We are really excited about our partnership with Vormetric and welcome the below guest blog post by Michael Rothschild from Vormetric. 

 

I remember in the heady days of the dot.com boom where people were just migrating off their 56.6K modems onto DSL. Everything was so new that few people even considered that crime could take place through a wire or how anything virtual could ever pose a “real world” threat. It didn’t take long though. Suddenly, we began to see webpage defacement when rogue hackers took over a site. They used various means including DNS poisoning, leveraging open ports and in many cases taking advantage of an unknown vulnerability or default setting. Few knew or perhaps cared; a successful hack was more of an inconvenience than anything. A proverbial blip on the radar.

 

Fast forward to today, and times have changed!  Businesses rely on IT as a core pillar supporting their business. Once more, the damage from an attack is significantly more impactful that a simple defaced page. Not a day goes by without a news story about a large company, government institution or organization being hacked. The motivation for hacking is simple, it is about stealing sensitive information and using it to make money. The results, as we have seen, are simply frightening.

 

There has been a tipping point in the world of security. The tipping point we have reached today is the “consumerization” of cyber-crime. You can easily walk into the corner barbershop and the discussion may be about the breach in the paper that morning, the identity theft due to stolen credentials, or the types of security being deployed on your credit card (chip & pin). What seemed like science fiction at the turn of the century, has become reality in the blink of an eye. Moreover, security (or lack thereof) has moved from the techie realm into real life consequences for both the organization as well as the individual.

 

This tipping point did not happen by chance. As organizations and as individuals, we quite literally put everything online – enter the Big Data era. Facebook, online billpay, stock trading, placing orders for goods, package tracking, filing taxes, writing wills, setting our thermostats, car diagnostics; EVERYTHING is online. Companies have gained huge insights in aggregating this information and leverage it to better run their business, service their stakeholders, and gain new efficiencies leading to improved profits and ROI. At the same time, this information is also the crown jewels for the criminal to gain access to data and use it for illegal means. Perhaps the scariest of all are the attacks being perpetrated by nations escalating the security discussion from consumers to full blown cyber wars. It makes the 1983 MGM movie titled War Games look more real than we may care to admit.

 

The shift in the state of cybercrime has forced us collectively to rethink the way we secure our most important asset – our data. For individuals, this may be their personal identities and credentials; for organizations it may be their intellectual property and customer data. While it is important to maintain physical control of this information, it is also important to realize that at some point chances are that we will be breached – and someone will gain access to our data. But our acceptance of this inevitability does not translate into defeat. Rather it involves a change in how we approach security.

 

Many organizations are turning to new ways of solving the Big Data – Security conundrum. Solutions such as Couchbase offer a powerful NoSQL Big Data platform with Vormetric ensuring that the high performing applications are also highly secure and fully compliant with regulatory statutes. Couchbase offers several different security controls at the database level to protect your sensitive data such as SSL connections, LDAP based authentication for administrators, and auditing. In addition to the security controls inside Couchbase, to keep your stack secure, you need security controls at the system, application, operating system and network level. At the system level, vormetric blocks as well as audit accesses to Couchbase by non-Couchbase machine administrators. With vormetric, at the application level, you can also obscure pieces of information through data masking and tokenization, so that only internal users have access to data, getting only the information they need; such as only the last four digits of your social security number. At the operating System level, encryption renders confidential information useless by turning the information into “gibberish”.  In the event that a criminal defeats all existing deployed security such as firewalls, IPS, VPN etc., the information they are after is useless.

 

Big Data provides volumes of unique and highly sought after data both for the organization and for the criminal. Employing encryption with granular access control technology provides both organizations and individuals the peace of mind needed to remain secure in this highly unsecure world.

 

Now you can go back to talking about the baseball scores with your barber rather than the latest breach.

작성자

게시자 돈 핀토, 수석 제품 관리자, Couchbase

돈 핀토는 Couchbase의 수석 제품 관리자로 현재 Couchbase Server의 기능을 발전시키는 데 주력하고 있습니다. 데이터 기술에 대한 열정이 대단한 그는 과거에 기술 블로그와 백서 등 Couchbase Server에 관한 여러 기사를 저술한 바 있습니다. Couchbase에 입사하기 전에는 IBM에서 수년간 근무하며 DB2 정보 관리 그룹에서 소프트웨어 개발자의 역할을 수행했고, 가장 최근에는 Microsoft의 SQL Server 팀에서 프로그램 관리자로 근무했습니다. Don은 캐나다 토론토 대학교에서 컴퓨터 공학 석사 학위와 컴퓨터 공학 학사 학위를 받았습니다.

댓글 남기기