Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Networking
    • The Edge
    • Virtualization
    • Converged Infrastructure
  • Data Security ▼
    • Backup & Recovery
    • Cybersecurity
    • Application Security
  • Cloud ▼
    • Private Cloud
    • Public Cloud
    • Hybrid Cloud
  • Storage ▼
    • Software Defined Storage
    • Object Storage
    • Physical Storage
  • DevOps ▼
    • Analytics
    • Applications
    • Open Source

Cy4data Labs: Data So Encrypted Even Your DBA Needs a Permission Slip!

Truth in IT
05/09/2025
33
2 (100%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Hi Mike Matchett with Small World Big Data. We're here at Rsac 2025 talking to the latest and greatest cybersecurity vendors and solutions. All the innovative products out there. We're here with Cy4Data labs. We're talking about their role in cybersecurity. And they've got some interesting things to talk about with Lance. Hey, how you doing? I'm doing quite well. How about yourself? Good, good good. Um, so just let's set the stage. We're part of the cybersecurity problem. Are you tackling for people? Uh, we're actually doing it at the data level, so it's it's a little bit different here. What we're trying to do is we're trying to protect data itself in situ, you know, within databases, which is a different view than people normally take. All right. So you're not necessarily saying, hey, it's about access control identity management or XDR, but really protecting the data itself. Protecting the data itself. It has a lot of benefits. So when you actually look at it, when when we take a look at data breaches, you look for a key word, the word record. That's why we know it's sitting in a database. Within a database there's many fields. And what we do is we protect each one of those fields independently with its own encryption key. That gives us a lot of control of who can have access to that data itself. If you don't have the permissions or authorization, you don't get to see that data. Now, when you move data around outside of the database, put it into our ports, share it to another database. It always remains encrypted and we call it protection in use instead of at rest or in flight. All right. So that's kind of cool because normally I'm a storage guy and we talk about data encryption. We talk about data encryption on the disk. We talk about data encryption on the network. But once it gets to an application or a database, it's usually, you know, if you get into it, you got it. That's the floor actually. Normally when databases are operating they have to decrypt it when it comes off the the storage drive. And then now it's in the clear. And if you if you do a query it gets sent to the the user that made the request. It's in the clear. That's the vulnerability all along the way. So at rest and in use has certain levels of protection, certain types of attacks, but not where all of these data breaches are actually occurring. So now when someone breaks into your network or they get to it through an application, they've stolen somebody's credentials, or there's a, you know, some type of vulnerability or exposure, all they get to see is encrypted data in its raw form, and then only when it gets to the endpoint device and it gets displayed is the only time it gets revealed. All right. So this encryption is happening at the point of consumption. The point of consumption. And that's the safest place right. So we take a look at it. We measure at what point in your networks does the security boundary end. Does it when it comes out of the database, is it done when it gets over to the end of the line and on the endpoint machine, is it done or is it when it's displayed. Because for us it lands on the machine encrypted. It's in memory encrypted. It doesn't get decrypted until it's actually physically displayed. I mean, it's pretty interesting in concept that you're taking encryption that far, but I would have a concern as an IT guy about scalability. If you're encrypting every field and every record with its own key, how does that possibly work? You're right. What we're talking about here is millions, tens of millions of keys that are protecting a single database, but it's protecting tens of millions of pieces of data. And the database itself is operating on the encrypted data naturally, just like it is like a foreign language. Databases don't care if it's English, French, German or Italian, right? It's still just as fast. It's the same thing. In this case, the translation is to something very foreign, like maybe Klingon. If you're a Trekkie, right? You can't actually understand it or read it, but it's protected. It's when we translate it back is that when it gets revealed? So scalability exists on the same system that you had before. So for a customer we don't touch their existing deployments. Existing systems, security systems all stays the same. No changes to that infrastructure. All we do is we pull the record out, we encrypt it, put it back in again. Job done. Didn't integrate at the endpoint device. The system runs just like it did before. All right. So there's nothing changing in the database. We don't have to. Other than going from cleartext information to individually encrypted pieces of data. All right. So we're here at the RSA show. There's RSA conference I need to say 25,000 people. There's CISOs and stuff. If you had a message that you wanted to tell everyone about this, this sort of data in use encryption paradigm, what would you what would you say. If you finally want to solve the threat of a data breach? More importantly, you want to be able to detect in real time that insider attack, those loss of credentials. We now, with this granularity, can control access to data down to a single field. You don't have to increase your attack surface and you use everything you've got, all your investments you have today. You get that with the most secured solution. Right. And there's no vulnerable database records out there. Right. Right. Right. Even if you share them, they you still retain control of them. So you embed it into reports. You share those reports. You're sharing encrypted data, right. And this doesn't have to be the whole record. This is field by field. If we want. To, you can make a choice and you can mix and match. You can keep some in the clear. You can protect what you want. The most important personal information, personal health information, those fields you want to protect with its own dedicated keys. That's really cool. So if we're here at Rsac, um, and there are people who might want to dig a little deeper into that, uh, start to maybe understand what we're talking about here, because it's a big shift in paradigm, if you think about it. Uh, where would you have them start their kind of research into adding this, uh, data? Uh, data and database encryption, I guess. Yeah. No, it's, uh, we call it data. Data defined security. Um, you know, we can be reached off. You know, we have our website. It's Cy4Data. Labs.com. That's a place to start. And we can show demonstrations. We have sales folks, uh, in various different channels as well, across the United States. And, um, we can start to do the introductions in the demos so that they can take a look at it. They can try it. We can do sample deployments in POCs And as they go and they learn the fact that they don't change their workflows, the user experience flows, they start to get comfortable with it, and they try it out. And it's a matter of days to get this thing turned on. I know we didn't talk about any verticals, but I know a few that could probably use this in spades right now. We're having some really good success in the financial side. We're also having success on the insurance side. Um, there's there's, you know, a lot of personal information and information that they, you know, people want to retain control of. Very important, the health services we're just now getting into in public sector. We're also very active in. All right. All right. That's pretty cool. Thank you so much, Lance, for. Thank you so much. All right. Take care if you're interested in that data encryption, not just at rest or in flight but in in use in use except when you're actually getting it to the end user. Uh, check out Cy4Data labs. Take care.

