Traditional Data Security Model

Compliance Snippets

Excerpt From SECDEF Memo – Impacts on SCIF/SAPF Security Webinar

In this short video clip, Jeremy Fremin, EVP Federal RackTop Systems, describes the traditional data security model. In describing this traditional model, Jeremy establishes the baseline against which RackTop’s Cyberstorage model operates. The Cyberstorage Model works to provide full spectrum capability for an organization’s data security. The discussion served as a precursor to discussing the implications of the SECDEF Memo of June 30, 2023 for wireless device use within sensitive locations. Dive into the details below.

Traditional Data Security Model

Traditional Data Security Model — Bastille

Video Transcript

In the traditional data security model, right, that that castle and moat sort of approach, you know, most of our investment, most of our technologies have been out pushed out to the edge. Right? You’ve got good network security, got good multi factor authentication, you you’ve got endpoint detection and and and application security pieces. All those things need to occur, and we need to continue to do those to improve our preparation there.

But that leaves the data kind of exposed. And the way the traditional security model works is that you’re relying on third party capabilities, bolt on capabilities that typically are using privileged access accounts to be able to look into your storage system to evaluate logs and tell you what has occurred. And so what this results in is, you know, data exfills, that are detected eight, nine months after they happen. Right?

And so what we’re trying to do is we wanna change that security model and move that protection right to the storage, right at the file system. And so the cyber storage model allows us to do that at at line speeds in real time, evaluating the trust and the risk of each transaction.

Right? And with that, not only can we take that those active defensive measures, but we can then integrate with third party tools to to enhance their abilities. Right? To to start tipping and queuing, which we’ll talk about in in the use case. Right?

Looking out and saying, here’s bad behavior, we’re gonna isolate this user and host, but go off and, you know, integrate with a sore to be able to turn off ports on a network switch or to go off and and disable accounts in active directory, those sorts of things, to really get a a full spectrum capability across there.

Compliance Snippets

Watch a Demo

Preview the platform and see how the most advanced wireless intrusion detection system protects your wireless airspace.