Simplify security

“Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.” Bruce Schneier, Schneier on Security It would be an…

Gavyn McLeod profile picture

Gavyn McLeod

July 7, 20235 minutes read

Decorative image of a woman in a superhero cape

“Data is the pollution problem of the information age, and protecting privacy is the environmental challenge.”

Bruce Schneier, Schneier on Security

It would be an understatement to say that information security has become critical and incredibly complex. Who can blame us with so much at stake — from credit card numbers to state secrets to intellectual property? But as we amass more information and ways to access it than ever before, are the layers we’re putting in place to secure it creating unnecessary complexity, maybe even chaos?

So far, in our modern information management blog series, we’ve discussed information overload and how to overcome it, as well as using AI to uncover insight and drive automation. In this blog, we’ll examine how we can simplify cybersecurity while enhancing our ability to detect and protect from threats and recover from incidents.

More data, more vectors, more risk

According to a recent study commissioned by OpenText, storing and governing access to data in a secure manner is a top information challenge for organizations large (40% of respondents listed it) and small (54% said so).

Security becomes a greater concern as we generate, collect, manage and share more information because it’s incredibly valuable. For example, if information contains intellectual property or personal details, then competitive advantage and trustworthiness are at stake. Risk of data theft or data loss are obvious concerns, but there’s also risk of failing to maintain adequate governance of incredibly complex and interconnected data sets, which can quickly lead to noncompliance and harsh penalties. On the one hand we need as much relevant data as possible to fuel our digital businesses with insight, but on the other hand, when we amass more information we significantly increase our vulnerability.

It’s not just information that is growing in volume and complexity. It’s also who is accessing it, for what reason, through what device, and in what geography. Users want access to information faster than ever before, anywhere, on any device, contextualized to what they’re trying to accomplish. This translates to increased attack vectors for bad actors, complexity for security professionals to manage and risk of human error in handling information properly.  

Diagram showing why threats and attack vectors are growing.

A simple solution

The adage “There’s no such thing as 100% security” reminds us that no matter how many layers of technology, policies and rules we add, there is a human factor that will always add variation and vulnerability. That fact alone makes a case for simplified security.

“One of the things that I would tell people to do is to create security solutions that are not going to add more complexity. If we’re putting another fifty silos on existing systems because of security…we’re not really solving the problem,” said David Linthicum, technology futurist, author and Chief Cloud Strategy Officer with Deloitte Consulting, during a recent CIO webcast. “Fit the security systems in there in terms of how we’re managing and orchestrating the movement of information. It should be modeled as a very logical plan … (instead of) throwing technology at the problem.”

Simplicity comes when the level of security, access and governance applied to information fits its nature, the use case and the individual or application accessing it. Simplicity also means automating repetitive or monotonous tasks for users – security professionals and end users alike – to avoid mistakes or cutting corners. For many organizations, this ends up creating vendor proliferation and integration challenges, as more point solutions are needed to suit each unique scenario, vulnerability or connection point.

To better protect, detect and rebound from attacks, security should be comprehensive, highly integrated, automated and embedded in everything from code to core to cloud. And by consolidating security vendors, you can simplify the management of your security thereby reducing the risk of a breach, data loss or non-compliance.

Diagram showing how to simplify security with one vendor.

Modern information management

Effectively protecting data sustains competitive advantage and builds trust with stakeholders; it should be an integral component of every system in an organization. When security is intrinsic and in context, highly integrated and automated, complexity and the risk that comes with it can be minimized.

Simplified security is a key enabler of modern information management, which combines advanced technologies and innovative cloud strategies to connect data, secure knowledge and apply intelligence for any user, any data type, anywhere, at any speed, for any rules. Organizations that take advantage of modern information management routinely apply simplified security to solve their business challenges and achieve digital success.

OpenText solutions protect information at the scale that today’s businesses need, helping them to work smarter and gain the information advantage. Learn more about how your organization can benefit. 

Read the other blog posts in this series on modern information management:

Share this post

Share this post to x. Share to linkedin. Mail to
Gavyn McLeod avatar image

Gavyn McLeod

Gavyn is a brand, content, and product marketing leader, as well as technology enthusiast, with over 16 years of professional experience working in the software and hardware industry. He has spent his career crafting stories and experiences that connect the needs of people with the technology that solves their problems. He is currently a Product Marketing and Content Strategy Director for Analytics & AI at OpenText.

See all posts

More from the author

Go behind the scenes for the Jaguar TCS Racing Team’s 100th Race: A Formula E Milestone

Go behind the scenes for the Jaguar TCS Racing Team’s 100th Race: A Formula E Milestone

Gear up for an electrifying journey as we celebrate the Jaguar TCS Racing Team’s 100th race in the ABB FIA Formula E World Championship. Discover the role of OpenText AI and analytics in helping the team achieve more wins and learn how you can get an exclusive peek behind the scenes!

March 25, 2024 3 minutes read
Experience the thrill of Formula E at the Jaguar TCS Racing Virtual Garage Tour

Experience the thrill of Formula E at the Jaguar TCS Racing Virtual Garage Tour

Hey, racing fans! Do you love fast cars, cutting-edge technology, and exclusive behind-the-scenes access? If you answered yes to any of these questions, then you…

March 7, 2024 4 minutes read

Stay in the loop!

Get our most popular content delivered monthly to your inbox.