[ad_1]

Since compliance is driving data owners to adopt data-centric protection measures, security should be incorporated into data pipelines because it is no longer a watchdog.

Whenever data is being processed, it is exposed to threats. Therefore, Baffle Inc. uses standard encryption algorithms to protect data as soon as it’s created, building security into the data pipeline, according to Ameesh Divatia (pictured), co-founder and chief executive officer of Baffle.

“We do data transformation, which encompasses three different things,” he stated. “It can be tokenization, which is format-preserving, real encryption with counter mode, or masked views — so tokenization, encryption and masking all within the same platform. We believe in protecting the data all the way down at the field or record level.”

Divatia spoke with theCUBE industry analyst John Furrier at AWS re:Inforce, during an exclusive broadcast on theCUBE, SiliconANGLE Media’s livestreaming studio.  They discussed how Baffle uses proxies to build security in data pipelines. (* Disclosure below.)

The proxy approach

Security should not be treated as an afterthought in the modern enterprise world. Proxies help fill the void by ensuring continuous monitoring and encryption of data. Furthermore, they eliminate the need for app development resources, according to Divatia.

“You want to build security into the data pipeline itself,” he pointed out. “As soon as data is created, you identify what is sensitive data, and you encrypt it or tokenize it as it flows into the pipeline. We are very clearly differentiating ourselves with proxy architectures.”

By using cloud computing, Divatia believes proxies’ speed is enhanced. As a result, they take away the heavy lifting and eliminate operational problems and deviations.

“In the cloud, there’s an infinite amount of processing available and containerization,” he noted. “You have a very good network, load balancers, and ways of creating redundancy. So the cloud is actually enabling solutions like this.”

Since the volume of data is growing exponentially, Divatia believes relying on traditional solutions like legacy tokenization is misplaced. This is because workloads are continuously becoming diversified.

“You have to do something that’s a lot more efficient, which is where you have to do it with a cryptography approach,” he explained. “What we have is a solution that actually goes across the board. We can do one structured data with HTTP proxies. We can do structured data with SQL proxies. And that’s how we are able to provide a complete solution for the pipeline.”

Organizations operate under a shared responsibility model with cloud providers in a cloud-first environment. Therefore, security postures are needed to gain a competitive advantage, according to Divatia.

“Here’s something that we just discovered actually from a survey that we did,” he stated. “While 93% of respondents said that they have had lots of compliance-related effects on their budgets, 75% actually thought that it makes them better. They can use security postures as a competitive differentiator. We like to sell the fact that you look better compared to your neighbor if you have better data hygiene.”

Here’s the complete video interview, part of SiliconANGLE’s and theCUBE’s coverage of the AWS re:Inforce event:

(* Disclosure: Baffle Inc. sponsored this segment of theCUBE. Neither Baffle nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

Photo: SiliconANGLE

Show your support for our mission by joining our Cube Club and Cube Event Community of experts. Join the community that includes Amazon Web Services and Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger and many more luminaries and experts.

[ad_2]

Source link

Load More By Michael Smith
Load More In Technology
Comments are closed.

Check Also

Autocar magazine 1 February: on sale now

[ad_1] This week in Autocar, we put Porsche’s new 911 ‘SUV’ through its paces, break the s…