Who Is

watching out for you?

In today's world you need to understand a few more things...

Who Is

knocking on your virtual front door?

It could be someone down the block or from the Bloc

How to control your data after it leaves your company

John Galinski, GDS

30-June-2015 The domain model is outdated. We’re each our own network.

“The domain mentality just isn’t working any more. The needs of the 21st century have eclipsed that model, which is no longer adequate. What’s needed is an entirely new model built around identity management,” said John-Philip Galinski, the CEO of Global Data Sentinel (GDS). “People ask why I waited 30 years to start my software company and I tell them it took me that long to really understand what not to do.”
 
As a CIO for 13 years at the bookkeepers for Bloomberg, Galinski saw their needs were outpacing anything that technology had to offer.

“We were in an enviable position of always having to be on the bleeding edge, trying to keep up with it,” he said. “That gave me insight as to what was going to happen, and the rest of the world would have to catch up with the needs we were seeing. Bloomberg creates digital information. They experienced issues and challenges other people weren’t aware of. And they were dealing with it on a daily basis. Thousands of domains was not such a small microcosm of what the cloud world was going to become.”

He called it The Four-Walled Fiefdoms – after you throw your data over the castle wall you can’t see what’s happened to it. Everybody has been programmed to think that way, yet there’s no reason you cannot control your data after it leaves your company.

You need something that tracks your data from cradle to grave, regardless of where it exists – your domain, somebody else’s domain, on a phone across the world – as the data initiator you need to track that data. 

“In a very real sense, we’ve all become individual networks, said Galinski. “The ability to manage data within your own network is no longer sufficient. The model needs to change completely to reflect that, based around four key criteria.”

The four legs holding up the table are identity management, data encryption, tamper-proof reporting, and corporate governance.

Identity Management
“We know who you are and who you’re trying to share that data with, so the only people able to view that data are the intended recipients,” Galinksi said. “In order for them to open it they need to download the GDS software. Anything they do with the data is tracked by the system.

“I can send you an email with an attachment, and I could keep you from forwarding, printing, it, or copying it or storing it. If I allow you to forward it, I can choose to whom.

“Or multi-generational controls – I send it to you, to Harry, and to Sally. I can cut you and Harry out of it while still allowing Sally to view it.”

Encryption
GDS subscribers enjoy always-on sophisticated multi-keyed data encryption that is done for them. All data is encrypted at all times. The only time it’s not encrypted is when you’re using it.

Reporting
An audit has to be 100% accurate and tamper proof. There can be no changes to the audit log by anyone, including the administrators. You’ve now separated the content from the network.

Your administrators can manage the infrastructure without having to see the content. They don’t need data streams and they don’t need to see the data itself. That’s a critical component – your IT admins no longer have golden access to everything.

“As a CIO that was always the bane of my existence – that the network admins always had God power,” Galinksi said. “And they needed it to do their jobs. That was a flaw in the design of the network. Who owns the network? Not the CIO. The lowest guy on the team who has the admin password is the one who owns the network. With tamper-proof reporting you’ve now separated data and corporate governance.”

Data Governance
The big problem with data management is you’ve got massive amounts of data, and there’s no unified platform for data governance across all data.

While there are utilities designed for individuals, there is no enterprise-quality solution that provides you with sophisticated data movement.

“The only way to truly secure data in this age is to provide an ecosystem that lives in the cloud across all domains, that allows you to manage data security as if it was on your domain,” said Galinski. “I can meter out networking. I can put everything on Amazon cloud or Microsoft Azure, because we’ve solved the multi-tenant server issues. We’ve separated the data from the infrastructure and the OS. The entire data center is protected at the data level. Nobody is going to hack a printer driver. It’s all about the data.”

Once you have those four components, you can secure the data and it can travel securely, separate from the network.

“The infrastructure globally is under constant attack,” Galinski said. “Cyber warfare requires a whole new infrastructure, however we don’t need to reinvent the wheel. Everything that’s in place today can be re-purposed. It’s pretty straightforward when you change the concept to, ‘who owns the data?’”