SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Renewed Context for the Defense and Security Sector
White Paper
ii RENEWED CONTEXT FOR THE DEFENSE AND SECURITY SECTOR
Renewed Context for the Defense and Security Sector
The risks facing the defense and security sector around the world are increasingly diverse.
Developments in technology and science, demographic trends and the changing character of conflict
makes achieving required levels of security more complex. In many cases, adversaries have access to
better skills and tools than the rest of us.
The evolving threat environment requires improved agility and responsiveness. Current systems of
innovation are dispersed and globalized, so accessing external capacity and solutions wherever
these can be found is crucial to success. Client requirements need to be met by focusing on strategic
outcomes and increasing collaboration with allies and partners.
Recent words of the Director General of MI5 serve as a timely warning: “My sharpest concern is
the growing gap between the increasingly challenging threat and the decreasing availability of
capabilities to address it.”
The questions that need to be asked are -
	 How can we close the growing gap between our capabilities and the threats we face?
	 How can we improve our capability to utilize the latest technology, while protecting our 		
	 information assets and being agile?
We need a paradigm shift!
With the increase in state sponsored and
organized cybercrime attacks, data protection
takes center stage. Organizations are moving
from legacy applications to those that store and
manipulate data in a hybrid environment. While
this is inescapable, the growing requirement for
secure collaboration across multiple jurisdictions
adds security challenges.
Previously, IT security specialists focused on
protecting the boundaries of their networks to
ensure strong perimeter security. This mindset
led to strong firewalls, tight access control
mechanisms, intrusion detection and prevention.
Times have changed; today our adversaries
have greater capabilities, boundaries are not
preventing them from reaching our data. At the
same time, our data is no longer confined to the
network where it can be protected.
It is no longer enough to rely on perimeter
security alone. Businesses need a more dynamic
technique that follows data throughout its
lifecycle from creation, in transit, storage and to
the point of consumption.
“My sharpest concern as
Director General of the MI5 is
the growing gap between the
increasingly challenging threat
and the decreasing availability of
capabilities to address it.”
Andrew Parker, Director General of UK MI5 – January 2015
The new paradigm is about Data Centric
Auditing and Protection (DCAP) which focuses
on protecting data, not the access to the data.
We implement a ‘need to know’ security
paradigm based on a zero trust model, to
ensure that even if the wrong person gets access
to the data, he is unable to use it.
The Paradigm Shift - Data Centric Auditing and Protection (DCAP)
iii RENEWED CONTEXT FOR THE DEFENSE AND SECURITY SECTOR
CloudMask Solution
CloudMask is your data’s last line of defense.
Our aim is to ensure data protection under
breach: ‘an infraction or violation of trust, faith,
or promise’. A breach can take place as a result
of the action of your employees, customers,
partners, hackers and even the government.
Accordingly, CloudMask’s focus is to protect
data throughout its lifecycle from creation to
consumption.
The technology transparently intercepts private
data at the point of creation on the end-user’s
device. The application using that data receives
valid but meaningless masked data, instead of
the original private data. Masked data passes
through the application without impacting it’s
functionality.
CloudMask detects and protects private data
according to configured security policies,
adapting to various cloud applications and
executing company-defined rules and policies.
The administration tool allows users to define
new applications and configure rules. As such,
CloudMask delivers a common solution that
works across applications, whether they are in-
house, commercial, on-premise or public-cloud
based.
CloudMask Components
	 ZERO TRUST:
Data visibility is granted on a need-to-know basis.
No implicit trust in any organization or vendor
infrastructure.
	 POLICY CONTROL:
Centralized management across data,
applications, users and devices. Enforce policies
and support auditing and monitoring of security
events.
	 DATA MASKING:
Meaningful data never leaves the end-user
device. Only masked data, which does not
disclose any private information, moves to the
application.
	 AUDITING AND REPORTING:
End-to-end reporting and data auditing is
used from the point of creation to the point of
consumption, in transit, processing and storage.
CloudMask secures data in a granular manner
and provides access to authorized users.
Access is based on pre-defined user roles and
the context within which the protection is to be
provided.
CloudMask understands these issues completely.
Our solutions are granular and take user
privileges into account, while ensuring that
application functionality is not impaired in any
way.
ZERO
TRUST
MASKING
DATA
POLICY
CONTROL02
01
03
04
AUDITING AND REPORTING
The CloudMask approach to data protection involves four key concepts:
About CloudMask
CloudMask Security Certification
CloudMask security is certified on two levels:
	 The Federal Information Processing
Standard (FIPS) Publication 140-2, is a U.S.
government computer security standard used
to accredit cryptographic modules. FIPS 140-
2 is published by the US National Institute of
Standards and Technology (NIST). CloudMask
uses different crypto engines. All are FIPS 140-2
compliant and certified.
	 The Common Criteria for Information
Technology Security Evaluation (abbreviated as
Common Criteria or CC) is the only international
standard (ISO/IEC 15408) for computer security
certification. CloudMask has been approved for
the Common Criteria that is managed by the
Canadian Communications Security Establishment
(CSE), Canada’s national cryptologic agency.
For more information, visit www.cloudmask.com or for
CloudMask videos see www.vimeo.com/cloudmask
Copyright© CloudMask 2015
Winner of the Canadian Innovation Commercialization Program (CICP), CloudMask is
the last line of defense, protecting data in the cloud and on premise even in the event
of a total breach. CloudMask’s solution is based on a zero trust model and works
on the premise that no one can be trusted with data - including cloud administrators,
governments, employees and even company IT administrators. CloudMask can
track, protect and control access of data throughout its lifecycle - from creation,
in transit, storage and processing to the point of consumption - enabling
businesses to meet data residency and privacy regulations. Eliminating the
need for special encryption gateways or VPNs simplifies the deployment
process and achieves zero deployment cost, minimizing time to implement.
CloudMask is accepted to the Common Criteria Certification to meet the
security certification required to operate with governments in 26 countries.

