Data-centric security has been around for a while; however, it is receiving renewed attention as a way to extend data protection and security to end-point and edge devices as well as computing associated with cloud, mobile, and IoT technologies. Such applications can be complicated to protect because they tend to stretch the bounds of what we’ve come to consider as quite a well-defined computer network. To gain insight into the various trends and issues impacting enterprise data security and protection practices, and the extent to which organizations employ data-centric security practices and technologies, Cutter Consortium surveyed 50 organizations worldwide.
Executive Update
Data-Centric Security and Protection, Part I: Status in the Enterprise
By Curt Hall
Posted December 13, 2016 | Technology |
Don’t have a login?
Make one! It’s free and gives you access to all Cutter research.