Top 10 Data Security and Privacy Technologies

March 9, 2018 in General

Forrester Research recently investigated the current state of the 20 most important data protection tools. Based on Forrester’s analysis, here’s Forbes top 10 data security and privacy technologies:

  1. Cloud data protection (CDP): Encrypting sensitive data before it goes to the cloud with the enterprise (not the cloud provider) maintaining the keys.
  2. Tokenization: Substituting a randomly generated value—the token—for sensitive data such as credit card numbers, bank account numbers, and social security numbers. A
  3. Big data encryption: Using encryption and other obfuscation techniques to obscure data in relational databases as well as data stored in the distributed computing architectures of big data platforms, to protect personal privacy, achieve compliance, and reduce the impact of cyber attacks and accidental data leaks.
  4. Data access governance: Providing visibility into what and where sensitive data exists, and data access permissions and activities, allowing organizations to manage data access permissions and identify sensitive stale data.
  5. Consent/data subject rights management: Managing consent of customers and employees, as well as enforcing their rights over the personal data that they share, allowing organizations to search, identify, segment, and amend personal data as necessary.
  6. Data privacy management solutions: Platforms that help operationalize privacy processes and practices, supporting privacy by design and meeting compliance requirements and initiating auditable workflows.
  7. Data discovery and flow mapping: Scanning data repositories and resources to identify existing sensitive data, classifying it appropriately in order to identify compliance issues, apply the right security controls, or make decisions about storage optimization, deletion, archiving, legal holds, and other data governance matters.
  8. Data classification: Parsing structured and unstructured data, looking for data that matches predefined patterns or custom policies.
  9. Enterprise key management (EKM): Unifying the disparate encryption key life-cycle processes across heterogeneous products.
  10. Application-level encryption: Encrypting data within the app itself as it’s generated or processed and before it’s committed and stored at the database level.

Find out more at: