Data Centric Security
A Nexor White Paper
In this paper we explore the term Data Centric Security, and the benefits and challenges associated with adopting.
What is Data Centric Security?
Data Centric Security (DCS) is a paradigm shift in the way we think about data protection and is based around three main tenets; Control, Protect and Share. It looks to apply security controls at a more granular level than the entire system, such that the data itself may be protected wherever it resides.
What are the Benefits of Data Centric Security?
DCS protects the data throughout its lifecycle and enforces the “need-to-know” principle at the object level, reducing the availability of the data to unauthorised actors. Whilst DCS may make use of traditional security controls it need not rely on them, meaning that in theory, DCS is not constrained by traditional domain boundaries and can enable sharing of data within a much wider community of interest.
What are the Challenges of adopting Data Centric Security?
There are several challenges to adopting a Data Centric Security model, these include Key Management, Interoperability, Assurance and Endpoint integration constraints. Each come with their own set of challenges to overcome. Will the benefits of overcoming outweigh the effort required to do so?
To learn more about the subject and the challenges of adopting a Data Centric Security Model download our whitepaper today.
Download White Paper
Please fill in your details below to download the 'Data Centric Security' White Paper.

Press Release – Guardian 3.1 – High Availability
Nexor are pleased to announce that our Guardian solution has been enhanced with a number of key features in a new release 3.1 of the guard application which is now available: Increased Reliability: Deploy as an active -passive High-Availability ("HA") application...
FEATURED WHITE PAPER
Secure Information Exchange: Reference Architecture - In today’s world, information sharing is key to improved productivity, efficient and accurate decision making and effective collaboration. MORE DETAILS
Be the first to know about developments in secure information exchange