Page 11 - NOVEMBER MAGAZINE 2022
P. 11
The Significance of Data l a y e r s o f p r o t e c t i o n l i k e
Protection & Privacy encryption, etc. Security solutions
should be set up at the endpoint
The growth in digitalization has level as well as the network layer
led to an increase in the volume of to mitigate the chances of the
data. Hence, it has become attack. Insider threat is another
important to classify the data point that must be considered
appropriately, especially the while framing policies and
implementing technologies.
An increasing sensitive information that
organizations handle, including Trends & More
number of
that of customers, shareholders, Data encryption: An increasing
organizations and employees. Apart from data number of organizations would
would opt for availability, data protection opt for encrypting critical data to
encrypting critical governance has also become an prevent any data breach, even in
data to prevent any important aspect. the case of an attack.
Recovering Data after the Attack Z e r o T r u s t t e c h n o l o g i e s :
data breach, Depending on the criticality of
even in the case the data, multiple copies of data I m p l e m e n t e d b o t h a t t h e
endpoint level as well as the
of an attack. and backups may be required. network layer will help reduce
DR policies need to be set up to threats like ransomware etc.
ensure one copy of the backup is
A seasoned leader, Alok Sood P r i v a c y - E n h a n c i n g
offsite.
has carved his niche in the Computation Techniques: Unlike
Cloud backups are gaining
Indian IT industry. At Percept common data-at-rest security
much popularity today as they
India, a media, communications controls, privacy-enhancing
take care of both back-ups as
& entertainment organization well offsite. computation (PEC) protects data
with a strong presence in India Organizations that cannot opt in use. As a result, organizations
and the Middle East market, he is for certain data backups to the can implement data processing
responsible for project planning, cloud build solutions on- a n d a n a l y t i c s t h a t w e r e
m a n a g e m e n t , a n d p r e m i s e t o e n s u r e d a t a previously impossible because of
implementation. availability with minimum privacy or security concerns.
downtime in the case of attacks.
In an interaction with DTM, Alok Better AI/ML: Better AI/ML-based
talks about the growing Tackling Attacks solutions will come into play,
importance of data protection Both business and IT leaders have which will be excellent at
to work jointly in framing data
and ways to tackle attacks.
privacy policies after classifying detecting potential attacks much
the data. The higher the criticality before they happen.
of data, the higher should be the
Nov. 2022