Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

Cy4data Labs: Data So Encrypted Even Your DBA Needs a Permission Slip!

Truth in IT
05/09/2025
64
3 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We're here at Rsac 2025 talking to the latest and greatest cybersecurity vendors and solutions. All the innovative products out there. We're here with Cy4Data labs. We're talking about their role in cybersecurity. And they've got some interesting things to talk about with Lance. Hey, how you doing? I'm doing quite well. How about yourself? Good, good good. Um, so just let's set the stage. We're part of the cybersecurity problem. Are you tackling for people? Uh, we're actually doing it at the data level, so it's it's a little bit different here. What we're trying to do is we're trying to protect data itself in situ, you know, within databases, which is a different view than people normally take. All right. So you're not necessarily saying, hey, it's about access control identity management or XDR, but really protecting the data itself. Protecting the data itself. It has a lot of benefits. So when you actually look at it, when when we take a look at data breaches, you look for a key word, the word record. That's why we know it's sitting in a database. Within a database there's many fields. And what we do is we protect each one of those fields independently with its own encryption key. That gives us a lot of control of who can have access to that data itself. If you don't have the permissions or authorization, you don't get to see that data. Now, when you move data around outside of the database, put it into our ports, share it to another database. It always remains encrypted and we call it protection in use instead of at rest or in flight. All right. So that's kind of cool because normally I'm a storage guy and we talk about data encryption. We talk about data encryption on the disk. We talk about data encryption on the network. But once it gets to an application or a database, it's usually, you know, if you get into it, you got it. That's the floor actually. Normally when databases are operating they have to decrypt it when it comes off the the storage drive. And then now it's in the clear. And if you if you do a query it gets sent to the the user that made the request. It's in the clear. That's the vulnerability all along the way. So at rest and in use has certain levels of protection, certain types of attacks, but not where all of these data breaches are actually occurring. So now when someone breaks into your network or they get to it through an application, they've stolen somebody's credentials, or there's a, you know, some type of vulnerability or exposure, all they get to see is encrypted data in its raw form, and then only when it gets to the endpoint device and it gets displayed is the only time it gets revealed. All right. So this encryption is happening at the point of consumption. The point of consumption. And that's the safest place right. So we take a look at it. We measure at what point in your networks does the security boundary end. Does it when it comes out of the database, is it done when it gets over to the end of the line and on the endpoint machine, is it done or is it when it's displayed. Because for us it lands on the machine encrypted. It's in memory encrypted. It doesn't get decrypted until it's actually physically displayed. I mean, it's pretty interesting in concept that you're taking encryption that far, but I would have a concern as an IT guy about scalability. If you're encrypting every field and every record with its own key, how does that possibly work? You're right. What we're talking about here is millions, tens of millions of keys that are protecting a single database, but it's protecting tens of millions of pieces of data. And the database itself is operating on the encrypted data naturally, just like it is like a foreign language. Databases don't care if it's English, French, German or Italian, right? It's still just as fast. It's the same thing. In this case, the translation is to something very foreign, like maybe Klingon. If you're a Trekkie, right? You can't actually understand it or read it, but it's protected. It's when we translate it back is that when it gets revealed? So scalability exists on the same system that you had before. So for a customer we don't touch their existing deployments. Existing systems, security systems all stays the same. No changes to that infrastructure. All we do is we pull the record out, we encrypt it, put it back in again. Job done. Didn't integrate at the endpoint device. The system runs just like it did before. All right. So there's nothing changing in the database. We don't have to. Other than going from cleartext information to individually encrypted pieces of data. All right. So we're here at the RSA show. There's RSA conference I need to say 25,000 people. There's CISOs and stuff. If you had a message that you wanted to tell everyone about this, this sort of data in use encryption paradigm, what would you what would you say. If you finally want to solve the threat of a data breach? More importantly, you want to be able to detect in real time that insider attack, those loss of credentials. We now, with this granularity, can control access to data down to a single field. You don't have to increase your attack surface and you use everything you've got, all your investments you have today. You get that with the most secured solution. Right. And there's no vulnerable database records out there. Right. Right. Right. Even if you share them, they you still retain control of them. So you embed it into reports. You share those reports. You're sharing encrypted data, right. And this doesn't have to be the whole record. This is field by field. If we want. To, you can make a choice and you can mix and match. You can keep some in the clear. You can protect what you want. The most important personal information, personal health information, those fields you want to protect with its own dedicated keys. That's really cool. So if we're here at Rsac, um, and there are people who might want to dig a little deeper into that, uh, start to maybe understand what we're talking about here, because it's a big shift in paradigm, if you think about it. Uh, where would you have them start their kind of research into adding this, uh, data? Uh, data and database encryption, I guess. Yeah. No, it's, uh, we call it data. Data defined security. Um, you know, we can be reached off. You know, we have our website. It's Cy4Data. Labs.com. That's a place to start. And we can show demonstrations. We have sales folks, uh, in various different channels as well, across the United States. And, um, we can start to do the introductions in the demos so that they can take a look at it. They can try it. We can do sample deployments in POCs And as they go and they learn the fact that they don't change their workflows, the user experience flows, they start to get comfortable with it, and they try it out. And it's a matter of days to get this thing turned on. I know we didn't talk about any verticals, but I know a few that could probably use this in spades right now. We're having some really good success in the financial side. We're also having success on the insurance side. Um, there's there's, you know, a lot of personal information and information that they, you know, people want to retain control of. Very important, the health services we're just now getting into in public sector. We're also very active in. All right. All right. That's pretty cool. Thank you so much, Lance, for. Thank you so much. All right. Take care if you're interested in that data encryption, not just at rest or in flight but in in use in use except when you're actually getting it to the end user. Uh, check out Cy4Data labs. Take care.

