IoT and Internal Big Data Protection

By on

covby Angela Guess

According to a recent press release out of Covata, “The recent hacking news about using IoT devices points out the need for new techniques to ensure data security for companies. As the Internet of Things becomes a reality the number of data points that could potentially be attacked by hackers are also rising at a staggering pace.  Gartner predicts that by 2020 there will be 9.7 billion connected devices, all of which represent a possible entry point for an attacker. Enterprises are slowly realizing that with so many entry points it’s impossible to try and keep hackers out. They must assume that data within the company – inside the corporate perimeter – is at risk and needs to be protected from within. Organizations have to accept that data, personal information and intellectual property will travel without their knowledge or control. Increasingly, this will be to places they cannot trust, which renders network-based security futile in the organization’s attempt to protect its data.”

The release goes on, “Instead of attempting to build a secure environment, protected by perimeter security, organizations need to secure the data itself. The future of IoT will hinge on data centric security that combines encryption, identity, and access for seamless sharing of data without sacrificing privacy and compliance requirements… Covata’s flagship secure file sharing application, Safe Share supports all file types, giving access to everything needed to enhance productivity.  Users can keep working and producing whether they are at the office, a partner site or travelling. Users can adjust permission levels of collaborators at any time based on changing business requirements. File owners set their own access policies, view file histories, and instantly revoke files simply by un-sharing. Safe Share adds intelligence to company workflow – enabling the right access of corporate data, to the right people, at the right time. Safe Share is built from the ground up with access controls and business rules integrated with encryption for a unified solution.”

Learn more at

Photo credit: Covata

Leave a Reply