Home
Insightful &
Helpful Articles

Here is what we're working on and
thinking at Hedgehog security.

What will the threat landscape look like in one, five and ten years, and what should enterprises at all levels be doing to counter those threats?

Experts on a recent panel discussion among Dell security experts, partners, analysts and customers agreed that security in the future, to be effective, will not about the devices, the network or even the user, but about embedding data with its own protect.

The event, the first in what is titled the "Dell 1-5-10 Series" security discussions, was focused on what the title suggests: What will the threat landscape look like in one, five and ten years, and what should enterprises at all levels be doing to counter those threats?

During the session, it was agreed that the current security model, which has not changed in decades, will not survive the future. Relying on an application to identify the person is now obsolete. With the pervasiveness of Data, on devices, in the cloud and in constant transmission, it is near impossible to identify all the instances of the data so data need to be self-protecting.

Self Protecting Data

So how do you give data the capability to protect itself?

According to Patrick Sweeney, executive director at Dell SonicWALL, it would be "only about the data" not about the device, not about the network. You need to protect it, own it, revoke it.?

To do that would require three things: ?First, encrypt it with enterprise key management. That's fundamental to any BYOD strategy. Second, it has to reside in a virtual container that I control, like an embassy that is subject to my rules and my laws. Somebody else can't repurpose it, send it out on an email or do anything with it.

Finally, he said, it would have to possess egress policies that control who can access it. ?If I want to revoke the key, I can hit a red button and it doesn't?t matter if the bytes are still there, you can?t read them,?
Interesting, but would it work? In principle, there is no reason why not, it is simply down to building an application to manage the process.