The most popular and comprehensive Open Source ECM platform
Data protection isn’t easy. The endless list of breaches that occur and expose many thousands and millions of data records is a reminder of just that.
Elliot Lewis, CEO at Keyavi Data, said that “cybersecurity technologies have been overly focused on data loss protection and breach detection in an attempt to contain data. But in the real world, companies cannot run their business effectively and contain data; the very nature of which is that it must be shared across platforms and applications, locations and devices to bring value.”
Strong encryption of data during transmission and storage is usually the best that we can do. But the moment that data is decrypted, it immediately becomes vulnerable to theft or loss.
How can we do better? The company Keyavi has a solution that automatically tracks and notifies owners of who is accessing it, and data is only be accessible to designated people and in designated locations.
The Keyavi solution provides a chain of custody of who has been able to see the information and when. Lewis said that competing solutions are “all about how to keep the data within a certain platform or container or operation. It’s always about doing something around the data. Other methods are tied into policy servers where the data has to check back, or only opens up for a particular application or container or platform. With Keyavi, protection is built into the data itself.”