Businesses forced to choose between offense versus low-risk defense look to DataOps to help safely move fast and win. rn I sometimes like to tell a story about a computer science professor at my alma mater discussing the trade-offs of various data structures. It goes like this: A clever student tried to stump the professor. He asked: “What if I wanted a data structure that I wrote to but never read from?” The professor paused for a moment, and then responded: “In that case, I’d simply take the data and throw it away.” SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe Put another way: If you’re never going to access the data, why store it in the first place? This friction is not hypothetical: Forrester Research estimates that somewhere between 60%and 73%of enterprise data is never used for analytics. While there are many contributing factors, security is a big one. In choosing between “data defense” (reducing risk) and “data offense” (driving revenue), businesses are forced to determine how much they are willing to limit access in the name of security. The sports adage that “defense wins championships” doesn’t function at the extreme: Just as a sports team with perfect defense can’t win if it doesn’t put points on the scoreboard, a company that practices perfect security can’t derive value from its data. The inclination to simply clamp down on access is natural, and one espoused by those like Kevin Andrews, CTO of the Atlanta-based employee benefits service company Hodges-Mace: “You are better off securing the entire data set. Segmented secure/non-secure data is risky due to the potential lack of communication within the organization … This leaves a high degree of vulnerability and the potential of someone distributing insecure data.” “Secure Everything” is an elegant mantra, but practicing it comes at a cost. As the fuel of today’s digital economy, data is crucial to accelerating the velocity of innovation in the business. Whether it’s a new personalized mobile app built on machine learning, or new insights that can be gleaned from customer behavior, data lies at the core of most digital efforts. Companies that evaluate data security only from a defensive perspective often fail to see the risk that a lack of offense creates for the business. Companies naturally focus first on securing production data for use by multiple different applications and projects. This is a well-trodden, if not easy, path that includes techniques such as encryption, transport security, and roles and access controls. But satisfying data needs means delivering data to a wide variety of consumers outside of production applications. Solving this typically means obscuring sensitive data to create a radically lower risk profile in these downstream environments. The traditional technique for this — data masking — has been around for nearly as long as there has been data and is well-understood. Data masking takes sensitive data and creates a masked form, from which the original data cannot be derived. While masking capabilities have evolved to include things like dynamic masking as data is read from the source, its core focus remains: obscuring data within one source. The real challenge comes not from securing a single dataset, but in the ability to continuously deliver secure data to downstream consumers. Look no further than the recent breach at the U.S. Securities and Exchange Commission for an example. An unknown attacker breached a system operated by a third-party contractor normally used to test SEC systems. Data used for testing purposes was actually authentic data from unreleased corporate filings, not the dummy data that should have been used. (The FBI is investigating suspicious trades that followed.) The SEC case serves as a reminder that the need to accelerate innovation for data consumers is just as real for third-party contractors as it is for your own employees. Yet it’s unrealistic and impractical to establish the same levels of confidence, risk assessment, and security procedures with every third party. The solution is to deliver only the secure data into that environment, so that if breaches happen, sensitive data isn’t at risk. DataOps changes the dynamic in such a way that we no longer evaluate tools with the intent of securing a single dataset, but rather enabling secure access for all. Combining data security and delivery into a single workflow, creates an environment ripe for innovative solutions to problems that weren’t apparent before. And it allows companies to practice both offense and defense without putting the company at risk. This is the true power of DataOps: Bringing people together and empowering them to invent new data solutions to drive the business. Imagine one day waking up to the news that your third-party development shop had a massive data breach, only to shrug it off, secure in the knowledge that your company’s sensitive data had never been at risk in the first place. Success means we can have our cake and eat it too, with offense and defense working together for the success of the business. Related content brandpost It’s 11:05 p.m., Do You Know Where Your Data Is? Neglecting to protect data costs companies an average of $8 million per breach, and will only get worse By Eric Schrock Jan 03, 2018 5 mins Backup and Recovery Internet Data Center brandpost Under GDPR, “Personal Data” Can Mean Lots of Things Failure to properly protect a u201cpersonal data breachu201d can result in hefty fines.rn By Jason Grauel Dec 14, 2017 7 mins Security brandpost Data Security Needs to be Re-Imagined for the Cloud With our increasingly distributed multi-cloud world, protecting data in the cloud is complex and tricky. rn By Eric Schrock Dec 12, 2017 5 mins Cloud Computing brandpost Demo: Moving Data Between Clouds with the Delphix Dynamic Data Platform Learn how to replicate data from Amazon Web Services (AWS) into Microsoft Azure, and also from Azure to AWS.rn By Adam Bowen Dec 07, 2017 2 mins Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe