New Challenges; New Solutions
Akhilesh Tuteja, Partner and Head Management Consulting and Global Co-Head for Cyber Security, KPMG in India says that Indian organisations are investing security resources on threat prevention processes and technology. He cautions that while security controls are important, organisations should assume that attackers would circumvent defences, penetrate networks, compromise systems and advance their attacks. Hence it is important for organisations to supplement their preventive technology with a more thorough strategy for incident response.
One of the key technologies for incident response is Enterprise Digital Rights Management EDRM, which builds
Atul Gupta, Partner- IT Advisory and Cybersecurity, KPMG India, points at key trends enhancing cyber risks. One of the trends is the expansion of Internet usage due to proliferation of mobile devices. This introduces a platform for hackers to steal sensitive corporate and personal information. Another trend is the emergence of advanced technologies such as Cloud. Adoption of cloud technologies exposes information to increased risks, as safe guards are not builtin during adoption of these technologies. Finally, lack of cyber security skills amoung employees is another major reason why organisations are unable to defend themselves against cyber security attacks.
Adoption of cloud technologies exposes information to increased risks as safe guards are not built-in during adoption of these technologies
Seclore’s Enterprise Digital Rights Management is an appropriate technology to protect data in light of these upcoming trends. Whether it is proliferation of mobile devices, or adoption of cloud technologies, or lack of cyber security skills, if security is built into data itself, you can always rest at peace even if data is stolen out of organisation's perimeters. EDRM changes the paradigm from security focused on the perimeter to a security that is data centric. Thus, by controlling and preventing unauthorized access to data, EDRM protects data even after data has intentionally, or inadvertently moved out of the perimeter or has been malevolently been snatched out of the perimeter.