The traditional methods of how to address information security have all been for ages about protecting the perimeter and the network, protecting where the files are located. While it’s good IT practice to have those safeguards in place, organizations are realizing that it’s not enough.
In this podcast recorded at Infosecurity Europe 2015, Rui Melo Biscaia, Product Management Director at Watchful Software, talks about the importance of having another layer in place on top of your IDS, IPS, firewalls, etc. This is where data-centric security comes into the picture.
Data-centric security means that security resides with the files, wherever they are located. It doesn’t matter if the files are on a server in the organization, your home computer or a storage device, by using data-centric security you’re enforcing role-based access control.