Tuesday, January 13, 2026
No Result
View All Result
The Crypto HODL
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Marketcap
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
No Result
View All Result
The Crypto HODL
No Result
View All Result

Enhance your data security posture with a no-code approach to application-level encryption

May 23, 2024
in Blockchain
Reading Time: 4 mins read
0 0
A A
0
Home Blockchain
Share on FacebookShare on Twitter


Knowledge is the lifeblood of each group. As your group’s knowledge footprint expands throughout the clouds and between your personal enterprise strains to drive worth, it’s important to safe knowledge in any respect phases of the cloud adoption and all through the info lifecycle.

Whereas there are completely different mechanisms accessible to encrypt knowledge all through its lifecycle (in transit, at relaxation and in use), application-level encryption (ALE) gives an extra layer of safety by encrypting knowledge at its supply. ALE can improve your knowledge safety, privateness and sovereignty posture.

Why must you take into account application-level encryption?

Determine 1 illustrates a typical three-tier utility deployment, the place the applying again finish is writing knowledge to a managed Postgres occasion.

Determine 1: Three-tier utility and its belief boundary

For those who take a look at the high-level knowledge move, knowledge originates from the top person and is encrypted in transit to the applying, between utility microservices (UI and again finish), and from the applying to the database. Lastly, the database encrypts the info at relaxation utilizing both convey your personal key ( or maintain your personal key ( technique.

On this deployment, each runtime and database admins are contained in the belief boundary. This implies you’re assuming no hurt from these personas. Nonetheless, as analysts and business consultants level out, there’s a human component on the root of most cybersecurity breaches. These breaches occur by way of error, privilege misuse or stolen credentials and this danger may be mitigated by inserting these personas outdoors the belief boundary. So, how can we improve the safety posture by effectively inserting privileged customers outdoors the belief boundary? The reply lies in application-level encryption.

How does application-level encryption defend from knowledge breaches?

Utility-level encryption is an method to knowledge safety the place we encrypt the info inside an utility earlier than it’s saved or transmitted by way of completely different components of the system. This method considerably reduces the varied potential assault factors by shrinking the info safety controls proper right down to the info.

By introducing ALE to the applying, as proven in determine 2, we assist make sure that knowledge is encrypted throughout the utility. It stays encrypted for its lifecycle thereon, till it’s learn again by the identical utility in query.

Determine 2: Defending delicate knowledge with application-level encryption

This helps make it possible for privileged customers on the database entrance (resembling database directors and operators) are outdoors the belief boundary and can’t entry delicate knowledge in clear textual content.

Nonetheless, this method requires modifications to the applying again finish, which locations one other set of privileged customers (ALE service admin and safety focal) contained in the belief boundary. It may be tough to verify how the encryption keys are managed within the ALE service.

So, how are we going to convey the worth of ALE with out such compromises? The reply is thru an information safety dealer.

Why must you take into account an information safety dealer?

IBM Cloud® Safety and Compliance Middle (SCC) Knowledge Safety Dealer (DSB) gives an application-level encryption software program with a no-code change method to seamlessly masks, encrypt and tokenize knowledge. It enforces a role-based entry management (RBAC) with area and column degree granularity. DSB has two parts: a management aircraft part known as DSB Supervisor and an information aircraft part known as DSB Protect, as proven in Determine 3.

Determine 3: Defending delicate knowledge with Knowledge Safety Dealer

DSB Supervisor (the management aircraft) will not be within the knowledge path and is now operating outdoors the belief boundary. DSB Protect (the info aircraft part) seamlessly retrieves the insurance policies resembling encryption, masking, RBAC and makes use of the customer-owned keys to implement the coverage with no-code modifications to the applying!

Knowledge Safety Dealer presents these advantages:

Safety: Personally identifiable data (PII) is anonymized earlier than ingestion to the database and is protected even from database and cloud admins.

Ease: The information is protected the place it flows, with out code modifications to the applying.

