Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":2694,"date":"2024-03-08T17:52:41","date_gmt":"2024-03-08T17:52:41","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/"},"modified":"2024-03-08T17:52:41","modified_gmt":"2024-03-08T17:52:41","slug":"protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/","title":{"rendered":"Protect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm"},"content":{"rendered":"

Data is the new fuel for business growth<\/strong><\/h2>\n

Data is at the heart of seemingly everything these days, from the smart devices in our homes to the mobile apps we use on the go every day. This wealth of\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

Data is the new fuel for business growth<\/strong><\/h2>\n

Data is at the heart of seemingly everything these days, from the smart devices in our homes to the mobile apps we use on the go every day. This wealth of information at our fingertips allows us to correlate data points and determine patterns and outcomes faster than humanly possible \u2014 enabling us to predict and quickly thwart adverse events on the horizon. We know that the volume of data collected by organizations is a goldmine of information that, when leveraged correctly, can empower growth<\/a>. We also know that clean data, free of sensitive information, is critical for fueling GenAI initiatives across the globe. However, this uptick in data creation and usage also amplifies the need for organizations to ensure that they handle data responsibly and adhere to increasingly stringent data regulatory standards.<\/p>\n

With astronomical amounts of data constantly being generated, tracked, and stored \u2013 it\u2019s become more important than ever to secure it and be able to answer several key questions: Where is my data? Who is accessing my data? And is my data secure?<\/p>\n

Introducing Observability for Data Security Posture Management (DSPM)<\/strong><\/h2>\n

The new Data Security module announced at Cisco Live 2024 Amsterdam is now generally available. It expands our business risk observability capabilities for cloud environments and delivers automated data discovery and classification in data stores like Snowflake and AWS S3. The new module provides real-time data insights that help visualize, prioritize, and act on security issues before they become revenue-impacting.<\/p>\n

A quick look at the new data security capabilities:<\/p>\n

Discovery and classification of sensitive data<\/strong>: Easily identify all data stores and data entities, to quickly focus on securing sensitive data.
\nData access control<\/strong>: Understand which users, roles, and applications are accessing your data and who have access to personally identifiable information. Seamlessly adopt a least privilege approach by detecting unused privileges and locking down access to your data stores.
\nExfiltration attempt detection<\/strong>: Unlock GenAI-based detection and remediation guidance for data exfiltration attempts to stop attackers in their tracks.
\nIdentify security risks<\/strong>: Efficiently detect unencrypted buckets, dormant risky users and siloed unused data entities to reduce your overall security risk posture.<\/p>\n

The future of data security<\/strong><\/h2>\n

With data being created and moving at the speed of light every day, it can be overwhelming to keep track of exactly where the data is and how it\u2019s being stored \u2013 let alone comprehensively securing it. Automation is imperative to keep up, and choosing the right tool will enable you to continue leveraging data and innovating while knowing your data is secure. The Data Security module provides teams with deep visibility and actionable insights to effortlessly protect data at scale. The future of data security relies on our ability to put adequate security controls in place now, so we can embrace the full potential of data and the unlimited capabilities that it unlocks.<\/p>\n

Learn More<\/strong><\/h1>\n

For more information, check out the resources below:<\/p>\n

Cisco Unveils New Innovations on the Cisco Observability Platform<\/a><\/p>\n

Bringing our Industry-Leading Innovation to Cisco Live EMEA!<\/a><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0Cisco Observability for Data Security Posture Management (DSPM) expands business risk observability capabilities for cloud environments and delivers automated data discovery and classification in data stores like Snowflake and AWS S3.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

Data is the new fuel for business growth<\/strong><\/h2>\n

Data is at the heart of seemingly everything these days, from the smart devices in our homes to the mobile apps we use on the go every day. This wealth of\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b[[{“value”:”<\/p>\n

Data is the new fuel for business growth<\/strong><\/h2>\n

Data is at the heart of seemingly everything these days, from the smart devices in our homes to the mobile apps we use on the go every day. This wealth of information at our fingertips allows us to correlate data points and determine patterns and outcomes faster than humanly possible \u2014 enabling us to predict and quickly thwart adverse events on the horizon. We know that the volume of data collected by organizations is a goldmine of information that, when leveraged correctly, can empower growth<\/a>. We also know that clean data, free of sensitive information, is critical for fueling GenAI initiatives across the globe. However, this uptick in data creation and usage also amplifies the need for organizations to ensure that they handle data responsibly and adhere to increasingly stringent data regulatory standards.<\/p>\n

With astronomical amounts of data constantly being generated, tracked, and stored \u2013 it\u2019s become more important than ever to secure it and be able to answer several key questions: Where is my data? Who is accessing my data? And is my data secure?<\/p>\n

