Menu

How it Works / Data Security Requirements

There are 10 key data security requirements in order to truly change the castle model of domain construction, and to be able to consistently and effectively secure network data

Data Security Must Be:

Hover over image for more information

keyrequirements_pervasive

Pervasive

All data must be protectable at all times, including streaming data and field elements within databases
keyrequirements_persistent

Persistent

All data must be secured at all times, allowing no margin for error or malicious behavior. System must fail ‘closed’
keyrequirements_independent

Independent

Data security must travel with the data independent of the domain. The data owner/author, must be able to track use of the data, and be able to revoke data access
keyrequirements_transparent

Transparent

User operation must require little to no additional knowledge
keyrequirements_governed

Governed

Must accept and maintain corporate and data governance rules at the data level
keyrequirements_automatic

Automatic

Can’t be thwarted either maliciously or accidentally
keyrequirements_revocable

Revocable

The data owner (author) must be able to revoke access to the data even when data moves to other domains
keyrequirements_auditable

Auditable

Audits are fully trackable across foreign domains, and behavioral analytics provide data analysis regardless of where the data travels to or exists
keyrequirements_scalable

Scalable

Must provide automated threat prevention, active response, and AI functionality to deal with issues and threats as they occur
keyrequirements_IoT

IoT Ready

Must provide a secure fabric that works across all data, across all devices