Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

Cy4data Labs: Data So Encrypted Even Your DBA Needs a Permission Slip!

Truth in IT
05/09/2025
62
2 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We're here at Rsac 2025 talking to the latest and greatest cybersecurity vendors and solutions. All the innovative products out there. We're here with Cy4Data labs. We're talking about their role in cybersecurity. And they've got some interesting things to talk about with Lance. Hey, how you doing? I'm doing quite well. How about yourself? Good, good good. Um, so just let's set the stage. We're part of the cybersecurity problem. Are you tackling for people? Uh, we're actually doing it at the data level, so it's it's a little bit different here. What we're trying to do is we're trying to protect data itself in situ, you know, within databases, which is a different view than people normally take. All right. So you're not necessarily saying, hey, it's about access control identity management or XDR, but really protecting the data itself. Protecting the data itself. It has a lot of benefits. So when you actually look at it, when when we take a look at data breaches, you look for a key word, the word record. That's why we know it's sitting in a database. Within a database there's many fields. And what we do is we protect each one of those fields independently with its own encryption key. That gives us a lot of control of who can have access to that data itself. If you don't have the permissions or authorization, you don't get to see that data. Now, when you move data around outside of the database, put it into our ports, share it to another database. It always remains encrypted and we call it protection in use instead of at rest or in flight. All right. So that's kind of cool because normally I'm a storage guy and we talk about data encryption. We talk about data encryption on the disk. We talk about data encryption on the network. But once it gets to an application or a database, it's usually, you know, if you get into it, you got it. That's the floor actually. Normally when databases are operating they have to decrypt it when it comes off the the storage drive. And then now it's in the clear. And if you if you do a query it gets sent to the the user that made the request. It's in the clear. That's the vulnerability all along the way. So at rest and in use has certain levels of protection, certain types of attacks, but not where all of these data breaches are actually occurring. So now when someone breaks into your network or they get to it through an application, they've stolen somebody's credentials, or there's a, you know, some type of vulnerability or exposure, all they get to see is encrypted data in its raw form, and then only when it gets to the endpoint device and it gets displayed is the only time it gets revealed. All right. So this encryption is happening at the point of consumption. The point of consumption. And that's the safest place right. So we take a look at it. We measure at what point in your networks does the security boundary end. Does it when it comes out of the database, is it done when it gets over to the end of the line and on the endpoint machine, is it done or is it when it's displayed. Because for us it lands on the machine encrypted. It's in memory encrypted. It doesn't get decrypted until it's actually physically displayed. I mean, it's pretty interesting in concept that you're taking encryption that far, but I would have a concern as an IT guy about scalability. If you're encrypting every field and every record with its own key, how does that possibly work? You're right. What we're talking about here is millions, tens of millions of keys that are protecting a single database, but it's protecting tens of millions of pieces of data. And the database itself is operating on the encrypted data naturally, just like it is like a foreign language. Databases don't care if it's English, French, German or Italian, right? It's still just as fast. It's the same thing. In this case, the translation is to something very foreign, like maybe Klingon. If you're a Trekkie, right? You can't actually understand it or read it, but it's protected. It's when we translate it back is that when it gets revealed? So scalability exists on the same system that you had before. So for a customer we don't touch their existing deployments. Existing systems, security systems all stays the same. No changes to that infrastructure. All we do is we pull the record out, we encrypt it, put it back in again. Job done. Didn't integrate at the endpoint device. The system runs just like it did before. All right. So there's nothing changing in the database. We don't have to. Other than going from cleartext information to individually encrypted pieces of data. All right. So we're here at the RSA show. There's RSA conference I need to say 25,000 people. There's CISOs and stuff. If you had a message that you wanted to tell everyone about this, this sort of data in use encryption paradigm, what would you what would you say. If you finally want to solve the threat of a data breach? More importantly, you want to be able to detect in real time that insider attack, those loss of credentials. We now, with this granularity, can control access to data down to a single field. You don't have to increase your attack surface and you use everything you've got, all your investments you have today. You get that with the most secured solution. Right. And there's no vulnerable database records out there. Right. Right. Right. Even if you share them, they you still retain control of them. So you embed it into reports. You share those reports. You're sharing encrypted data, right. And this doesn't have to be the whole record. This is field by field. If we want. To, you can make a choice and you can mix and match. You can keep some in the clear. You can protect what you want. The most important personal information, personal health information, those fields you want to protect with its own dedicated keys. That's really cool. So if we're here at Rsac, um, and there are people who might want to dig a little deeper into that, uh, start to maybe understand what we're talking about here, because it's a big shift in paradigm, if you think about it. Uh, where would you have them start their kind of research into adding this, uh, data? Uh, data and database encryption, I guess. Yeah. No, it's, uh, we call it data. Data defined security. Um, you know, we can be reached off. You know, we have our website. It's Cy4Data. Labs.com. That's a place to start. And we can show demonstrations. We have sales folks, uh, in various different channels as well, across the United States. And, um, we can start to do the introductions in the demos so that they can take a look at it. They can try it. We can do sample deployments in POCs And as they go and they learn the fact that they don't change their workflows, the user experience flows, they start to get comfortable with it, and they try it out. And it's a matter of days to get this thing turned on. I know we didn't talk about any verticals, but I know a few that could probably use this in spades right now. We're having some really good success in the financial side. We're also having success on the insurance side. Um, there's there's, you know, a lot of personal information and information that they, you know, people want to retain control of. Very important, the health services we're just now getting into in public sector. We're also very active in. All right. All right. That's pretty cool. Thank you so much, Lance, for. Thank you so much. All right. Take care if you're interested in that data encryption, not just at rest or in flight but in in use in use except when you're actually getting it to the end user. Uh, check out Cy4Data labs. Take care.

