryption, the vulnerable points often exploited by hackers are shut down. By studying past data breaches, Crypteron developers have crafted a system that requires few changes.

Data breaches are serious; companies require more and more information from consumers to perform the simplest transactions. Consumers need to trust that the data they provide is safe from breaches and won’t turn into a bad case of identity theft months or years down the road.

Try Crypteron Free.


Photo from: http://anti-virus-software-review.toptenreviews.com/mega-data-breach.html
Top Ten Reviews presents independent, reliable information to help you make complex buying decisions easily. They publish thousands of objective third-party product reviews in a vast range of categories — from antivirus software to robot vacuum cleaners to credit-card processing services.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Recent blog posts

PCI DSS and key rotations simplified

PCI compliance requires data encryption keys to be changed frequently. Here is how you can do it easily.

Your data-center is not secure and what you can do about it

There is no secure perimeter anymore. Neither in your corporate network nor in your data center. Fight a winning battle armed with self-protecting data rather than a losing one trying to protecting the infrastructure.

Introducing the Crypteron Startup Innovators Program

Qualifying startups get up to 50% off all plans. Tell us how you’re changing the world and the our Startup Innovators Program will support your journey.

6 encryption mistakes that lead to data breaches

If encryption is so unbreakable, why do businesses and governments keep getting hacked? Six common encryption mistakes that lead to data breaches.

Announcing the new Crypteron Community Edition

Starting today you can now sign up for the Crypteron Community Edition for free with no performance limitations.

Data breach response – One click to save your business

Get breathing room – when you need it the most. Respond to a data breach with a single click.

Why We Need Proper Data-At-Rest Encryption: 191M U.S. Voters’ Data Exposed

Adding security at the application level is a large step forward in protecting data from the constant threat of data breaches

How to encrypt large files

CipherStor is blazingly fast! Here we show how to use it within your data-flow pipeline to maintain high performance when encrypting large files.

Crypteron CipherStor Performance Benchmarks

Blazing fast performance by Crypteron CipherStor that hits several gigabytes/sec enabling security even in high bandwidth scenarios

Data-Centric Security: The Way Forward

Properly implemented encryption holds the key to a robust data-centric approach to security.

Data-Centric Security: The Way Forward

by David Reich time to read: 2 min
0