• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»How development data security operations can benefit the enterprise
Security

How development data security operations can benefit the enterprise

September 5, 2022No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
How development data security operations can benefit the enterprise
Share
Facebook Twitter LinkedIn Pinterest Email

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.


For those technologists anxious to keep up with the latest relevant acronyms, add development data security operations (DevDataSecOps) to the list of need-to-know.

DevDataSecOps builds on the commonly used terms devops and dataops. While the term is not yet in wide use, data practices at many organizations suggest it soon will be.

“Increasingly, we are seeing a need for organizations to move to a DevDataSecOps model that encompasses the core of the devops model, while including the critical security and data decisions that drive operation and development decisions,” Karthik Ranganathan, CTO and cofounder at Yugabyte, told VentureBeat. “While a DevDataSecOps approach may feel unfortable at first and come with initial challenges (as devops did), we believe it comes with big benefits that data-first organizations can no longer ignore.”

What’s the big deal about DevDataSecOps?

What is driving this new trend?

Event

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

Register Here

“In order to be an effective data-driven business, it is important to set up a strong foundation for the data architecture upfront,” Ranganathan says. “As businesses evolve to meet the needs of distributed workers, partners and customers, they cannot build modern applications that provide the desired user experience with a legacy approach to data. Distributed users require distributed data. Trying to change the data layer after building an application results in reduced developer productivity and slower time to value.” 

See also  The present state of zero-trust cloud safety

Furthermore, Ranganathan stressed that “working in modern environments where being highly secure from day one is essential, security can no longer be an afterthought. Just as the data architecture is critical to how an application is built—and what experiences and capabilities should be expected — the exact same is true for security.”

By embracing DevDataSecOps practices, data and security architectures are recognized as integral parts of building and rolling out services rather than ‘specialized’ or ‘expert’ aspects, Ranganathan said. This enables teams to identify key requirements and thoughtfully make holistic design decisions during planning phases to ensure the key objectives of the service can be met.

The result is that IT groups face fewer surprises and blockers to building and shipping new features due to major re-architectures.

“DevDataSecOps would also require upfront investment into these areas. This means that IT groups would need to take a little more time to plan and architect ahead of time in order to make the later development and testing processes, which are usually more costly and time-consuming, more successful,” Ranganathan said.

Benefits of a DevDataSecOps strategy

In the same way devops brought developer skills and insights into operations teams, DevDataSecOps would enable organizations to build similar bridges to data architects and to information security teams, Ranganathan believes.

“By creating natural times for when and why the teams should interact, and establishing shared objectives for the development of new services or capabilities, the end result should increase the chances of meeting all the goals of an initiative,” Ranganathan said. “The end-to-end approach should increase the efficiency of the developer teams by providing them all the requirements upfront and minimizing major rework later in the process.” 

See also  Ignorance isn't bliss: How tech users lack fundamental cybersecurity knowledge

When done right, some key gains to be realized are:

  • Faster time to value by taking a small hit upfront but greatly reducing the chance of major delays later on in the project.
  • Increase developer productivity by maintaining focus on value-added efforts and ensuring the right data and security architectures are used to minimize unnecessary churn and work.
  • Decreased risk by having core needs of data and security established as a foundational element of any project, versus an add-on thought where it becomes harder to ensure full compliance or address all the needs correctly.

Cultural change will be an obstacle

Despite these potential gains, adopting a DevDataSecOps strategy is not without its challenges.

“As we saw with the adoption of devops, the major challenge that will come with DevDataSecOps is making the cultural change and training teams to have a holistic, end-to-end approach,” Ranganathan explained. “While some inefficiencies may exist at first as new processes are established and additional voices become part of the early design phases, over time the overall key requirements and needs will be better understood by the larger organization so that smarter decisions and approaches are proposed from the start.”

Most IT teams, especially at larger organizations, would also need to work with other outside teams to build the required skill set and establish the proper processes for reviewing data and security requirements, Ranganathan said.

In the meantime, many leading organizations have already started down the path to DevDataSecOps adoption, even if they don’t recognize it.

“While the DevDataSecOps term is not widely embraced yet (and is a mouthful to say), the reality is that many forward-looking organizations that rely heavily on data to power their business, such as large financial institutions and retailers, are already prioritizing their data and security architectures as fundamental parts of their business,” Ranganathan said.

See also  Sephora fined for violating CCPA --- what it means for data protection  

Source link

benefit data development enterprise operations security
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Bitdefender Total Security review

March 6, 2024

Avast Premium Security review

March 6, 2024

Eset Home Security Ultimate review

January 23, 2024

AVG Internet Security review

October 31, 2023
Add A Comment

Comments are closed.

Editors Picks

Lenovo Yoga Slim 7i Pro X (2022) review

January 16, 2023

The Best Short PC Cases to Put on a Desk

July 6, 2022

US charges three Iranians over CNI cyber attacks

September 17, 2022

Turtle Beach’s cloud-first controller is wired for your Xbox, wireless for your phone and PC

September 15, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.