At RSAC 2025, Mike Matchett talks with Lance Smith of Cy4data Labs about field-level encryption for data in use—not just at rest or in transit. Each field in a database is encrypted with its own key, allowing control at unprecedented granularity. This ensures that even compromised credentials or insider threats can’t expose sensitive data unless explicitly permitted. Cy4data’s approach keeps data encrypted right up to the point of display—empowering finance, healthcare, and government organizations to secure their most critical assets.

Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • cy4data
  • labs
  • cybersecurity
  • data
  • encryption
  • field-level
  • encryption
  • data
  • in
  • use
  • zero
  • trust
  • data
  • insider
  • threat
  • database
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cy4data Labs: Data So Encrypted Even Your DBA Needs a Permission Slip!

              Upcoming Webinar Calendar

              • 10/14/2025
                01:00 PM
                10/14/2025
                Discover Netwrix's Transformation: A Journey in Brand and Product Development
                https://www.truthinit.com/index.php/channel/1540/discover-netwrixs-transformation-a-journey-in-brand-and-product-development/
              • 10/15/2025
                12:30 AM
                10/15/2025
                Achieving Cyber Resilience in APAC VMware: Effortless Recovery Strategies
                https://www.truthinit.com/index.php/channel/1543/achieving-cyber-resilience-in-apac-vmware-effortless-recovery-strategies/
              • 10/15/2025
                01:00 PM
                10/15/2025
                Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?
                https://www.truthinit.com/index.php/channel/1521/managing-human-risk-in-an-ai-driven-threat-landscape-are-your-defenses-evolving-fast-enough/
              • 10/16/2025
                06:00 AM
                10/16/2025
                EMEA Cyber Resilience Insights for VMware: Effortless Recovery Without Uncertainty
                https://www.truthinit.com/index.php/channel/1544/emea-cyber-resilience-insights-for-vmware-effortless-recovery-without-uncertainty/
              • 10/16/2025
                11:00 AM
                10/16/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 10/16/2025
                12:30 PM
                10/16/2025
                Secureframe: ISO 27001 for Startups: Understanding Its Importance and Accelerating Certification
                https://www.truthinit.com/index.php/channel/1523/iso-27001-for-startups-understanding-its-importance-and-accelerating-certification/
              • 10/22/2025
                01:00 PM
                10/22/2025
                Cut Ticket Resolution Time in Half with Smarter IT Documentation
                https://www.truthinit.com/index.php/channel/1541/cut-ticket-resolution-time-in-half-with-smarter-it-documentation/
              • 10/23/2025
                12:00 PM
                10/23/2025
                360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
              • 10/23/2025
                12:00 PM
                10/23/2025
                Secureframe: CMMC Series - Crafting a Readiness Roadmap for Streamlined Certification Success
                https://www.truthinit.com/index.php/channel/1535/cmmc-series-crafting-a-readiness-roadmap-for-streamlined-certification-success/
              • 10/28/2025
                12:00 PM
                10/28/2025
                Reimagining Data Security: Regain Your Control and Confidence
                https://www.truthinit.com/index.php/channel/1432/reimagining-data-security-regain-your-control-and-confidence/
              • 10/30/2025
                06:00 AM
                10/30/2025
                Rethink secure access solutions beyond VPN and NAC in a zero trust landscape.
                https://www.truthinit.com/index.php/channel/1547/rethink-secure-access-solutions-beyond-vpn-and-nac-in-a-zero-trust-landscape/
              • 10/30/2025
                12:00 PM
                10/30/2025
                Revolutionizing Secure Access Beyond VPN and NAC for a Zero Trust Era
                https://www.truthinit.com/index.php/channel/1546/revolutionizing-secure-access-beyond-vpn-and-nac-for-a-zero-trust-era/
              • 11/06/2025
                12:00 PM
                11/06/2025
                Secureframe: CMMC Level 2 Assessment Insights: Expectations and Preparation Strategies
