IDC Report 2019
IDC Report 2019
IDC Report 2019
Introduction AT A GLANCE
Enterprises constantly struggle to defend sensitive data from legions of
KEY STATS
sophisticated attackers that target high-risk employees and seize on
According to IDC's 2018 Data Services for Hybrid
technology gaps and complex processes to steal sensitive information.
Cloud Survey:
It takes only one misstep — an inadequately configured or mismanaged
security solution, poorly communicated policies, or a gap in enforcement » 65% of enterprise IT security, line-of-business IT,
and data management specialists cited a
mechanisms — to generate a fissure that cybercriminals can squeeze medium to robust digital rights management
through to reap valuable data. If the stresses are not addressed, the fissure deployment in their organization.
deepens, and in mere seconds, a costly data breach erases all previous » Organizations are struggling to secure data
investments in security technology and every hour spent building out and across multicloud and hybrid environments.
modernizing the organization's security program. More than 37% of survey respondents indicated
that the growing complexity of security solutions
There is no silver bullet for protecting sensitive data. No single security is a significant challenge that often impedes data
technology investment will eliminate the risk of data theft or a mistake governance policy enforcement.
exposing sensitive information. Fortunately, IDC has identified six
WHAT'S IMPORTANT
"inconvenient truths" about executing on a data-centric security strategy
Modern data-centric security solutions can reduce
that can be used to greatly mitigate the risk of theft or exposure to the risk of data leakage, automate data protection
tolerable levels. These six truths represent the most common gaffes and governance policy enforcement, instill security
documented by penetration testers and forensics investigators that can awareness among data owners, and simplify
create fissures even in the most heavily subsidized security programs. administration across hybrid environments.
cloud-based resources. The millions of data records exposed in 2018 illustrate that cybercriminals are seizing on the complexity
caused by poorly configured and inconsistent security controls across these distributed environments. Security teams can't
restrict business users from collaborating, but they can identify data-centric security solutions that get more value out of
existing solutions and support automated, granular encryption, persistent usage controls, and tracking regardless of where
sensitive data travels and resides.
#US44857519 Page 2
IDC VENDOR SPOTLIGHT The Six Inconvenient Truths of Data-Centric Security
#US44857519 Page 3
IDC VENDOR SPOTLIGHT The Six Inconvenient Truths of Data-Centric Security
In addition, these modern DRM solutions support data privacy initiatives by enabling automated enforcement and active
tracking of data usage and residency. The tracking and auditing telemetry can enrich the data set used by security
monitoring, analytics, and audit reporting downstream. Security teams gain situational awareness into sensitive data use
and improved context behind alerts of potential malicious activity so they can make better-informed policy decisions
regarding high-risk employee activities.
#US44857519 Page 4
IDC VENDOR SPOTLIGHT The Six Inconvenient Truths of Data-Centric Security
Perhaps the greatest value of these products is alleviating the risks of sharing sensitive data with business partners,
contractors, customers, and other external parties. Organizations must evaluate data-centric security solutions and the
supporting platforms to identify those with a cohesive automated framework for the following key benefits:
» Regaining control over unstructured data. Data-centric security solutions provide greater visibility into and control
over intellectual property and sensitive data shared internally or externally regardless of location. They also solve
regulatory compliance and privacy concerns by capturing all the interactions with sensitive content and regulated data.
The increased control and visibility help close security gaps, identify high-risk employees, and allocate security
resources more effectively.
» Increasing security coverage without hampering productivity. Automated application of granular usage controls
unifies and extends the value of DLP/CASB and data classification processes. The combination of technologies also
helps instill security deeply into the culture of an organization to reduce the risk of data exposure, demonstrate
commitment to data security and privacy, and alleviate the need for employees to manually protect information.
Organizations also benefit because combining multiple solutions used for data classification, detection, and
protection overcomes workflow hindrances, reduces mistakes leading to data leakage, and automates the infusion
of granular data protection and tracking.
» Reducing hybrid complexity risks. Increased complexity associated with cloud adoption and managing data governance
across hybrid environments can result in poorly configured and maintained security infrastructure. DRM platforms that
integrate and interoperate to leverage policies from existing data security products can help extend and unify policy
enforcement across hybrid environments. DRM solutions may augment and interoperate with existing data classification,
DLP solutions, cloud security gateway solutions, email, content management, and other SaaS applications.
