In a new report, Data obfuscation rises in importance due to the growing desire for self-service data, 451 Research concludes that the need to integrate techniques such as data masking into self-service data operations will rise as organizations look to accelerate their DevOps and developers’ access to production data. The study finds that more organizations are aiming to implement data obfuscation methods, including ShardSecure’s Microshard™ technology, to protect their data.
Authored by ShardSecure’s Jesper Tohmo, CTO and Co-founder and Christer Roslund, VP Engineering and Co-founder, as well as Robert A. Clyde, ISACA Board Member and ShardSecure Senior Advisor, this whitepaper details how a new technology, Microsharding, has emerged as a leading data security and privacy solution.
This document is designed to aid security implementers to securely plan a Microshard deployment, as well as auditors in assessing risk and compliance with data secured by Microshard technology. There are unique concepts and considerations when auditing Microsharded data, and careful considerations to take into account when deploying Microshard Technology in your environment. As with all security tools, the details matter.
Get an inside look at the most prevalent ways organizations are being breached in the cloud, and how you can mitigate those risks with Microsharding. Dr. Ed Amoroso, TAG Cyber and our CEO and Co-founder Bob Lam, join cybersecurity experts from the ShardSecure team to outline how you can ensure total data privacy for your organization beyond encryption.
ShardSecure’s Microshard™ technology shreds, mixes and distributes data to eliminate the value of data on backend infrastructure, ensuring data is protected in the event of a breach, separated from those with privileged access and that the sensitivity class is reduced.
ShardSecure’s CEO, Bob Lam, joined TAG Cyber’s Ed Amoroso, to discuss how microsharding data will augment encryption in the near term and potentially replace the need for encryption altogether.
ShardSecure’s VP Strategic Sales, Robert Stephen, joined TAG Cyber’s Senior Analyst, Katie Teitler to discuss the need for businesses and organizations to remain operational with staff working from anywhere.
Data sharding for back-end cloud security addresses the threat of compromised insiders with privileged access. The Method disaggregates, separates, and obfuscates data so that insiders within cloud service infrastructure cannot make sense of stored assets.
Splitting sensitive data into dispersed “microshards” can help reduce data sensitivity while lowering compliance costs and accelerating cloud adoption. ShardSecure CEO Bob Lam appears in Episode #4: Cyber Insights by SOSA.
ShardSecure CEO, Bob Lam, presents the company’s unique Microshard technology to a panel of industry experts at the AWS event. As cloud adoption soars amid overwhelming global demand for work-from-home compatibility, we are proud to be voted “Judges Favorite Startup” at the AWS Winning Pitch Deck event last October.