Baffle CEO Ameesh Divatia talks with John Furrier of theCUBE at the AWS re:Inforce 2022 Security Conference for Amazon Web Services. Since compliance is driving data owners to adopt data-centric protection measures, security should be incorporated into data pipelines.
John Furrier:
Welcome back everyone in live coverage here, theCUBE, Boston, Massachusetts for AWS reInforce 2022 Security Conference for Amazon Web Services. Im John Furrier, host with a great guest Ameesh Divatia, co-founder and CEO of Baffle. You guys are hot right now, but youre in an area thats going to explode, we believe. The super cloud is here. Weve been covering that on theCUBE, that people are building on top of the Amazon hyperscalers and without the CAPEX theyre building platforms. The application tsunami has come and still coming, its not stopping. Modern applications are faster, theyre better and theyre driving a lot of change under the covers. And youre seeing structural change happening in real time and in ops, and the network. You guys got something going on in the encryption area, data. Talk about what you guys do.
Ameesh Divatia:
We believe very strongly that the next frontier in security is data. Weve had multiple waves in security. The next one is data because data is really where the threats will persist. If the data shows up in the wrong place, you get into a lot of trouble with compliance. So, we believe in protecting the data all the way down at the field or record level.
John Furrier:
And you guys doing all kinds of encryption or other things?
Ameesh Divatia:
Yes. we do data transformation, which encompasses three different things. It can be tokenization, which is format preserving. We do real encryption with counter mode, or we can do masked views. So tokenization, encryption and masking all with the same platform.
John Furrier:
So, pretty wide ranging capabilities with respect to having that kind of safety?
Ameesh Divatia:
Yes. Because it all depends on how the data is used down the road. Data is created all the time. Data flows through pipelines all the time. You want to make sure that you protect the data, but dont lose the utility of the data. Thats why we provide all that flexibility.
John Furrier:
So, Kurt was on stage today on one of the keynotes. Hes the VP of the platform at AWS, he was talking about encrypt everything. He said we need to rethink it encryption. Good job, we like that. But then he said, we have encryption at rest.
John Furrier:
Thats kind of been there, done that.
Ameesh Divatia:
Yes-
John Furrier:
And in flight.
Ameesh Divatia:
Yeah, thats been there.
John Furrier:
But what about in use?
Ameesh Divatia:
So, thats exactly what we plug. What happens right now is that data at rest is protected because of disks that are already self encrypting, or you have transparent data encryption that comes native with the database. You have data in flight that is protected because of SSL, but when the data is actually being processed, its in the memory of the database or data store, it is exposed. So, the threat is if the credentials of the database are compromised as happened back then with Starwood, or if the cloud infrastructure is compromised with some sort of an insider threat like a CapitalOne, that data is exposed. Thats precisely what we solve by making sure that the data is protected as soon as its created. We use standard encryption algorithms, AES, and we either do format preserving or through encryption with counter mode and that data it doesnt really matter where it ends up because its always protected.
John Furrier:
Well, thats awesome. And I think this brings up the point that we want been covering on SiliconANGLE in theCUBE, is that theres been structural change thats happened called cloud computing and then hybrid. Scale, role of data, higher level abstraction of services, developers are in charge, value creation, startups and big companies. That success is causing now a new structural change happening now. This is one of them. What areas do you see that are happening right now that are structurally changing thats right in front of us? One is more cloud native so the success has become now the problem to solve, to get to the next level. So what are some of those?
Ameesh Divatia:
What we see is that instead of security being an afterthought something that you use as a watchdog you create ways of monitoring where data is being exposed or data is being exfiltrated, you want to build security into the data pipeline itself. As soon as data is created, you identify what is sensitive data and you encrypt it or tokenize it as it flows into the pipeline using things like Kafka plugins or what we are very clearly differentiating ourselves with is proxy architectures so that its completely transparent. You think youre writing to the data store, but youre actually writing to the proxy, which, in turn, encrypts the data before its stored.
John Furrier:
Do you think thats an efficient way to do it or is the only way to do it?
Ameesh Divatia:
It is a much more efficient way of doing it because of the fact that you dont need any app dev resources. There are many other ways of doing it, in fact, the cloud vendors provide development kits where you can just go do it yourself. So, that is actually something that we completely avoid and what makes it really interesting is that once the data is encrypted in the data store or database, we can do what is known as Privacy Enhanced Computation. So, we can actually process that data without decrypting it.
John Furrier:
And so proxies then with cloud computing can be very fast, not a bottleneck.
Ameesh Divatia:
In fact, the cloud makes it so. Things in static infrastructure. In the cloud, theres infinite amount of processing available and theres containerization.
John Furrier:
And you have good network?
Ameesh Divatia:
You have very good network, you have load balancers, you have ways of creating redundancy. So, the cloud is actually enabling solutions like this.
John Furrier:
In the old way proxies were seen as an architectural fail, in the old antiquated static web.
Ameesh Divatia:
And this is where startups dont have the baggage. We looked at the problem and said, of course, were going to use a proxy because this is the best way to do this in an efficient way.
John Furrier:
Well, you bring up something thats happening right now that I hear a lot of CSOs and CIOs and executives, say CXOs, say all the time, our stuff has gotten complicated. So, now I have tools sprawl, I have skill gaps and on the rise, all these new managed services coming at me from the vendors who have never experienced my problem. And their reaction is they dont get my problem and they dont have the right solutions, its more complexity. They solve the complexity by adding more complexity.
Ameesh Divatia:
Yes. I think again, the proxy approach is a very simple.
John Furrier:
That youre solving that with that approach.
Ameesh Divatia:
Exactly, very simple. And again, we dont get in the way. Thats really the biggest differentiator. The forcing function really here is compliance because compliance is forcing these CSOs to actually adopt these solutions.
John Furrier:
So, show about the on premise versus the cloud workload dynamic right now. Hybrid is a steady state right now. Multi-cloud is a consequence of having multiple vendors, not true multi-cloud but like, they have Azure I get that, but hybrid really is the steady state cloud operations. How are the workloads and the analytics, the data being managed on-prem and in the cloud? Whats the relationship? Whats the trend? What are you seeing happening there?
Ameesh Divatia:
I think the biggest trend we see is pipelining. The new ETL is streaming. You have these Kafka and Kinesis capabilities that are coming into the picture where data is being ingested all the time. It is not a one time migration, its a stream. So, plugging into that stream is very important from an ingestion perspective.
John Furrier:
So, its not just a watchdog?
Ameesh Divatia:
No, its built in.
John Furrier:
Its built in, its real time thats where streaming its another diverse access to data. You got data lakes, you have pipeline, you got streaming you mentioned that. So, talk about the old school OLTP, the old BI world. I think Power BI is a $30 billion product and you got Tableau built on, OLTP building cubes, arent we just building cubes in a new way or is there any relevance to the old school?
Ameesh Divatia:
I think there is some relevance and in fact thats again, another place where the proxy architecture really helps because it doesnt matter when your application was built. You can use Tableau which nobody has any control over and still process encrypted data and so can with Power BI. Any SQL application can be used and thats actually exactly what we like to promote.
John Furrier:
See the original post here:
Ameesh Divatia appears on theCUBE at AWS re:Inforce to talk about proxy architecture and the future of data... - Security Boulevard
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]