Introducing Observability for Data Security Posture Management (DSPM)<\/strong><\/h2>\n

The new Data Security module announced at Cisco Live 2024 Amsterdam is now generally available. It expands our business risk observability capabilities for cloud environments and delivers automated data discovery and classification in data stores like Snowflake and AWS S3. The new module provides real-time data insights that help visualize, prioritize, and act on security issues before they become revenue-impacting.<\/p>\n

A quick look at the new data security capabilities:<\/p>\n

Discovery and classification of sensitive data<\/strong>: Easily identify all data stores and data entities, to quickly focus on securing sensitive data.
\nData access control<\/strong>: Understand which users, roles, and applications are accessing your data and who have access to personally identifiable information. Seamlessly adopt a least privilege approach by detecting unused privileges and locking down access to your data stores.
\nExfiltration attempt detection<\/strong>: Unlock GenAI-based detection and remediation guidance for data exfiltration attempts to stop attackers in their tracks.
\nIdentify security risks<\/strong>: Efficiently detect unencrypted buckets, dormant risky users and siloed unused data entities to reduce your overall security risk posture.<\/p>\n

The future of data security<\/strong><\/h2>\n

With data being created and moving at the speed of light every day, it can be overwhelming to keep track of exactly where the data is and how it\u2019s being stored \u2013 let alone comprehensively securing it. Automation is imperative to keep up, and choosing the right tool will enable you to continue leveraging data and innovating while knowing your data is secure. The Data Security module provides teams with deep visibility and actionable insights to effortlessly protect data at scale. The future of data security relies on our ability to put adequate security controls in place now, so we can embrace the full potential of data and the unlimited capabilities that it unlocks.<\/p>\n

Learn More<\/strong><\/h1>\n

For more information, check out the resources below:<\/p>\n

Cisco Unveils New Innovations on the Cisco Observability Platform<\/a><\/p>\n

Bringing our Industry-Leading Innovation to Cisco Live EMEA!<\/a><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

