DSPM Deep Dive: Debunking Data Security Myths>
– Kilian Englert
There are plenty of technology acronyms in the alphabet soup of the cybersecurity industry, but DSPM is the latest one leading the charge; its recent buzz has brought scrutiny to various security concepts that have cluttered the meaning behind
data security posture management.DSPM provides visibility into where sensitive data is located, who has access to it, how it’s being used, and how the security controls and permissions are configured on the data stores or applications hosting the data.At Varonis, discovering where sensitive data lives, mapping out the access and permissions, auditing who’s accessing the data, and then taking steps to remediate it and lock it down, has been a part of our mission from the very start.When looking at the current DSPM market, much of the focus is on the data that is attached to infrastructure platforms such as Azure Blob, S3, data lakes, and databases — the core back end where people build different products and solutions.While it is important to think critically about where your data lives, if you don’t have deeper visibility into the platforms and SaaS apps hosting the data, it will be difficult, if not impossible, to measure and reduce the risks around it.During a recent webinar, Varonis’ Mike Thompson and I outlined the exact data security strategy we’ve used with 7,000-plus CISOs and how our Data Security Platform is the top choice for organizations looking to prioritize deep data visibility, classification capabilities, and automated remediation for data success.
Link: https://www.varonis.com/blog/debunking-dspm-myths
DSPM Deep Dive: Debunking Data Security Myths
Categories:
Tags: