Security News > 2020 > October > Three steps to data-centric security: Discovery, protection, and control

Three steps to data-centric security: Discovery, protection, and control
2020-10-28 14:00

When Thales asked 509 executives about the biggest barriers to data security for the European version of its 2020 Data Threat Report, four in ten of them cited complexity.

It's ideal for storing data in a publicly available environment such as a cloud application while keeping sensitive data safe in an on-premises environment under your direct physical control.

Microsoft introduced Transparent Data Encryption in SQL Server 2008 to encrypt data across entire databases rather than at the cell level.

They must be able to see and control access to the data and even control which applications or computer processes are allowed to access different data sets.

It's an all-in-one platform that binds together these discover, protect, and control pillars, offering a way to find data in the organization and then protect it using a variety of encryption techniques at the file, database, and application level, along with tokenisation support.


News URL

https://go.theregister.com/feed/www.theregister.com/2020/10/28/three_steps_data_centric_security/