Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business Resilience

The business case for data-centric security

By Ameesh Divatia
Network security
December 8, 2021

It is no secret that companies are migrating to the cloud as never before. In O’Reilly’s annual Cloud Adoption Survey, 90% of respondents indicated they used the cloud. In fact, 20% said they planned to move all applications to the cloud in the coming year.

Unfortunately, cloud data security is often an afterthought for many businesses. This has been especially true since the pandemic forced companies to adjust quickly to a remote workforce. As a result, many well-intended companies are creating wide swaths of cloud vulnerabilities that come at a hefty price tag — the average data breach costs companies $3.8 million.

While the threats are real, scare tactics do not seem to generate enough motivation to advance security up the priority queue. So let’s consider a different approach to gain buy-in. What if security leaders presented data security through the lens of value and scale? Forget about what a data breach costs for a moment and focus instead on the data’s value — and on the importance of protecting that value.

Data is the most valuable non-human asset a business has. According to a McKinsey report, 81% of outperformers invest in data analytics centers, compared to 68% of slow performers. Simply put, those investing more heavily in data analytics are primed to win. Let’s take a look at what happens when an organization views data security as a critical means for unlocking value and creating differentiation.

Fast-tracked data analytics projects

The common assertion is that security slows down productivity. However, I would argue that data security can actually create efficiency. I’ve seen firsthand instances where large, well-known companies have stalled important data analysis projects — which occur in the cloud — for more than a year because they haven’t determined how best to secure data during migration and throughout the analytics process. The result of the delay is that the rich insight of the data analysis remains locked.

While data has always been valuable, the data collected in the last year will reveal a wide range of unprecedented insights. The business world was turned upside down due to the pandemic, and organizations had to quickly adjust how they operated and reacted to new customer needs. This new information will allow companies to glean areas of success — including things they could improve upon and trends that will help them create market differentiation.

But before that can happen, data must be protected.

Reduced time-to-insight

Traditionally, companies have placed a great deal of emphasis on keeping cybercriminals out by “protecting the perimeter.” But with remote workforces working in the cloud, there is no single perimeter — there are thousands of perimeters emanating from the disparate home networks and devices employees are working on. Vulnerability points have exponentially multiplied.

So employing the most effective data protection plan for a data analytics project requires a new approach that protects data at the file level. With so many more entry points for cybercriminals — who are growing more bold and sophisticated — organizations should be working under the assumption that it is a matter of “when,” not “if” a breach will occur. This is especially true for cloud data, where companies are prone to choosing deployment speed over sound security practices.

When each piece of data is individually protected in a manner that renders it unreadable, organizations have the power to neutralize the threat of an eventual breach. Unreadable data is of no value to the person attempting to exploit it. This is not to say that traditional security methods should be abandoned, as security requires a 360-degree approach. But forward-thinking companies understand that significant data analytics projects must include advanced data protection that extends beyond building a fortified wall.

Deployment of the right data protection methods

How do businesses overcome security challenges to move analytics projects forward? They start with employing advanced data discovery methods to determine what kinds of data they are collecting and, most importantly, their value.

Most data is created in the field — for example, at a doctor’s office, point-of-sale register or banking app. It is unstructured and needs to be organized. Before ingesting it into the cloud for data analytics purposes, companies must identify and classify the sensitivity of the data, as well as its subsequent use. This exercise will determine how much protection each piece of data should have, along with helping to identify what data will move downstream for analytics purposes, what should be stored and what should be eliminated.

The next step is protection. The methods an organization employs to protect data depend on how it will be used downstream in the analytics pipeline. If the data is not to be used in its original state, it should be tokenized, a process that cloaks the data’s characters with new characters but in the same format. For example, in a credit card transaction data scenario, a 16-digit credit card number would be tokenized with 16 random numbers.

Data to be used is encrypted in a way that allows it to be processed. In the credit card transaction example, the customer’s name, the date of the transaction and the amounts would be replaced with ciphertext that can only be decrypted with a key, making this information impossible for anyone without access to read.

From there, privacy-preserving analytics begin to allow data analysis while data is still protected. Using this approach, it would still be possible to determine which customer performed the transactions, with the most value in a certain date range. This is where the real business value emerges, because data can be analyzed while still ensuring it is never exposed in the clear. This completely neutralizes many of the “security disrupts efficiency” arguments. Further, the result of these measures is the confidence of having data security — even in the case of a breach — while moving forward with business-critical data analysis.

The rigors related to securing data will give organizations a better understanding of the breadth of data they have, which can further optimize data analytics projects. Those rigors should not be viewed as a burden, but rather a non-negotiable component in creating a competitive edge.

KEYWORDS: cloud security cyber security initiatives cybercrime data analytics data breach response data protection encryption

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ameesh Divatia is Co-Founder and CEO of Baffle, Inc., a cloud data protection company. He has a proven track record of turning technologies that are difficult to build into successful businesses, selling three companies for more than $425 million combined in the service provider and enterprise data center infrastructure markets. Prior to Baffle, he led a premier CMOS photonics innovator (Lightwire Inc.) from technology development into product development leading up to an acquisition by Cisco Systems, Inc. He also founded two venture-funded startups: Aarohi Communications (Storage Virtualization, acquired by Emulex Corporation) and PipeLinks Inc. (Optical Networking, acquired by Cisco Systems).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • digital-transformation-freepik

    Is data security blocking your digital innovation? Data-centric protection can remove the obstacles

    See More
  • cyber6-900px.jpg

    Making the business case for security by design

    See More
  • threat-intel-freepik1170x658.jpg

    The case for continuous threat simulation: Why annual audits will fail your business

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!