Enterprises Are Not Monitoring Access to Sensitive Data

If you want to make a cybersecurity professional uncomfortable, simply utter these two word: ‘Data exfiltration.’ Why will this term garner an emotional response? Because data exfiltration is a worst-case outcome of a cyber-attack – think Target, the NY Times, Google Aurora, Titan Rain, etc. Simply stated, ‘data exfiltration’ is a quasi-military term used to describe the theft of sensitive data like credit card numbers, health care records, manufacturing processes, or classified military plans.

Most enterprises now recognize the risks associated with data exfiltration and are now reacting with new types of security technologies, granular network segmentation, and tighter access controls. Good start but what about simply monitoring sensitive data access activities? You know, who accesses the data, how often, what they do, etc.?

Topics: Information and Risk Management Dell Security and Privacy Security google Centrify CyberArk Courion Sailpoint data security Quest Box Symantec Target nsa cybercrime identity and access management security analytics Edward Snowden

Dell Acquires Quest to Expand Software Capabilities

Dell recently formed the Software Group in an effort to increase its solutions portfolio with Dell-owned intellectual property and I suspect to take a more active role in the way organizations are thinking about transforming application and desktop delivery. Quest on the other hand has made numerous acquisitions over the years, but has struggled internally with its go to market strategy. Quest’s family of software solutions and technologies align well with Dell’s software strategy, and with the acquisition, add critical components to expand Dell’s software capabilities in systems management, security, data protection, and workspace management.

I would first look to see what Dell does with the Quest acquisition in the area of application and desktop delivery. Quest One Identity and Access Management solutions will blend with SonicWall and SecureWorks security products, and Quest’s Performance Management solutions will complement its Clerity Solutions and Make Technologies acquisitions. Quest also has some interesting workspace management solutions, i.e., Quest vWorkspace that may be the sleeper in this acquisition. VMware has Horizon, Citrix has project Avalon, and now Dell is about to own a very compelling set of capabilities to flexibly deliver similar features not locked to a single solution. This may be exactly what customers are looking for. The question is: will they turn to Dell for it?

Topics: Cloud Computing End-User Computing Endpoint & Application Virtualization Dell Quest Virtualization