Can cross-pollinating data and security block the new cyber-hacking threat? | #theCUBE
These days there is a lot of talk about migrating up the stack; businesses are abandoning data centers and moving to cloud to focus on applications higher up the stack; vendors want to get out of plumbing and into up-the-stack software as a service. Some smart vendors don’t just want to move up the stack, but across it, as in from data to security and back, for instance.
DataGravity Inc. Founder and CEO Paula Long said that data and security pros and vendors must break the silence between them and start collaborating. She told Stu Miniman (@stu), host of theCUBE*, from the SiliconANGLE Media team, these two areas of IT have much to gain from cross-pollinating.
“It’s sort of ridiculous that when you talk to security people, they know nothing about data — that’s kind of an overstatement, but not untrue,” she said. “And you talk to the data people, and they know nothing about security.”
Rethinking the restore point
Long said that data intelligence can help companies make better decisions about what to do in the event of a security breach and as prevention as well. “Time is great, but events are better. You really want to be able to take a snapshot of what’s going on when something is about to get into trouble,” she explained.
She said that pinpointing the moment a breach happened and restoring to just before that event is often a better move “because restore from a backup is one way to do it, but you’re going to lose a lot of data.”
Allied forces against new cyber crime
Cyber hacking is not just for kicks anymore and is increasingly monetizing, Long said. To fend off the new threats, security has to cover more ground more aggressively.
“The vendors more than ever are coming together to work together, to provide APIs to each other, so you can cover that full surface,” she said. “No one company can solve the problem, but as the companies start to work together, you’re going to have a much better defense — and some offense.”
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Wikibon & CUBEconversations 2016 | Palo Alto & Marlborough. If you don’t think you received an email check your
spam folder.
Sign in to Wikibon & CUBEconversations 2016 | Palo Alto & Marlborough.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for Wikibon & CUBEconversations 2016 | Palo Alto & Marlborough.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
Wikibon & CUBEconversations 2016 | Palo Alto & Marlborough. If you don’t think you received an email check your
spam folder.
Sign in to Wikibon & CUBEconversations 2016 | Palo Alto & Marlborough.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to Wikibon & CUBEconversations 2016 | Palo Alto & Marlborough
Please sign in with LinkedIn to continue to Wikibon & CUBEconversations 2016 | Palo Alto & Marlborough. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
The State of Data and Security with DataGravity
Can cross-pollinating data and security block the new cyber-hacking threat? | #theCUBE
These days there is a lot of talk about migrating up the stack; businesses are abandoning data centers and moving to cloud to focus on applications higher up the stack; vendors want to get out of plumbing and into up-the-stack software as a service. Some smart vendors don’t just want to move up the stack, but across it, as in from data to security and back, for instance.
DataGravity Inc. Founder and CEO Paula Long said that data and security pros and vendors must break the silence between them and start collaborating. She told Stu Miniman (@stu), host of theCUBE*, from the SiliconANGLE Media team, these two areas of IT have much to gain from cross-pollinating.
“It’s sort of ridiculous that when you talk to security people, they know nothing about data — that’s kind of an overstatement, but not untrue,” she said. “And you talk to the data people, and they know nothing about security.”
Rethinking the restore point
Long said that data intelligence can help companies make better decisions about what to do in the event of a security breach and as prevention as well. “Time is great, but events are better. You really want to be able to take a snapshot of what’s going on when something is about to get into trouble,” she explained.
She said that pinpointing the moment a breach happened and restoring to just before that event is often a better move “because restore from a backup is one way to do it, but you’re going to lose a lot of data.”
Allied forces against new cyber crime
Cyber hacking is not just for kicks anymore and is increasingly monetizing, Long said. To fend off the new threats, security has to cover more ground more aggressively.
“The vendors more than ever are coming together to work together, to provide APIs to each other, so you can cover that full surface,” she said. “No one company can solve the problem, but as the companies start to work together, you’re going to have a much better defense — and some offense.”