Data at Rest vs Data at Risk
We all have data at rest.
We have our data stored in office files, spreadsheets, word processing documents, pictures, diagrams, and contact information. That data an be on-prem, in the cloud, anywhere in between, or a combination of all of the above.
All of that data is important. You know it is important, because you create it, you use it, and you control it. But are you protecting it?
When you protect your data, what controls are you implementing? Are you just hiding the data in hopes that nobody will find it in your messy file and folder system? Are you making any provisions for protecting your data against accidental loss or corruption?
If not, you are turning your data at REST to DATA AT RISK. Protect it!
There is no worse feeling that losing your data, finding that your data is corrupted, that your data has been taken from you, or that you have been crypto-hijacked.
Encryption, Protection, and Access Control
IBM wants you to keep your data protected, whether it is in use or at rest. Guardium Data Encryption (GDE) does more than encryption. It does a LOT more.
When GDE is deployed and configured properly on your systems, it’s access control mechanisms prevent unauthorized access to your data by people or processes. It also provides audit logs to show unauthorized attempts, giving you the insight of not just the protection that is provided by GDE, but also an indication of attempts to access your data.
In other words, GDE is about DATA PROTECTION and ACCESS CONTROL (not just encryption).
And, after all, if your data is that important, isn’t it worth protecting (on prem or in the cloud)?