Partner Content There are plenty of technology acronyms in the alphabet soup of the cybersecurity industry, but DSPM is the latest one leading the charge; its recent buzz has brought scrutiny to various security concepts that have cluttered the meaning behind data security posture management.
DSPM provides visibility into where sensitive data is located, who has access to it, how it's being used, and how the security controls and permissions are configured on the data stores or applications hosting the data.
The firewalls, endpoints, and gateways are an obstacle for attackers to overcome and pass through, on the way to the real target - the data living in traditional data stores, and in SaaS applications.
To maintain a strong data security posture, you must protect the data where it lives.
Although DSPM is a new term, discovering and protecting sensitive data is not a new concept.
Many DSPM vendors can show you where you have sensitive data and whether it's at risk, but they can't fix that data exposure.
At Varonis, discovering where sensitive data lives, mapping out the access and permissions, auditing who's accessing the data, and then taking steps to remediate it and lock it down, has been a part of our mission from the very start.
Even if DSPM is a new term for old concepts, it helps frame the conversation and gets everyone working toward the same goal: securing valuable data.
When looking at the current DSPM market, much of the focus is on the data that is attached to infrastructure platforms such as Azure Blob, S3, data lakes, and databases - the core back end where people build different products and solutions.
DSPM is not just about the application that data comes into, it's also about your data's lifecycle.
Think critically of everywhere your data might live.
The data on-prem is still massive and the permissions can potentially be complex, even if we've been living with NTFS permissions for years.
It's crucial to understand where your data is stored, what type of data is being stored, and how your users are interacting with it.
Automated data discovery gives you additional context to make more informed decisions about what your security policy should look like and how you will execute it.
Proper security must be focused further down and taking the next step to secure your data beyond the surface level.
As your data grows, you'll want to ensure your workflows take the scalability of your data into account.
Varonis' customizable DSPM dashboard allows organizations to easily assess their data security posture with an intuitive and customizable interface.
Easily spot risks such as sensitive data exposure, misconfigurations, policy violations, suspicious data activity, stale and risky user identities, and more.
Our Data Security Platform not only gives you a high-level view of your risks, but our automation also fixes what it discovers.
During a recent webinar, Varonis' Mike Thompson and I outlined the exact data security strategy we've used with 7,000-plus CISOs and how our Data Security Platform is the top choice for organizations looking to prioritize deep data visibility, classification capabilities, and automated remediation for data success.
This Cyber News was published on go.theregister.com. Publication date: Tue, 05 Dec 2023 16:43:11 +0000