#US44857519 Page 5
IDC VENDOR SPOTLIGHT The Six Inconvenient Truths of Data-Centric Security
Challenges
Data-centric security solutions require a commitment by security teams to engage all stakeholders, especially data
owners and line-of-business managers. Each of the key security technologies used to support a data-centric security
strategy — DLP, data classification, and DRM — addresses a part of the data protection puzzle.
Rights management benefits from having users classify documents or from automated detection of sensitive information
to automate the downstream protection process. In addition, DLP is a common integration point for rights management
technologies because they add value by integrating persistent document usage controls and tracking capabilities. DLP
products continue to provide detection capabilities and may assist in identifying when an incorrect label has been
selected by the user. Some DLP providers sell fully integrated encryption and rights management capabilities. The
challenge is getting all the components to work harmoniously across email, web, and other channels.
Perhaps the biggest challenge to all data protection solutions is reducing "user friction." Whether data-centric security
solutions are classifying, detecting, or protecting documents, the use of automation wherever possible can maximize
adoption of these solutions over the long run. It will reduce training requirements and ensure security loops are closed as
much as possible.
Conclusion
Data-centric security solutions can create more value out of an organization's existing data security resources by
bridging DLP, data classification, DRM, email, file sharing, and other critical business application processes.
Security teams can regain visibility into and control over sensitive data being shared externally. Once these solutions are
working together, they can help enforce a consistent set of data governance policies regardless of whether data is stored
across multiple cloud environments, in SaaS applications, or on-premises.
IDC studies have found that creating cohesiveness across existing data security investments reduces the risk of a data
breach without impacting collaboration.
Existing data security controls must adapt to the digital transformation evolution. Transformation has prompted
organizations to collect and analyze more data than ever to obtain competitive
advantage within their industry and the marketplace. Organizations are also sharing
more information with third party-partners. With the growing volumes of information
Organizations benefit
traveling across corporate perimeters, keeping sensitive information safe is a challenge. because they can
easily unify, leverage,
Creating cohesiveness also alleviates compliance pain. Data knows no boundaries, but
regulators have stepped in to address data security and privacy for information that travels and extend the value
beyond the corporate border. Many different entities around the world regulate personally of best-of-breed
identifiable information (PII) and its related privacy-oriented information. Organizations data-centric security
must understand the location, ownership, and security of sensitive customer data to comply solutions into an
with the European Union's General Data Protection Regulation (GDPR), hundreds of data
residency requirements, and other emerging privacy regulations.
automated process
to better close
The ability to bring together best-of-breed data-centric security solutions to create a security gaps.
unified classification, detection, and protection process can help enterprises address all
these challenges while enabling business growth and continuity.
#US44857519 Page 6
IDC VENDOR SPOTLIGHT The Six Inconvenient Truths of Data-Centric Security
Seclore Helps Organizations Integrate & Automate Best-Of-Breed Data-Centric Security Solutions
Take control of your destiny. With Seclore's Data-Centric Security Platform you can unify best-of-breed DLP, CASB, data
classification, and rights management solutions into an agile, automated framework.
» Automate and unify the data discovery, classification, protection, and tracking process
» Eliminate the "blind spots" of individual data-centric security point solutions
» Leverage your existing IAM, file sharing, email, content management, and SIEM systems to streamline processes
» Ensure more of your documents are protected, trackable, and revocable - wherever they travel
Find out more about how you can close your security gaps at www.seclore.com
IDC Corporate USA This publication was produced by IDC Custom Solutions. The opinion, analysis, and research results presented herein are drawn from
5 Speen Street more detailed research and analysis independently conducted and published by IDC, unless specific vendor sponsorship is noted. IDC
Framingham, MA 01701, USA Custom Solutions makes IDC content available in a wide range of formats for distribution by various companies. A license to distribute
IDC content does not imply endorsement of or opinion about the licensee.
T 508.872.8200
External Publication of IDC Information and Data — Any IDC information that is to be used in advertising, press releases, or
F 508.935.4015 promotional materials requires prior written approval from the appropriate IDC Vice President or Country Manager. A draft of the
Twitter @IDC proposed document should accompany any such request. IDC reserves the right to deny approval of external usage for any reason.
idc-insights-community.com Copyright 2019 IDC. Reproduction without written permission is completely forbidden.
www.idc.com
#US44857519 Page 7