Excellium360: time to strengthen your database protection
“Through our monitoring centres, we try to detect suspicious or abnormal situations. However, in a world of finite resources, unfortunately malicious acts, theft, or datacdestruction can be advantageous to some. Excellium360 is your new secret weapon. Its main objective is to target data protection more precisely to protect data in the context of the cloud, or data warehouses directly.” answers Christophe Bianco, Managing Partner at Excellium Services.
Moreover, nowadays regulations oblige entities to take measures to guarantee data protection. Beyond compliance, envisaged at a legal level, this protection must be reflected in the approach to IT security. Indeed, to protect the most essential data and ensure business continuity, it is at the database level that security must be strengthened. How to protect against a data leak? This question is a key concern for many business leaders. The increase in the number of data leaks and ransomware cyber-attacks in recent months is cause for concern. With the strengthening of data protection regulations, organizations are more exposed than ever to sanctions from regulators.
“Companies are having to juggle with an increasing volume of data. On the other hand, they have to take into account increasingly stringent regulatory issues. They must therefore prioritize their choices and invest wisely to protect themselves against the risks associated with data management.” says David Dutertre, Solutions Offering Manager, at Excellium Services.
Secure data effectively beyond compliance
The implementation of the General Data Protection Regulations (GDR or GDPR) was to strengthen data protection. “Too often, unfortunately, companies approach GDPR from a compliance perspective and not from a security perspective. Therefore, it remains difficult for many companies to ensure and demonstrate that the means to ensure data protection are well applied”, comments Gaëtan Franquin, Pre Sales at Excellium Services.
The cybersecurity company, the market leader in Luxembourg and present in Belgium, France and sub-Saharan Africa, has made this observation on numerous occasions. “Insurance companies regularly mandate us to intervene at one of their customers’ premises after an incident,” continues Gaëtan Franquin. “In 80% of cases, if there is a data breach, it is very difficult to find traces to determine the cause, assess the extent of the problem or identify the data concerned.”
Excellium360 offers a permanent monitoring
Faced with these challenges, Excellium Services has recently decided to strengthen its global IT Security Management offer. With Excellium360, it leverages IBM’s Guardium solution to ensure optimal database protection. Beyond the security of IT systems, it is important to have a global view of the status of your data,” says David Dutertre. Today, behind every application there is a database that needs to be protected. Now we can offer permanent monitoring of these sources of information (which usually contain essential structured data) to detect anomalies.”.
Databases are often the targets of attacks
It is these databases that are most often the targets of attack. Indeed, they usually contain a lot of data that can be exploited easily by malicious individuals. However, leaks can also be unintentional. For example, one employee can send an email to another via an infected mailbox,” explains Gaëtan Franquin. The IBM Security Guardium solution allows you to verify the organization manages and secures data properly in compliance with GDPR and other regulations. Plus, it enables to quickly produce compliance reports. In addition, it enables real-time monitoring of data access and manipulation. It is, therefore, possible to know, for each piece of data, whether it has been modified or extracted. “
Excellium360 can continuously assess the level of safety, prevent problems, detect intentional or unintentional leaks, and provide support for incident response and the recovery of operations. “The organization has greater visibility into how it secures and uses its most sensitive data. It ensures that the incident response is as effective as possible. With such a solution, the entity can quickly identify the data the leak affected. It can also provide a clear and documented response to the regulator. The result is increased confidence in how the data is managed and protected,” David Dutertre continues.
Excelllium360 protects your most sensitive data
The implementation of the solution can be considered as a complement to infrastructure and application monitoring performed either by Excellium’s Security Operation Center (SOC) or independently. The organization can apply the solution to any database, regardless of the underlying technology. “If it helps strengthen security by being as close to the data as possible, such a solution can be applied to the most sensitive information once it has been identified. As we often say, you can only protect what you know well,” continues Gaëtan Franquin. The risks associated with a leak are significant. Beyond the losses related to an interruption in operations or exposure to sanctions from the regulator, it is the company’s reputation that can suffer considerably from an incident resulting in the compromise of data. Once vital data has been properly identified, it is essential to take appropriate measures to protect it.”.