Effectivity: DSB helps scaling and to the top person of the applying, this leads to no perceived influence on utility efficiency.

Management: DSB presents customer-controlled key administration entry to knowledge.

Assist to keep away from the chance of knowledge breaches

Knowledge breaches include the excessive price of time-to-address, the chance of business and regulatory compliance violations and related penalties, and the chance of lack of status.

Mitigating these dangers is commonly time-consuming and costly as a result of utility modifications required to safe delicate knowledge, in addition to the oversight required to satisfy compliance necessities. Ensuring your knowledge safety posture is robust  helps keep away from the chance of breaches.

IBM Cloud Safety and Compliance Middle Knowledge Safety Dealer gives the IBM Cloud and hybrid-multicloud with IBM Cloud Satellite tv for pc® no-code application-level encryption  to guard your utility knowledge and improve your safety posture towards zero belief pointers.

Get began with IBM Cloud® Knowledge Safety Dealer right this moment

Was this text useful?

SureNo

Architect, Cloud Safety Providers



Source link

Tags: applicationlevelapproachdataencryptionEnhancenocodepostureSecurity
Previous Post

Bitcoin Price Drop Below $70,000 Apparently Driven By Lack Of Interest, Glassnode Data Shows

Next Post

BlockDAG Shakes The Crypto Market Core Earning $30.8M Presale; Luring In Crypto Whales After Retik Finance LBank Listing

Related Posts

Google Veo 3.1 Upgrade Brings 4K Video Generation and Mobile-First Features
Blockchain

Google Veo 3.1 Upgrade Brings 4K Video Generation and Mobile-First Features

January 13, 2026
LTC Price Prediction: Litecoin Targets $87-95 Recovery by February Amid Technical Consolidation
Blockchain

LTC Price Prediction: Litecoin Targets $87-95 Recovery by February Amid Technical Consolidation

January 13, 2026
Conflux (CFX) CFX Deploys v3.0.2 Testnet With Critical RPC Bug Fixes
Blockchain

Conflux (CFX) CFX Deploys v3.0.2 Testnet With Critical RPC Bug Fixes

January 13, 2026
VanEck CEO Flags Crypto as Q1 2026 Risk-On Play Amid Fiscal Clarity
Blockchain

VanEck CEO Flags Crypto as Q1 2026 Risk-On Play Amid Fiscal Clarity

January 13, 2026
Oracle Unveils AI Supply Chain Tool for Retailers at NRF 2026
Blockchain

Oracle Unveils AI Supply Chain Tool for Retailers at NRF 2026

January 12, 2026
AAVE Price Prediction: Targets $190 by January End Despite Current Neutral Momentum
Blockchain

AAVE Price Prediction: Targets $190 by January End Despite Current Neutral Momentum

January 12, 2026
Next Post
BlockDAG Shakes The Crypto Market Core Earning $30.8M Presale; Luring In Crypto Whales After Retik Finance LBank Listing

BlockDAG Shakes The Crypto Market Core Earning $30.8M Presale; Luring In Crypto Whales After Retik Finance LBank Listing

Bipartisan push for Ethereum ETF gains momentum in Congress

Bipartisan push for Ethereum ETF gains momentum in Congress

Bitcoin and Wall Street: Insights from Alex Thorn of Galaxy Digital

Bitcoin and Wall Street: Insights from Alex Thorn of Galaxy Digital

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Twitter Instagram LinkedIn Telegram RSS
The Crypto HODL

Find the latest Bitcoin, Ethereum, blockchain, crypto, Business, Fintech News, interviews, and price analysis at The Crypto HODL

CATEGORIES

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Mining
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Videos
  • Web3

SITE MAP

  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Updates
    • Crypto Mining
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Web3
  • Metaverse
  • Regulations
  • Scam Alert
  • Analysis
  • Videos
Crypto Marketcap

Copyright © 2023 The Crypto HODL.
The Crypto HODL is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In