Contenu connexe

Tendances

CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
Bob Guimarin
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
PECB
 

Tendances (20)

Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Cyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical ServicesCyber Security - Maintaining Operational Control of Critical Services
Cyber Security - Maintaining Operational Control of Critical Services
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - Introduction
 
Aligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWS
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
True Cost of Data Breaches
True Cost of Data BreachesTrue Cost of Data Breaches
True Cost of Data Breaches
 
Digital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threatsDigital IQ in managing risk and cyber threats
Digital IQ in managing risk and cyber threats
 
Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)Advanced persistent threat (apt) & data centric audit and protection (dacp)
Advanced persistent threat (apt) & data centric audit and protection (dacp)
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
CIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurityCIO Review - Top 20 CyberSecurity
CIO Review - Top 20 CyberSecurity
 
Data Security: Are you Protected?
Data Security: Are you Protected?Data Security: Are you Protected?
Data Security: Are you Protected?
 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework
 
Implementing a Security Management Framework
Implementing a Security Management FrameworkImplementing a Security Management Framework
Implementing a Security Management Framework
 
Google peter logli & jake shea
Google   peter logli & jake sheaGoogle   peter logli & jake shea
Google peter logli & jake shea
 
What is cyber resilience?
What is cyber resilience?What is cyber resilience?
What is cyber resilience?
 
Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?Business Continuity, Data Privacy, and Information Security: How do they link?
Business Continuity, Data Privacy, and Information Security: How do they link?
 

En vedette

AMOR,ALEGRIAS E LAGRIMAS
AMOR,ALEGRIAS E LAGRIMASAMOR,ALEGRIAS E LAGRIMAS
AMOR,ALEGRIAS E LAGRIMAS
Khamia carvalho
 
The Hurb Press Kit Fall 2015-compressed
The Hurb Press Kit Fall 2015-compressedThe Hurb Press Kit Fall 2015-compressed
The Hurb Press Kit Fall 2015-compressed
Charlene Parker
 
Perfil de la carreara
Perfil de la carrearaPerfil de la carreara
Perfil de la carreara
dianitaq90
 
TCT-annual-report-ENG-WEB
TCT-annual-report-ENG-WEBTCT-annual-report-ENG-WEB
TCT-annual-report-ENG-WEB
Gay Decker
 
Geopureaqua_Profile-1
Geopureaqua_Profile-1Geopureaqua_Profile-1
Geopureaqua_Profile-1
Gnana Kumar
 

En vedette (15)

Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
Improve service while cutting cost
Improve service while cutting costImprove service while cutting cost
Improve service while cutting cost
 
Securing sensitive data for the health care industry
Securing sensitive data for the health care industrySecuring sensitive data for the health care industry
Securing sensitive data for the health care industry
 
Data breaach mitigation
Data breaach mitigationData breaach mitigation
Data breaach mitigation
 
AMOR,ALEGRIAS E LAGRIMAS
AMOR,ALEGRIAS E LAGRIMASAMOR,ALEGRIAS E LAGRIMAS
AMOR,ALEGRIAS E LAGRIMAS
 
Securing data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law FirmsSecuring data in the cloud: A challenge for UK Law Firms
Securing data in the cloud: A challenge for UK Law Firms
 
