Video Interview: How Dasera is Disrupting Data Security with Its Comprehensive Approach

The CUBE thumbnail (1)Today, virtually every company stores their data in the cloud. Yet, the underlying complexity of the cloud introduces new challenges as companies move to hybrid models, span across multi-cloud environments, and use more data than ever before. 

The SiliconANGLE Media’s theCUBE features tech thought leadership worldwide and offers insights into emerging trends and topics that are redefining the way businesses breathe and operate. 

On August 12, 2021 Noah Johnson, CTO & Co-founder of Dasera, and April Mitchell, Head of Engineering, joined Dave Vellante, host of theCUBE, for an interview on how Dasera is disrupting data security.

“If you look at the number of data breaches and misuses of data in the last few years, clearly something isn’t working,” said Noah Johnson. “Our view is that data security needs to be rethought and designed from the ground up for the modern way that data is used. That’s exactly what we are doing. It’s data security reimagined, especially for the cloud.”

With almost 4,000 data breaches reported in 2020, companies are looking for fresh solutions that can truly protect their data, and Dasera’s unique approach of protecting the data lifecycle is gaining momentum. Unlike legacy solutions like access control and DLP, Dasera is built for modern-day problems in the cloud. 

“We can’t continue to expect different outcomes by using these same approaches,” said April. “That’s where we are changing the story.” Dasera is the first and only solution to secure data from creation to deletion. 

“To do this right, you have to do it at speed, you have to do it in real-time, and you have to do it at scale,” Mitchell explained. You have to beat the cloud at its own game. 

Key questions answered in the interview:

  • How do you track sensitive data and know where it lives?
  • How do you ensure data compliance and privacy protections in a world of ever-changing regulations?
  • How can you securely share data in an increasingly decentralized environment?
  • How can you identify gaps in security policies?
  • How can organizations identify and stop exfiltration in this complex environment?
  • How can this all be automated?

Watch the full video here. 


Tu Phan