In a new report, Data obfuscation rises in importance due to the growing desire for self-service data, 451 Research concludes that the need to integrate techniques such as data masking into self-service data operations will rise as organizations look to accelerate their DevOps and developers’ access to production data. The study finds that more organizations are aiming to implement data obfuscation methods, including ShardSecure’s Microshard™ technology, to protect their data.
Authored by ShardSecure’s Jesper Tohmo, CTO and Co-founder and Christer Roslund, VP Engineering and Co-founder, as well as Robert A. Clyde, ISACA Board Member and ShardSecure Senior Advisor, this whitepaper details how a new technology, Microsharding, has emerged as a leading data security and privacy solution.
This document is designed to aid security implementers to securely plan a Microshard deployment, as well as auditors in assessing risk and compliance with data secured by Microshard technology. There are unique concepts and considerations when auditing Microsharded data, and careful considerations to take into account when deploying Microshard Technology in your environment. As with all security tools, the details matter.
ShardSecure’s Microshard™ technology shreds, mixes and distributes data to eliminate the value of data on backend infrastructure, ensuring data is protected in the event of a breach, separated from those with privileged access and that the sensitivity class is reduced.
Data sharding for back-end cloud security addresses the threat of compromised insiders with privileged access. The Method disaggregates, separates, and obfuscates data so that insiders within cloud service infrastructure cannot make sense of stored assets.