The Recursive Nature of Recruiting Blogs
The Recursive Nature of Recruiting BlogsThe Recursive Nature of Recruiting Blogs
The Recursive Nature of Recruiting Blogs
 
The Hurb Press Kit Fall 2015-compressed
The Hurb Press Kit Fall 2015-compressedThe Hurb Press Kit Fall 2015-compressed
The Hurb Press Kit Fall 2015-compressed
 
1 la tabla periodica
1 la tabla periodica1 la tabla periodica
1 la tabla periodica
 
Perfil de la carreara
Perfil de la carrearaPerfil de la carreara
Perfil de la carreara
 
Firm Profile
Firm ProfileFirm Profile
Firm Profile
 
TCT-annual-report-ENG-WEB
TCT-annual-report-ENG-WEBTCT-annual-report-ENG-WEB
TCT-annual-report-ENG-WEB
 
2 d sample
2 d sample2 d sample
2 d sample
 
06 acc504-bai 3-v1.0
06 acc504-bai 3-v1.006 acc504-bai 3-v1.0
06 acc504-bai 3-v1.0
 
Geopureaqua_Profile-1
Geopureaqua_Profile-1Geopureaqua_Profile-1
Geopureaqua_Profile-1
 

Similaire à Renewed Context for the Defense and Security Sector

report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
JAYANT RAJURKAR
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
Frederic Roy-Gobeil, CPA, CGA, M.Tax.
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
Christopher Bennett
 

Similaire à Renewed Context for the Defense and Security Sector (20)

Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
corporate-brochure.pdf
corporate-brochure.pdfcorporate-brochure.pdf
corporate-brochure.pdf
 
Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
Delve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of ThingsDelve Labs - Upcoming Security Challenges for the Internet of Things
Delve Labs - Upcoming Security Challenges for the Internet of Things
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
AGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White PaperAGEOS Infrastructure Cyber Security White Paper
AGEOS Infrastructure Cyber Security White Paper
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 
The Three Pitfalls of Data Security
The Three Pitfalls of Data SecurityThe Three Pitfalls of Data Security
The Three Pitfalls of Data Security
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
The Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security BreachThe Anatomy of a Cloud Security Breach
The Anatomy of a Cloud Security Breach
 
4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf4-lessons-of-security-leaders-for-2022.pdf
4-lessons-of-security-leaders-for-2022.pdf
 
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdfCrucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
Crucial Layers_ Exploring the Depth of Enterprise Cyber Security.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cybersecurity – a critical business issue
Cybersecurity – a critical business issueCybersecurity – a critical business issue
Cybersecurity – a critical business issue
 
IDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based SecurityIDC: Top Five Considerations for Cloud-Based Security
IDC: Top Five Considerations for Cloud-Based Security
 

Plus de CloudMask inc.

Plus de CloudMask inc. (8)

Case Study - Global Collaboration Multidisciplinary Professional Services
Case Study - Global Collaboration Multidisciplinary Professional ServicesCase Study - Global Collaboration Multidisciplinary Professional Services
Case Study - Global Collaboration Multidisciplinary Professional Services
 
Is data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risksIs data sovereignty the answer to cloud computing risks
Is data sovereignty the answer to cloud computing risks
 
Protect your data against the Risk of unauthorized intrusions
Protect your data against the Risk of unauthorized intrusionsProtect your data against the Risk of unauthorized intrusions
Protect your data against the Risk of unauthorized intrusions
 
Law firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMaskLaw firms keep sensitive client data secure with CloudMask
Law firms keep sensitive client data secure with CloudMask
 
Global Security Certification for Governments
Global Security Certification for GovernmentsGlobal Security Certification for Governments
Global Security Certification for Governments
 
Protect your Data even under breach
Protect your Data even under breachProtect your Data even under breach
Protect your Data even under breach
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Dernier (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Renewed Context for the Defense and Security Sector

