itb-nz logo
Story image

Micro Focus: How to reduce the cost of data security

10 May 2019

No information technology process is free.

There is always a cost; if not to the service consumer, then most definitely to the service provider. Data protection in the form of either encryption or tokenisation is no exception.

When these technologies are added to an existing IT process, costs go up, according to Micro Focus.

These can be direct costs, in the form of acquiring more equipment or software licences or spending more on operational costs, such as power and staff.

Or the costs can be indirect, for example, taking more time to complete an IT process as data protection is CPU-intensive.

While each data protection operation takes microseconds, in a large organisation protecting petabytes of data, these all add up.

Micro Focus Australia and New Zealand enterprise security platforms director George Atrash says,  “The question then becomes how organisations can mitigate these direct and indirect costs. The answer is by reducing the number of times a data protection IT process needs to run.

“This can be done by protecting data at the application level, avoiding decryption when possible, and reducing the life cycle key management cost.”

One of the benefits of protecting data at the application level is protection can be applied only once. Persistent and pervasive data benefits most from application-level protection as the data need not be protected and re-identified when it moves throughout the enterprise.

This avoids security gaps, as well as the cost of repeated protect/unprotect cycles.

So, while application-level data protection may cost more during deployment, this method has lower operational cost.

Atrash says, “This means that one method of reducing cost and increasing overall system performance is avoiding unnecessary protection.

“The second method is to avoid unnecessary re-identification, decryption, or de-tokenisation whenever possible.”

Data protection is a function with an inverse: protect something and get exactly one unique output. Re-identify that output and always receive the original input.

The relational integrity is maintained and relational algebra on the protected data can be performed without spending the cost or time to first re-identify that data.

The ability to avoid re-identification can be taken further via the concept of partial protection.

Partial protection avoids the cost and increases performance beyond that of full protection by removing data sensitivity while still allowing more types of authorised use. 

The third method that can be used to reduce cost and increase performance is employing stateless key management.

Encryption requires the use of a security key for every different access policy.

And, there are often thousands of granular access policies running within an enterprise.

Stateless key managers generate encryption keys for authenticated users on demand.

If a user needs a key that protected data 10 years ago, a stateless key manager has no trouble delivering that key today.

And, stateless key managers do not have an upper limit on the number of keys that may be in use at any point in time.

If an enterprise needs 10 million keys to protect its Internet of Things, a stateless key manager can handle the load.

And a stateless key manager integrates with existing directory authentication services, avoiding the need for dedicated staff.

Atrash adds, “Organisations should keep in mind that judicious use of data security does reduce its cost and increase its performance.

"Avoiding re-identification, employing partial protection, and focusing on key management cost of ownership are long-term methods for efficient implementation of a data security practice.”

Link image
Join Nintex on 3 December for Workflow Wonders: TLC for Kids
TLC for Kids is a charity that puts smiles back on childrens’ faces during times of illness. Learn how the charity leverages Nintex to free up resources so it can focus on what really matters. Nintex will donate A$5 for each registration to TLC for Kids! Find out more.More
Story image
Businesses struggling to achieve cloud migration in wake of COVID-19
Cloud adoption has increased due to the COVID-19 pandemic, but businesses are struggling to meet their cost and performance needs due to migration challenges, new research finds.More
Story image
Webinar: TLC for Kids on their usage of Nintex Drawloop DocGen
The charity is using the software to free up resources and enable its team to focus on its mission — which, simply put, is to put smiles back on sick kids’ faces. It does this through its TLC Ambulance, Rapid TLC, and distraction box programs, and its services are used over a million times each year across Australia.More
Story image
8x8 named as Challenger in Gartner Magic Quadrant for Contact Centre as a Service
According to 8x8 chief executive officer Vik Verma, the recognition also validates the company’s single-platform approach to contact centre innovation.More
Story image
AppsFlyer opens Sydney office, expands into A/NZ region
AppsFlyer has opened an office in Sydney, it’s 19th office worldwide and its first in Australia and New Zealand (A/NZ), marking the company’s expansion into the region.More
Story image
Q&A: StorageCraft director on how backup and recovery has changed in 2020
Techday spoke to StorageCraft international product marketing senior director Florian Malecki, who discusses the importance of backup and recovery, the products and solutions that StorageCraft offers in this field, and the revenue opportunities partners can capitalise on. More