Published in


The New Normal has led to a shift from the office setup to the remote work scenario resulting in more emphasis on data-centric security. Read more to learn about the five trends that have accelerated the adoption of data-centric security to facilitate this shift without affecting business operations.

In 2020, enterprises had to ride a wave of IT architecture changes to transition to a remote work landscape. As moving employees to their home offices was sudden and unexpected, migration to the cloud had to be rushed to keep business operations running. Meeting solutions, cloud servers, and security integrations became the need of the hour in a short time.

Now, with more data flowing inside and outside the enterprise perimeter, it’s more important than ever to make data-centric security a top priority. This shift to data traveling “everywhere” has led to specific trends that enterprises should consider to meet security best practices and comply with data regulations.

Here’s a look at five trends that are driving organizations towards adopting data-centric security.

  1. Moving Data to the Cloud for Collaboration
  1. At Seclore, we have seen many of our customers move to the cloud. According to a survey conducted by Barracuda, 53% of respondents said that the COVID-19 crisis had made them accelerate plans to move all their data to a 100% cloud-based model.[i]
  2. The number one reason our customers wanted data-centric security in the cloud was that they were concerned about sharing sensitive data with unauthorized internal users, something enterprises found harder to control and happening more often In a report by Netwrix, only 8% of organizations[ii] say that they can spot unauthorized data sharing incidents in minutes. Hence, the concern for data storage and leaks is deep among most enterprises.
  3. Although the cloud vendors provide advanced threat detection mechanisms, enterprises are responsible for securing their sensitive data in the cloud.

The Data Explosion

  1. With the growing use of SaaS, IaaS, and PaaS in the last couple of years, traditional perimeter security has become obsolete because of the exponential growth in data volume, making it challenging for the security teams to handle using legacy systems. The key is to protect sensitive data at its source, no matter where it is stored.
  2. Here’s what Dr. Anhad Singh, Global Technical Leader from PKWARE Global, has to say about the importance of data protection at the source.
  3. “Traditional security approaches primarily aim to fortify the network perimeter and are predicated on the fact that there is a defined boundary within which the data will stay. Rather than only securing the network or at the source repository, it is critical that the data itself be protected via encryption, tokenization, etc.”

Automation in Deployment

  1. The looming fear of data breaches, compliance mandates, and the changing threat vectors has made the speed of deploying security solutions extremely critical. Hence, it becomes an essential consideration for CISOs when they are evaluating a security solution. Traditionally, the long deployment cycles for security solutions increased the risk of bad actors stealing sensitive data. Hence, by the time the IT team deployed the security solution, the damage was already done.
  2. It is increasingly crucial for security solution providers to focus on a time-to-value approach by applying modern automated deployment techniques and require little or no IT administration.

Bring Your Own Devices

  1. In this new normal, organizations have allowed their remote workforce the flexibility to use their mobile devices and personal laptops to manage day-to-day work. In doing so, organizations allow employees to stretch the network to non-company issued devices that the security administrator cannot govern.
  2. However, Microsoft Intune, MobileIron, and other MDMs designed to apply protection policies to your applications and devices can help manage corporate data shared across devices. Furthermore, with MDM integrations like Seclore for Intune, only authorized users can access, edit, and reply to confidential information even when shared with internal users, partners, and service providers outside your enterprise network.

Identity Management

  1. While organizations are battling “how” their sensitive data is handled as it gets shared internally, externally, and stored on the cloud, managing “who” is accessing this information is also essential.
  2. Identity and access management (IAM) systems help incorporate two-factor authentication and policy-based access controls to the existing data sources. However, enterprises need an IAM solution that integrates with their current environment and is easy to set up with minimal overhead.
  3. With rights management and identity management combined, organizations can control which users/groups can access the data and what privileges (read, edit, share, etc.) the user can access when they access sensitive information.

As predicted by the experts, the new normal of a remote working model is here to stay. While this model may undergo a few changes with time, the need for more robust data-centric security is permanent, and these trends will only help fine-tune the strategies.

Original Source:



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store

Seclore’s Enterprise Digital Rights Management solution enables organizations to persistently control the usage of files wherever they go.