                https://www.truthinit.com/index.php/channel/1536/cmmc-level-2-assessment-insights-expectations-and-preparation-strategies/
              • 11/12/2025
                12:00 PM
                11/12/2025
                Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR
                https://www.truthinit.com/index.php/channel/1545/zendesk-customer-spotlight-pure-insurance-how-to-scale-employee-service-from-it-to-hr/
              • 11/20/2025
                12:00 PM
                11/20/2025
                360View: Budget Optimization: Doing More with Less
                https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Upcoming Spotlight Events

              • Oct
                15

                Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                10/15/202501:00 PM ET
                • Oct
                  22

                  Cut Ticket Resolution Time in Half with Smarter IT Documentation

                  10/22/202501:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Oct
                    14

                    Discover Netwrix's Transformation: A Journey in Brand and Product Development

                    10/14/202501:00 PM ET
                    • Oct
                      15

                      Achieving Cyber Resilience in APAC VMware: Effortless Recovery Strategies

                      10/15/202512:30 AM ET
                      • Oct
                        16

                        EMEA Cyber Resilience Insights for VMware: Effortless Recovery Without Uncertainty

                        10/16/202506:00 AM ET
                        More events

                        Upcoming 360 View Events

                        • Oct
                          23

                          360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                          10/23/202512:00 PM ET
                          • Nov
                            20

                            360View: Budget Optimization: Doing More with Less

                            11/20/202512:00 PM ET
                            • Dec
                              18

                              360View: 2026 IT Predictions & Emerging Trends

                              12/18/202512:00 PM ET
                              More events

                              Recent Spotlight Events

                              • Sep
                                16

                                KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                09/16/202501:00 PM ET
                                • Sep
                                  11

                                  Cyera: An Executive’s Guide to Secure AI Adoption

                                  09/11/202501:00 PM ET
                                  • Aug
                                    13

                                    Resilience by Design: Reducing Data Risk, Downtime, and Regulatory Exposure w. Hitachi Vantara

                                    08/13/202501:00 PM ET
                                    More events

                                    Recent Industry Events

                                    • Oct
                                      09

                                      CMMC Scoping: Clarifying the Initial Step Toward CMMC Certification

                                      10/09/202512:00 PM ET
                                      • Oct
                                        02

                                        Essential Insights on SOC 2 for Startup Founders

                                        10/02/202512:00 PM ET
                                        • Sep
                                          25

                                          Netskope: Secure the Future--AI Usage & Data Security in the Enterprise

                                          09/25/202512:00 PM ET
                                          More events
                                          Truth in IT
                                          • Sponsor
                                          • About Us
                                          • Terms of Service
                                          • Privacy Policy
                                          • Contact Us
                                          • Preference Management
                                          Desktop version
                                          Standard version