Use and Share Data In Its Encrypted State
with the Sotero Data Security Platform
A breakthrough approach that ensures that sensitive data is always secure, wherever it resides.
Though encryption is the most effective way to reduce the probability of a security breach, traditional encryption carries a major hurdle – it protects data only when data is at rest (disk encryption) or in transit via secure communication methods such as SSL and TLS¹. These shortfalls leave companies with significant vulnerabilities when the data is in use by on-premise or cloud applications.
Additionally, as companies rely more heavily on cloud environments, they face even greater risks. By giving control of the data to cloud providers, organizations face significant vulnerabilities because the cloud providers may not encrypt data securely. Even when they do secure the data, cloud providers often have access to the data and the encryption keys.
The good news is the emergence of Sotero Data In-Use Encryption.
Data in-use encryption is a groundbreaking approach that ensures that sensitive data is never left unsecured, regardless of lifecycle stage (at rest, in transit, or in use), regardless of source, or location (on premise, cloud, or hybrid). These capabilities set in motion a new world for using, sharing, and monetizing data, securely and with confidence.
¹Cost of a Data Breach Report, Ponemon Institute and IBM Security, 2019
Although encryption offers a range of benefits, traditional encryption technologies still have several areas of vulnerability that are underlying factors in data breaches:
• Disk encryption, which protects data only when it is at rest on the disk, and
• Encrypted communication links, such as those powered by SSL and TSL encryption, which encrypt data only when it is in transit from one system to another.
While valuable, these approaches do not cover one of the major vulnerabilities that companies face today: an attacker obtaining unauthorized, direct access to the database. Access can be gained by several methods, including phishing attacks, misconfigured databases, or custom software programs that impersonate valid applications requesting data. Once a system is breached, the attacker can write queries to access and/or steal all the underlying data. The database operating system will fetch the data from the disk, unencrypt the data and send query results back to the attacker in plain text.
Disk encryption also does not prevent unauthorized access from those that are charged with administering the database, whether they are employees or thirdparty consultants. For example, encrypted data on the disk does not prevent a database administrator from querying the database to access unencrypted data and, thereby, reviewing or stealing data they do not need to access.
• Cloud providers require customers to provide their own cybersecurity and do not enforce it, leaving cloud applications vulnerable, unless the organization has a highly sophisticated security management program².
• Data in the cloud is accessible to the database administrators of the cloud applications or infrastructure via direct access to the database.
• If data in the cloud is encrypted by the cloud or application provider, the provider still holds the encryption keys and can access the data in the database.
Now let’s take a look at how In-Use Encryption eliminates these vulnerabilities.
²ibid
³2019 SANS Survey on Next-Generation Endpoint Risks and Protections, 2019
Data-in-use encryption is an innovative, holistic approach that secures data throughout the entire data lifecycle by securing the data itself, not just the application, database, or network in which it resides.
Data-in-use-encryption has the following unique advantages over traditional security approaches:
Software as a Service (SaaS) and Infrastructure as a Service (IaaS) solutions that reside in the public cloud typically introduce two key vulnerabilities.
• Cloud providers require their customers to provide their own cybersecurity for their data and do not enforce that security, leaving cloud applications much less protected unless the organization has a highly sophisticated security management program.
• Data in the cloud is accessible to the database administrators of the cloud applications or infrastructure via direct access to the database.
Modern data encryption solutions can fully protect your data from both intruders and your cloud service provider by encrypting all your sensitive data across the entire data lifecycle, ensuring that applications and partners interact only with encrypted data, and giving you control over the key.
Restricts Access to keys. The client/entity that generates and owns the data should keep the key so they are the only ones who can access the key. This means that cloud service providers or database administrators have no way to unlock the unencrypted data.
The multi-layered approach to data security employed by data-in-use encryption empowers organizations to safely use, share, and monetize data, leading to several advantages compared to traditional security approaches:
Sotero Data-In-Use Encryption is used by companies today in industries with critical data protection requirements, such as financial services, banking, pharma, healthcare and others. Data-in-use encryption benefits any company that collects, uses, and shares sensitive data, including PII data:
The Sotero data security platform with data-in-use encryption is used by
companies the world over to secure sensitive data throughout the data
lifecycle, wherever that data resides. With the Sotero platform, businesses are
operating with confidence that their sensitive data is secure, while reducing the
strain on the company’s security team, not to mention the financial and brand
risk of data breaches.
Click here to request information about the Sotero platform, or to schedule a product demo.
Sotero is the global innovator and leader in revolutionary data security. Sotero’s data security platform provides a single pane of glass that enables our customers with a way to protect data anytime, anywhere, regardless of data store, integration mechanisms, and user tools. The platform is able to control, access, operate, and use data to extract information that drives organizations’ business outcomes and innovation.
Sotero provides organizations with a scalable and flexible data security fabric that migrates and moves data securely, in all its instances in an interconnected world. Organizations gain complete control over their data privacy, compliance, audibility and governance for use cases ranging from securing data at the edge, IoT devices and streaming data, and moving data securely to downstream systems.