At RSAC 2025, Mike Matchett talks with Lance Smith of Cy4data Labs about field-level encryption for data in use—not just at rest or in transit. Each field in a database is encrypted with its own key, allowing control at unprecedented granularity. This ensures that even compromised credentials or insider threats can’t expose sensitive data unless explicitly permitted. Cy4data’s approach keeps data encrypted right up to the point of display—empowering finance, healthcare, and government organizations to secure their most critical assets.

Categories:
  • » Cybersecurity Webinars » Data Security
  • » Cybersecurity Webinars » Application Security
  • » Small World Big Data
  • » Cybersecurity Webinars
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • cy4data
  • labs
  • cybersecurity
  • data
  • encryption
  • field-level
  • encryption
  • data
  • in
  • use
  • zero
  • trust
  • data
  • insider
  • threat
  • database
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cy4data Labs: Data So Encrypted Even Your DBA Needs a Permission Slip!

              Upcoming Webinar Calendar

              • 01/20/2026
                01:00 PM
                01/20/2026
                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap
                https://www.truthinit.com/index.php/channel/1756/beyond-the-basics-it-service-delivery-workflows-that-close-the-efficiency-gap/
              • 01/22/2026
                01:00 PM
                01/22/2026
                Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA
                https://www.truthinit.com/index.php/channel/1668/netskope-securing-access-go-beyond-vpn-and-nac-to-universal-ztna/
              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/27/2026
                01:00 PM
                01/27/2026
                Mastering AD CS Protection for Enhanced Threat Prevention 8.0
                https://www.truthinit.com/index.php/channel/1775/mastering-ad-cs-protection-for-enhanced-threat-prevention-8-0/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Preparing Your Cybersecurity Strategy for the Challenges of 2026
                https://www.truthinit.com/index.php/channel/1705/preparing-your-cybersecurity-strategy-for-the-challenges-of-2026/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/

              Upcoming Spotlight Events

              • Jan
                20

                Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                01/20/202601:00 PM ET
                • Jan
                  22

                  Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                  01/22/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Jan
                    27

                    Mastering AD CS Protection for Enhanced Threat Prevention 8.0

                    01/27/202601:00 PM ET
                    • Jan
                      29

                      Preparing Your Cybersecurity Strategy for the Challenges of 2026

                      01/29/202610:00 AM ET
                      More events

                      Recent Spotlight Events

                      • Dec
                        10

                        The Next Generation of Managed Data Security Services

                        12/10/202501:00 PM ET
                        • Dec
                          02

                          The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

                          12/02/202501:00 PM ET
                          • Nov
                            20

                            Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                            11/20/202501:00 PM ET
                            More events

                            Recent Industry Events

                            • Dec
                              18

                              Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                              12/18/202501:00 PM ET
                              • Dec
                                16

                                HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                                12/16/202501:00 PM ET
                                • Dec
                                  11

                                  Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                  12/11/202501:00 PM ET
                                  More events
                                  Truth in IT
                                  • Sponsor
                                  • About Us
                                  • Terms of Service
                                  • Privacy Policy
                                  • Contact Us
                                  • Preference Management
                                  Desktop version
                                  Standard version