  • 1. Renewed Context for the Defense and Security Sector White Paper
  • 2. ii RENEWED CONTEXT FOR THE DEFENSE AND SECURITY SECTOR Renewed Context for the Defense and Security Sector The risks facing the defense and security sector around the world are increasingly diverse. Developments in technology and science, demographic trends and the changing character of conflict makes achieving required levels of security more complex. In many cases, adversaries have access to better skills and tools than the rest of us. The evolving threat environment requires improved agility and responsiveness. Current systems of innovation are dispersed and globalized, so accessing external capacity and solutions wherever these can be found is crucial to success. Client requirements need to be met by focusing on strategic outcomes and increasing collaboration with allies and partners. Recent words of the Director General of MI5 serve as a timely warning: “My sharpest concern is the growing gap between the increasingly challenging threat and the decreasing availability of capabilities to address it.” The questions that need to be asked are - How can we close the growing gap between our capabilities and the threats we face? How can we improve our capability to utilize the latest technology, while protecting our information assets and being agile? We need a paradigm shift! With the increase in state sponsored and organized cybercrime attacks, data protection takes center stage. Organizations are moving from legacy applications to those that store and manipulate data in a hybrid environment. While this is inescapable, the growing requirement for secure collaboration across multiple jurisdictions adds security challenges. Previously, IT security specialists focused on protecting the boundaries of their networks to ensure strong perimeter security. This mindset led to strong firewalls, tight access control mechanisms, intrusion detection and prevention. Times have changed; today our adversaries have greater capabilities, boundaries are not preventing them from reaching our data. At the same time, our data is no longer confined to the network where it can be protected. It is no longer enough to rely on perimeter security alone. Businesses need a more dynamic technique that follows data throughout its lifecycle from creation, in transit, storage and to the point of consumption. “My sharpest concern as Director General of the MI5 is the growing gap between the increasingly challenging threat and the decreasing availability of capabilities to address it.” Andrew Parker, Director General of UK MI5 – January 2015 The new paradigm is about Data Centric Auditing and Protection (DCAP) which focuses on protecting data, not the access to the data. We implement a ‘need to know’ security paradigm based on a zero trust model, to ensure that even if the wrong person gets access to the data, he is unable to use it. The Paradigm Shift - Data Centric Auditing and Protection (DCAP)
  • 3. iii RENEWED CONTEXT FOR THE DEFENSE AND SECURITY SECTOR CloudMask Solution CloudMask is your data’s last line of defense. Our aim is to ensure data protection under breach: ‘an infraction or violation of trust, faith, or promise’. A breach can take place as a result of the action of your employees, customers, partners, hackers and even the government. Accordingly, CloudMask’s focus is to protect data throughout its lifecycle from creation to consumption. The technology transparently intercepts private data at the point of creation on the end-user’s device. The application using that data receives valid but meaningless masked data, instead of the original private data. Masked data passes through the application without impacting it’s functionality. CloudMask detects and protects private data according to configured security policies, adapting to various cloud applications and executing company-defined rules and policies. The administration tool allows users to define new applications and configure rules. As such, CloudMask delivers a common solution that works across applications, whether they are in- house, commercial, on-premise or public-cloud based. CloudMask Components ZERO TRUST: Data visibility is granted on a need-to-know basis. No implicit trust in any organization or vendor infrastructure. POLICY CONTROL: Centralized management across data, applications, users and devices. Enforce policies and support auditing and monitoring of security events. DATA MASKING: Meaningful data never leaves the end-user device. Only masked data, which does not disclose any private information, moves to the application. AUDITING AND REPORTING: End-to-end reporting and data auditing is used from the point of creation to the point of consumption, in transit, processing and storage. CloudMask secures data in a granular manner and provides access to authorized users. Access is based on pre-defined user roles and the context within which the protection is to be provided. CloudMask understands these issues completely. Our solutions are granular and take user privileges into account, while ensuring that application functionality is not impaired in any way. ZERO TRUST MASKING DATA POLICY CONTROL02 01 03 04 AUDITING AND REPORTING The CloudMask approach to data protection involves four key concepts:
  • 4. About CloudMask CloudMask Security Certification CloudMask security is certified on two levels: The Federal Information Processing Standard (FIPS) Publication 140-2, is a U.S. government computer security standard used to accredit cryptographic modules. FIPS 140- 2 is published by the US National Institute of Standards and Technology (NIST). CloudMask uses different crypto engines. All are FIPS 140-2 compliant and certified. The Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) is the only international standard (ISO/IEC 15408) for computer security certification. CloudMask has been approved for the Common Criteria that is managed by the Canadian Communications Security Establishment (CSE), Canada’s national cryptologic agency. For more information, visit www.cloudmask.com or for CloudMask videos see www.vimeo.com/cloudmask Copyright© CloudMask 2015 Winner of the Canadian Innovation Commercialization Program (CICP), CloudMask is the last line of defense, protecting data in the cloud and on premise even in the event of a total breach. CloudMask’s solution is based on a zero trust model and works on the premise that no one can be trusted with data - including cloud administrators, governments, employees and even company IT administrators. CloudMask can track, protect and control access of data throughout its lifecycle - from creation, in transit, storage and processing to the point of consumption - enabling businesses to meet data residency and privacy regulations. Eliminating the need for special encryption gateways or VPNs simplifies the deployment process and achieves zero deployment cost, minimizing time to implement. CloudMask is accepted to the Common Criteria Certification to meet the security certification required to operate with governments in 26 countries.