- 1 November, 2019
2020 Trends in Cybersecurity
Dr. Jans Aasman, CEO, Franz Inc. was interviewed for this article:
The Data Layer
Software-defined perimeter transmissions also guard information at the data layer by utilizing Datagram Transport Layer Security (DTLS) encryption and Public Key Authentication. Fortifying information assets at the data layer is likely the most dependable method of protecting them, because it’s the layer in which the data are actually stored. It’s important to distinguish data layer security versus access layer security. The latter involves a process known as security filtering in which, based on particular roles or responsibilities, users can access data. “You can specify filters where for a particular user or a particular role whether you could see or not see particular [data],” Franz CEO Jans Aasman said. “You could say if someone has the role administrator, we’re telling the system ‘administrators cannot see [certain data]’.”
Innermost layer security: Unlike security filtering that’s architecturally on top of storage layers, triple attribute security occurs “at the core of the graph database,” Aasman remarked. The dual mechanisms complement each other; triple attributes provision data access where the data reside for maximum security.
Read the full article at WorkFlow.