It’s 2014. Do you know where your data is?


It’s no secret that over the last year, companies have adopted and deployed big data architectures and analytics like never before. They’ve caught the big data bug and they’re using the insights gleaned from that data to anticipate, plan and react to situations in real-time. If your organization is doing this, then you’ve likely seen great results, but have you ever stopped to think about how secure your data and, in turn, your decisions are?

Decisions, changes and new technologies, like data analytics, are being implemented so quickly that legacy processes simply can’t keep up. The gap between new and legacy systems is often just wide enough for a security risk to slip through. Once these risks penetrate the gap, they’re moving at the speed of light themselves, diving into data and jumping back out before businesses even know what hit them. You don’t have to look far to see this happening – from recent and high-profile data breaches to stolen financial information, we’ve seen it all.

Herein lies our dilemma. How can we take full advantage of the volume, velocity and variety of data available today while ensuring the data remains secure?

Out with the old, in with the new

To make changes of any kind, you need to know what you’re working with. For the purposes of this exercise, that means knowing where your data is stored. Strike up a conversation with your security team and they’ll likely tell you that it lives in silos. Each business function, team, person, etc. has its own data silo and the security tools that are in place are responsible for protecting the perimeter of said silo.

It’s the typical “burglar alarm” approach to security, but we’re not dealing with old-school burglars. Today, these guys are savvy. From 17-year-olds who can write code capable of breaking through corporate strongholds to hacker groups bent on causing mayhem, it is absolutely critical that more than just the perimeter is secured. Once that perimeter is breached, the floodgates open and entrants gain access to everything from financial data to confidential emails, supply chain routes, disparate databases and more. Cue the chaos and a lot of late night phone calls.

So what’s the fix?

Photo by opera3d/Thinkstock

Photo by opera3d/Thinkstock

Data centralization: The new norm?

In order to best secure your data, it needs to be centralized.

As I mentioned on stage at Gigaom’s Structure Data conference in March, companies can be wary of taking this approach. They believe that housing their data in one, centralized repository actually makes them a bigger target for hackers. In fact, it does quite the opposite and it should be the new norm for all companies that are trying to take utmost advantage of their data.  Let me explain.

By breaking down the data silos and centralizing your data, it’s possible to increase visibility across your organization, which is critical for those real-time insights and decisions that drive business success and establish competitive edge.

Data centralization enables business to protect each separate data point and element. Each data point can be tagged with specific attributes that regulate access by user, location, device, etc. That data can then be tracked as it travels in and out of your organization with the pre-set attributes attached to it. It’s like putting a password-protected GPS on your data.

Keep in mind that implementing this new process of data tagging and centralization isn’t an overnight process. It takes time and close collaboration between IT and the business units. Security teams need to work closely with employees across the business to provide the tools they need to publish and consume data while also ensuring it is protected, audited and logged. This collaboration is crucial because it is the employees who truly understand the value and the necessary security classification for each data point, file or folder.

Despite the work involved, data centralization has real and tangible benefits for the business. Businesses who adopt these models find the outcomes to be extremely valuable. It allows them to work closely with employees and break down organizational hierarchies, which leads to greater collaboration across the organization, and, at the same time, secures data and reduces overall risk.

Peter Guerra, a principal in Booz Allen Hamilton’s Strategic Innovation Group, is responsible for leading the day-to-day operations of one of the firm’s largest data science teams. Follow him on Twitter @petrguerra.

Featured image from Gmac84/Thinkstock. Computer image from Opera3D/Thinkstock.


Bob Hobson

One of the most common causes of data getting in the wrong hands is the loss of mobile devices that often contain a frightening amount of private information. I want to share a protection option that worked for me. Tracer tags ( let someone who finds your lost stuff contact you directly without exposing your private information. I use them on almost everything I take when I travel like my phone, passport and luggage after one of the tags was responsible for getting my lost laptop returned to me in Rome one time.


Only with DigitalSafe will you be guaranteed digital data security. Think of it as a “Swiss Bank Account” for all your data! In fact it meets the following criteria:
•Data Center is ISO 9001:2000 certified by SGS.
•Data Center complies with SFB commission security guidelines (Swiss Federal Banking).
•Data is stored on the server encrypted with AES-256 encryption and encryption key is stored on a separate server, not accessible from the Internet.
•Fully automated internal backup system to enable quick recovery in the unlikely case of catastrophic failure
Visit For only $5.83 a month you will receive a secure private email address free from spam and prying eyes & 2GB of data storage for all of your private and sensitive data including password protection. Larger plans available!

Evelyn de Souza

The data tagging part sounds very interesting. Is it complicated? In this era of big data can this be easily done?

Sarah Smith

I’ve been using a video technology called that allows me to connect an image instantly to their video player and add my shopping cart url to the image on the video. I broadcast the video in facebook and twitter and it allows people in my circle to start shopping directly from the video player.

Mayukh Gon

You may know where your data is, but do you know who has access to it? You can centralize your data by decentralizing the keys to access it. Confused?

Frank Ramirez

We had data centralization once, a long time ago. Then the edge became smart and it migrated to the edge. Now the pendulum swings back as networks become more reliable and bandwidth increases. The truth is there is a balance and there are challenges with either model. Also, some industries lend themselves to greater use of the edge vs. a centralized store. Each company needs to think about what is best for them given the current state of their investments in on premise IT and what makes sense to move to the cloud. It is not a black and white problem it is shades of grey. The grey is a function of resources (human, capital, time, size of company, company structure, IT service demand) how you conduct business, governmental regulation, and even needed agility as a hedge against unforeseen future/ M&A etc. This is not simple and the speculative claims of unrealized insights that will drive competitive differentiation are not much comfort. The best advice is to pay attention to the market, look for opportunities for (onprem/cloud) IT to deliver true concrete gains (growth, topline revenue and cost reductions). Adopt the new tech as it makes sense for your business. That might not be as colorful and dramatic a recommend, but in this current state of transformation it is likely the best course of action. ( Frank Ramirez LinkedIn)

Comments are closed.