Nick Jovanovic, VP Federal of Thales eSecurity Federal, Speaks to Media about Data Security

Nick Jovanovic, VP Federal of Thales eSecurity Federal (a division of TDSI), recently spoke with Federal Tech Talk’s John Gilroy about federal agency data security and key findings from the 2018 Thales Data Threat Report, Federal Government Edition. Federal Tech Talk, which looks at the world of high technology in the U.S. federal government, airs on Federal News Radio, a radio station in the Washington, D.C. region.

Nick Jovanovic, VP Federal of Thales eSecurity Federal, Speaks to Media about Data Security

An excerpt from Federal Tech Talk’s post-interview blog may be found below. The original version may be found here, along with a recording to the full, on-demand interview.

During the interview Jovanovic conveys the idea that many federal agencies are focused on end point security, which is focusing on the wrong area. He suggests that protecting data that is on your system should be the focus. It would be naïve to suggest that malicious actors haven’t breached your defenses.

When Edward Snowden used his credentials as a system administrator to access thousands of pages of sensitive information, companies like Thales eSecurity Federal sought out solutions that gave “granular” access to the document. In other words, a system administrator should be able to maintain the system without seeing what is in the files he is backing up or transferring.

Jovanovic talks about options that are available today that allow more precise control over public cloud resources and assisting with a multi-cloud approach.

Have questions? Leave a comment below, or with Nick @ndjovanovic. For more information about Thales eSecurity’s federal government security solutions, please visit our dedicated page.

The post Nick Jovanovic, VP Federal of Thales eSecurity Federal, Speaks to Media about Data Security appeared first on Data Security Blog | Thales e-Security.



This is a Security Bloggers Network syndicated blog post authored by Megan Nemeh. Read the original post at: Data Security Blog | Thales e-Security