Skip to main content
Atlanta chapter of the Information Systems Security Association (ISSA) is hosting Brian Christian, Thursday, Sept. 28, 2023

Security solutions such as data leak prevention (DLP), encryption, and Network Access Control (NAC) have been implemented for years to prevent unauthorized data and exfiltration. However, the internet, new enterprise technologies and a global professional cybercriminal landscape have made it clear that these solutions are no longer enough. New threats in a new age require a different approach to securing data—not just the systems and networks containing it.

Emergence of Zero Trust

A Zero Trust model and processes are now hailed as the way to finally secure data. However, a Zero Trust approach by itself can’t secure data, because Zero Trust has everything to do with authentication—and nothing to do with data itself.As organizations try to implement Zero Trust to bridge the gap between NAC and DLP functionality for securing compliance data, they find that Zero Trust doesn’t fit. NAC is focused on devices, users, and network segments. It was never designed to look at data itself. DLP doesn’t integrate with NAC, the technology has not kept pace with the dynamic threat landscape, and it only focuses on regulatory data.

Only Data Surveillance Enables Zero Trust for Data

Data surveillance technology is the only way to enable Zero Trust for data. Data surveillance fingerprints, monitors, and analyzes data everywhere it moves—beyond compliance and solution silos. It delivers a chain of data custody so teams can ensure that the right data gets to the right users and devices on the right network segments.

Data Surveillance Rolling Baselines

Our parent patent is based on a rolling baseline methodology developed using proven K-means mathematical models.

Network systems, devices, users, and data—nothing is static in an organization. For cyber threats, continuous change and unknown states of data are opportunities.

Data surveillance quickly identifies and analyzes every movement of live data—at the bit level—and its context. Continuous monitoring and analysis create a “normal” baseline, which automatically incorporates and compares new data. This means data surveillance accurately isolates known threats. It alerts to suspicious data behavior and clusters of unusual activity. Contextual analysis identifies possible connections to accurately detect cyberattack tactics.

With the ability to see what normal activity looks like, enterprises can tune existing solutions and policies. Gaps can be quickly remediated. They can make informed decisions about where and how to deploy security measures most effectively.

9 and Counting

Flying Cloud hold 9 awarded patents on data surveillance technology and techniques. We have three additional patents pending for data surveillance in Zero Trust models. And we’re not stopping there.