Gemalto’s new platform aims to safeguard enterprise data any time, anywhere
Security provider Gemalto has launched a centralised cloud-based services platform to help enterprises safeguard data, meet compliance mandates, and secure crucial information any time and from anywhere.
According to the company, SafeNet Data Protection On Demand helps resolve issues related to cost and complexity of shielding data by providing a single data security-as-a-service platform. The platform can easily integrate with the existing IT systems, DevOps tools and cloud services to protect wherever data is created, accessed or stored.
Sebastien Cano, executive vice president for enterprise and cybersecurity at Gemalto, said: "SafeNet Data Protection On Demand simplifies data security operations by lowering the cost of ownership, reducing deployment times and eliminating the need to manage multiple solutions. The platform's cloud neutrality model also brings speed, agility and flexibility for users to deploy the data security services they need in minutes with flexible pay-as-you-go pricing."
Elsewhere, a survey from Gemalto has found that an increasing number of enterprises and consumers are losing their confidence in the security of Internet of Things (IoT) devices. According to the survey, 96% of organisations and 90% of consumers acknowledge the requirement of IoT security regulations and they want the government to intervene in this matter.
The most common concern for 65% of consumers is a hacker-controlled IoT device, while 60% are worried that their personal data will be stolen. The survey also found that 67% of companies encrypt all their data captured or stored via IoT devices. However, despite these concerns, manufacturers of IoT devices and service providers expend only 11% of their total IoT budget on securing their IoT devices.
- » Dealing with insider threats and keeping your enterprise secure: A guide
- » For enterprise cyber defence, there should be more than one solution
- » Enterprise mobility and security: How to build a BYOD policy
- » Five secrets of successful CISOs: Communication, regulation, and more
- » Forget facial recognition: Let’s use AI to help gauge integrity