“}]]\u00a0\u00a0Cisco Observability for Data Security Posture Management (DSPM) expands business risk observability capabilities for cloud environments and delivers automated data discovery and classification in data stores like Snowflake and AWS S3.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":2695,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-2694","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nProtect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm\" \/>\n<meta property=\"og:description\" content=\"Data is the new fuel for business growth Data is at the heart of seemingly everything these days, from the smart devices in our homes to the mobile apps we use on the go every day. This wealth of\u2026 Read more on Cisco Blogs \u200b[[{"value":" Data is the new fuel for business growth Data is at the heart of seemingly everything these days, from the smart devices in our homes to the mobile apps we use on the go every day. This wealth of information at our fingertips allows us to correlate data points and determine patterns and outcomes faster than humanly possible \u2014 enabling us to predict and quickly thwart adverse events on the horizon. We know that the volume of data collected by organizations is a goldmine of information that, when leveraged correctly, can empower growth. We also know that clean data, free of sensitive information, is critical for fueling GenAI initiatives across the globe. However, this uptick in data creation and usage also amplifies the need for organizations to ensure that they handle data responsibly and adhere to increasingly stringent data regulatory standards. With astronomical amounts of data constantly being generated, tracked, and stored \u2013 it\u2019s become more important than ever to secure it and be able to answer several key questions: Where is my data? Who is accessing my data? And is my data secure? Introducing Observability for Data Security Posture Management (DSPM) The new Data Security module announced at Cisco Live 2024 Amsterdam is now generally available. It expands our business risk observability capabilities for cloud environments and delivers automated data discovery and classification in data stores like Snowflake and AWS S3. The new module provides real-time data insights that help visualize, prioritize, and act on security issues before they become revenue-impacting. A quick look at the new data security capabilities: Discovery and classification of sensitive data: Easily identify all data stores and data entities, to quickly focus on securing sensitive data. Data access control: Understand which users, roles, and applications are accessing your data and who have access to personally identifiable information. Seamlessly adopt a least privilege approach by detecting unused privileges and locking down access to your data stores. Exfiltration attempt detection: Unlock GenAI-based detection and remediation guidance for data exfiltration attempts to stop attackers in their tracks. Identify security risks: Efficiently detect unencrypted buckets, dormant risky users and siloed unused data entities to reduce your overall security risk posture. The future of data security With data being created and moving at the speed of light every day, it can be overwhelming to keep track of exactly where the data is and how it\u2019s being stored \u2013 let alone comprehensively securing it. Automation is imperative to keep up, and choosing the right tool will enable you to continue leveraging data and innovating while knowing your data is secure. The Data Security module provides teams with deep visibility and actionable insights to effortlessly protect data at scale. The future of data security relies on our ability to put adequate security controls in place now, so we can embrace the full potential of data and the unlimited capabilities that it unlocks. Learn More For more information, check out the resources below: Cisco Unveils New Innovations on the Cisco Observability Platform Bringing our Industry-Leading Innovation to Cisco Live EMEA! Share Share: "}]]\u00a0\u00a0Cisco Observability for Data Security Posture Management (DSPM) expands business risk observability capabilities for cloud environments and delivers automated data discovery and classification in data stores like Snowflake and AWS S3.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-08T17:52:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16561529-ofX4cB.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Protect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm\",\"datePublished\":\"2024-03-08T17:52:41+00:00\",\"dateModified\":\"2024-03-08T17:52:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/\"},\"wordCount\":602,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16561529-ofX4cB.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/\",\"name\":\"Protect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16561529-ofX4cB.gif\",\"datePublished\":\"2024-03-08T17:52:41+00:00\",\"dateModified\":\"2024-03-08T17:52:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16561529-ofX4cB.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16561529-ofX4cB.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm","og_description":"Data is the new fuel for business growth Data is at the heart of seemingly everything these days, from the smart devices in our homes to the mobile apps we use on the go every day. This wealth of\u2026 Read more on Cisco Blogs \u200b[[{\"value\":\" Data is the new fuel for business growth Data is at the heart of seemingly everything these days, from the smart devices in our homes to the mobile apps we use on the go every day. This wealth of information at our fingertips allows us to correlate data points and determine patterns and outcomes faster than humanly possible \u2014 enabling us to predict and quickly thwart adverse events on the horizon. We know that the volume of data collected by organizations is a goldmine of information that, when leveraged correctly, can empower growth. We also know that clean data, free of sensitive information, is critical for fueling GenAI initiatives across the globe. However, this uptick in data creation and usage also amplifies the need for organizations to ensure that they handle data responsibly and adhere to increasingly stringent data regulatory standards. With astronomical amounts of data constantly being generated, tracked, and stored \u2013 it\u2019s become more important than ever to secure it and be able to answer several key questions: Where is my data? Who is accessing my data? And is my data secure? Introducing Observability for Data Security Posture Management (DSPM) The new Data Security module announced at Cisco Live 2024 Amsterdam is now generally available. It expands our business risk observability capabilities for cloud environments and delivers automated data discovery and classification in data stores like Snowflake and AWS S3. The new module provides real-time data insights that help visualize, prioritize, and act on security issues before they become revenue-impacting. A quick look at the new data security capabilities: Discovery and classification of sensitive data: Easily identify all data stores and data entities, to quickly focus on securing sensitive data. Data access control: Understand which users, roles, and applications are accessing your data and who have access to personally identifiable information. Seamlessly adopt a least privilege approach by detecting unused privileges and locking down access to your data stores. Exfiltration attempt detection: Unlock GenAI-based detection and remediation guidance for data exfiltration attempts to stop attackers in their tracks. Identify security risks: Efficiently detect unencrypted buckets, dormant risky users and siloed unused data entities to reduce your overall security risk posture. The future of data security With data being created and moving at the speed of light every day, it can be overwhelming to keep track of exactly where the data is and how it\u2019s being stored \u2013 let alone comprehensively securing it. Automation is imperative to keep up, and choosing the right tool will enable you to continue leveraging data and innovating while knowing your data is secure. The Data Security module provides teams with deep visibility and actionable insights to effortlessly protect data at scale. The future of data security relies on our ability to put adequate security controls in place now, so we can embrace the full potential of data and the unlimited capabilities that it unlocks. Learn More For more information, check out the resources below: Cisco Unveils New Innovations on the Cisco Observability Platform Bringing our Industry-Leading Innovation to Cisco Live EMEA! Share Share: \"}]]\u00a0\u00a0Cisco Observability for Data Security Posture Management (DSPM) expands business risk observability capabilities for cloud environments and delivers automated data discovery and classification in data stores like Snowflake and AWS S3.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/","og_site_name":"JHC","article_published_time":"2024-03-08T17:52:41+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16561529-ofX4cB.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/"},"author":{"name":"","@id":""},"headline":"Protect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm","datePublished":"2024-03-08T17:52:41+00:00","dateModified":"2024-03-08T17:52:41+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/"},"wordCount":602,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16561529-ofX4cB.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/","url":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/","name":"Protect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16561529-ofX4cB.gif","datePublished":"2024-03-08T17:52:41+00:00","dateModified":"2024-03-08T17:52:41+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16561529-ofX4cB.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2024\/03\/16561529-ofX4cB.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/protect-your-cloud-environments-with-data-security-observability-kashyap-merchant-on-march-8-2024-at-400-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Protect Your Cloud Environments with Data Security Observability Kashyap Merchant on March 8, 2024 at 4:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2694","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=2694"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/2694\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/2695"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=2694"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=2694"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=2694"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}