Over a million developers have joined DZone.
{{announcement.body}}
{{announcement.title}}

Will We Be Able to Control Data in the Wild? [Video]

DZone's Guide to

Will We Be Able to Control Data in the Wild? [Video]

One of the best aspects of the cloud is that you don't have to think about where your data is. It turns out, that can also be one of the worst aspects of it, too.

· Cloud Zone
Free Resource

Deploy and scale data-rich applications in minutes and with ease. Mesosphere DC/OS includes everything you need to elastically run containerized apps and data services in production.

“Once the data is out there, it’s out of their control,” said Elliot Lewis (@elliotdlewis), VP of security, risk, and compliance research at Info-Tech Research Group, in our conversation at the Black Hat USA 2016 conference in Las Vegas. “This has been a persistent problem for several years now about how do we trust going to the cloud.”

Even though all businesses know that the efficiencies of the cloud are critical for business, those persistent concerns of where one’s data going when it’s in the cloud and how one should protect it, still linger.

To get a better handle on floating data, a new category of technologies and companies are cropping up that hope to offer persistent control of data, said Lewis. But this new product category introduces lots of questions and demands.

For example, if a piece of data goes into the wild, can we still control it? Can we still see who accessed it? Can we see where it’s been to and where it’s going to? Can we actually manipulate it? And should we see it fall into the wrong hands, can we get it to destroy itself at that moment?

That’s a lot of demands, and there’s no question that the market for such a technology would be enormous.

At this point, said Lewis, there’s been a nascent movement in several different formats. Info-Tech is watching to see which companies will take hold, build a standard, and get users to adopt.

Lewis describes the pros and cons of the different models he’s seeing right now. One requires a call to the owner, once accessed, and the other has encrypted controls alongside the data itself.


Discover new technologies simplifying running containers and data services in production with this free eBook by O'Reilly. Courtesy of Mesosphere.

Topics:
cloud ,cloud security ,data management ,encryption

Published at DZone with permission of David Spark. See the original article here.

Opinions expressed by DZone contributors are their own.

THE DZONE NEWSLETTER

Dev Resources & Solutions Straight to Your Inbox

Thanks for subscribing!

Awesome! Check your inbox to verify your email so you can start receiving the latest in tech news and resources.

X

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}