You are on page 1of 27

The Future Of

Data Security
Startups, emerging technologies, and Big Tech’s
innovations on the cutting edge of data security

1
WHO WE ARE

The technology market


intelligence platform.
CB Insights software lets you predict, discuss,
and communicate emerging technology trends
using data in ways that are beyond human
cognition. We are a leader in the Expert Automation
& Augmentation Software (EAAS) space.

2
TRUSTED BY THE WORLD’S LEADING COMPANIES

“We use CB Insights to find emerging trends


and interesting companies that might signal a shift in
technology or require us to reallocate resources.”
Beti Cung, Corporate Strategy, Microsoft

3
TRANSFORM draws on the experience
of successful executives from today's
JOIN US ON DEC.
top companies and the latest research 4 & 5 IN NYC
on technology, growth and innovation
to cut through the fog about the coming RSVP TODAY
digital revolution.
4
Contents
8 Data security rising

12 Startup landscape

22 Emerging technologies

24 Big Tech’s patent activity

5
Suddenly, everyone’s focused on cybersecurity

A Recent Startup Breach Exposed Billions of


Data Points
- WIRED, 2018

66
Talk of “data security” is especially on the rise
Quarterly news mentions of “data security,” 2014 – Q3 2018

7
8
Cybersecurity is now top of mind for the C-suite
Quarterly mentions of “cybersecurity” on corporate earnings calls, 2014 – Q3 2018

9
Startups are rising to the challenge
30+ startups helping enterprises protect data:

1010
The holy grail of enterprise data security
Homomorphic encryption could transform cybersecurity

Startups in this category allow


enterprises to analyze
encrypted data without
exposing it to algorithms,
processing systems, or
analysts.

Companies generally offer


encryption products and
services to conduct general
purpose computation on
encrypted data, while
maintaining data
confidentiality.

1111
Spotlight: homomorphic encryption secures data in use
The enterprise data life cycle consists of three elements: data at rest, data in transit, and data in use.

Traditional encryption
techniques secure data while it
is at rest and in transit, but fail
to secure data in use.
Homomorphic encryption
addresses that critical
vulnerability.

Homomorphic encryption is
creating new opportunities for
secure internet processes.
Startups and corporates alike
are leveraging it for private
database comparison, search,
cloud computing, and to
prevent future cyberattacks.

1212
Tracking data on enterprise networks
Security systems for tracking the origin, interactions, and movement of data over time

Data provenance tools help


identify where sensitive data lives
on enterprise networks, so that
users and operators can predict
and eliminate risks associated
with privacy to ultimately avoid
breaches.

Companies generally provide


continuous live tracking and
monitoring of sensitive data on
enterprise networks, and some
offer compliance-as-a-service
with identity security regulations.

1313
Anonymizing personally identifiable info (PII)
Making it harder — or even impossible — to identify an individual in a data set

Startups are using artificial


intelligence and encryption
techniques to help enterprises
generate realistic,
representative users based on
real data while retaining
structure and variation and
preserving anonymity.

Companies like Hazy offer an


AI platform that automates
data anonymization.

1414
The future of data security is quantum
Encryption products that can withstand quantum computer attacks

Quantum computers are ultra-


fast computers that utilize the
principles of quantum
mechanics. The unparalleled
processing power of quantum
machines poses serious risks
to common encryption
methods. Companies in this .
category are developing
solutions for quantum
computer attacks.
.
Companies like Quintessence
Labs are developing a primary
component of quantum
resistant encryption called a
true random number generator.
1515
Actively defending data
Protecting data from hackers that are already inside a network

These companies use


deception, obfuscation,
modification, and
polymorphous techniques to
hide sensitive data from
hackers.

Companies include
CryptoMove, which fragments,
encrypts, and mutates data to
make it unrecognizable to
hackers.

1616
Outsourcing data security
Taking data security liability off the shoulders of enterprises

Very Good Security (VGS)


provides a secure data vault for
enterprises to offload their
sensitive information.

This lets companies access


and operate on their data
without assuming liability for
protection.

VGS is backed by investors


including Andreessen Horowitz,
Max Levchin, and Social
Capital, among others.

1717
Data security’s secure and immutable ledger
Blockchain technology to manage the flow of data in enterprise systems

Use cases include sharing


sensitive data, orchestrating
access management, jointly
operating on sensitive
datasets, and more.

Companies include Luna DNA,


which manages a blockchain-
based data platform for
sharing genetic information.

1818
AI, blockchain, & enhanced encryption are the
future of enterprise data security

19
AI, blockchain, encryption, and the CIA triad
Data security strategies can be assessed through a concept known as the CIA triad

In this case, the CIA acronym


stands for “confidentiality,
integrity, and availability.”

The triad serves as a model for


designing information security
systems.

AI, blockchain, and encryption


technologies could lead to
security advances in finding,
storing, sharing, and disguising
sensitive data on enterprise
networks. Enterprises that
adopt these technologies with
an eye toward data security will
be ahead of the game.
2020
Big Tech’s patents tell us a lot about the future
of data security

21
Facebook,
Facebook, Amazon, Microsoft, Google, Apple
Amazon,
data security patent application activity, 2013 - 2017
Microsoft,
Google, and
Apple are
doubling down
on data security.

22
FACEBOOK, APPLE, AND GOOGLE – SECURELY SHARING IDENTITY DATA

Facebook and Google track users online and sell that data to advertisers. In turn, these
companies are trying to find new ways to target users (and increase their bottom line) while
protecting users’ privacy. Similarly, Apple is making a foray into advertising with an eye on
maintaining its reputation as a privacy leader.

Facebook applied for the Apple filed a patent to Google published a patent
patent “Anonymizing User “repackage media content for “access control for user
Identifiable Information” in data with anonymous related data” in May’18.
Jan’18. identifiers” in Dec’17.

23
MICROSOFT – SECURING DATA IN USE

Microsoft filed a patent application as early as 2013 (granted in 2016) for “encrypting genomic data for
storage and genomic computations.”

The patent allows operation on


encrypted genomic information
using a “homomorphic
polynomial encryption scheme.”
The ability to operate on
encrypted genomic data means
that partner ecosystems can
share sensitive datasets and
findings while preserving privacy
and adhering to healthcare
industry data compliance
standards.

24
GOOGLE AND AMAZON – DATA SECURITY IN THE CLOUD

Recent high-profile data exposures — including at Accenture, WWE, and Booz Allen — stem
from misconfigurations in Amazon Web Services’ Simple Storage Service (S3) buckets.
Google’s cloud customers have also suffered data leaks as well due to holes in cloud
infrastructure security.

Google applied to patent a Amazon applied for a patent


system for detecting large- in January 2018 for the
scale data leakage in the management of encrypted
cloud in March 2018. cloud data storage.

25
WHERE IS ALL THIS DATA FROM?

The CB Insights platform has the


underlying data included in this report

CLICK HERE TO SIGN UP FOR FREE

26
cbinsights.com
@cbinsights

waltman@cbinsights.com

27