X
Home & Office

Data-centric security approach becomes major focus at RSA 2012

Data is intertwined with every security topic and concern, but it is ever more so these days as data can be shared so easily.
Written by Rachel King, Contributor

Recognizing and accepting trends like bringing personal devices to work are inevitably common topics at the 2012 RSA Conference in San Francisco this week, but the data-centric security approach has emerged as a particularly specific and popular focus.

Arguably, data is intertwined with every security topic and concern, but it is ever more so these days as data can be shared on so many different networks and devices that it is problematic for IT departments to keep track of everything's safety.

For example, Verizon announced that its Enterprise Solutions unit is demonstrating its own data-centric approach to security at RSA 2012, touted to enable organizations to better secure their applications, infrastructure and users.

Bart Vansevenant, executive director of global security services for Verizon, explained in prepared remarks that Verizon’s data-centric approach "emphasizes the protection of an organization’s core asset: its confidential data."

Another company taking on data-centric solutions is Voltage Security, which debuted its Mobile Plus initiative on Tuesday, designed to extend the company's existing mobile security solutions to protect a new generation of mobile devices, applications and business-critical sensitive data.

Some of the features integrated on this platform include Voltage's Identity-Based Encryption to deliver stateless key management that is scalable to millions of users with minimal overhead investment, as well as its Format-Preserving Encryption technology for protecting sensitive information at the data level while permitting applications to function with that data in the cloud or on mobile devices.

Voltage cited a recent Forrester report that asserted that mobility is actually driving new data-killing initiatives, so "enterprise-level encryption is the best hope for securing data on these devices."

Related:

Editorial standards