Data-Centric Security and Protection, Part I: Status in the Enterprise

You are here

Data-Centric Security and Protection, Part I: Status in the Enterprise

Executive Update
Posted December 13, 2016 in Data Analytics & Digital Technologies

Data-centric security has been around for a while; however, it is receiving renewed attention as a way to extend data protection and security to end-point and edge devices as well as computing associated with cloud, mobile, and IoT technologies. Such applications can be complicated to protect because they tend to stretch the bounds of what we’ve come to consider as quite a well-defined computer network. To gain insight into the various trends and issues impacting enterprise data security and protection practices, and the extent to which organizations employ data-centric security practices and tech­nologies, Cutter Consortium surveyed 50 organizations worldwide.