At RSAC 2025, Mike Matchett talks with Lance Smith of Cy4data Labs about field-level encryption for data in use—not just at rest or in transit. Each field in a database is encrypted with its own key, allowing control at unprecedented granularity. This ensures that even compromised credentials or insider threats can’t expose sensitive data unless explicitly permitted. Cy4data’s approach keeps data encrypted right up to the point of display—empowering finance, healthcare, and government organizations to secure their most critical assets.

Categories:
  • » Technology Communities
  • » Technology Communities » Data Security
  • » Technology Communities » Data Security » Application Security
  • » Small World Big Data
  • » Technology Communities » Data Security » Cybersecurity
Channels:
  • Mike Matchett: Small World Big Data
News:
Events:
Tags:
  • rsac2025
  • matchett
  • cy4data
  • labs
  • cybersecurity
  • data
  • encryption
  • field-level
  • encryption
  • data
  • in
  • use
  • zero
  • trust
  • data
  • insider
  • threat
  • database
  • security
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Cy4data Labs: Data So Encrypted Even Your DBA Needs a Permission Slip!

            Upcoming Spotlight Events

            • Jun
              24

              Agentic AI Ransomware: What You Need to Know

              06/24/202513:00:00 ET
              More events

              Upcoming 360 View Events

              • Jun
                18

                360View: The Data Resilience Imperative – Securing, Scaling & Optimizing Enterprise Data

                06/18/202512:00:00 ET
                • Jul
                  24

                  360View: API Security & the Expanding Attack Surface

                  07/24/202512:00:00 ET
                  • Aug
                    21

                    360View: HCI, Cloud, and Virtualization: What’s Next?

                    08/21/202512:00:00 ET
                    More events

                    Upcoming Industry Events

                    • Jun
                      04

                      Rubrik FORW>>RD

                      06/04/202510:00:00 ET
                      • Jun
                        04

                        Securing the Surge: AppSec in the Age of AI-Generated Code

                        06/04/202513:00:00 ET
                        • Jun
                          26

                          Mastering Modern Security with Wallarm's Advanced API Solutions

                          06/26/202513:00:00 ET
                          • Jul
                            15

                            Recognizing Identity Threats: Effective Detection and Response Strategies with Netwrix

                            07/15/202502:00:00 ET
                            More events
                            Truth in IT
                            • Advertise
                            • About Us
                            • Terms of Service
                            • Privacy Policy
                            • Contact Us
                            • Be Our Guest
                            • Preference Management
                            Desktop version
                            Standard version