[WEBINAR] Bulletproof: How Today's Business Leaders Stay on Top

Data in Use

Definition - What does Data in Use mean?

Data in use refers to data that is not simply being passively stored in a stable destination, such as a central data warehouse, but is working its way through other parts of an IT architecture. Data in use may be in the process of being generated, amended or updated, erased, or viewed through various interface endpoints. This is a helpful term for pursuing comprehensive security for IT systems.

Techopedia explains Data in Use

The idea behind protecting data in use is that data sets are vulnerable to different kinds of threats depending on where they are in an IT system. One of the most common and basic issues with data in use revolves around endpoints. Endpoints are points where data from a system gets routed to an individual device or workstation by or for an end user.

Obviously, advanced IT systems and networks need to anticipate a variety of different endpoints. Many of the issues around endpoint security or data-in-use security relate to the trend toward BYOD, where employees may be using personal devices to view corporate data. Even for mobile devices or other hardware systems that may be company-owned, companies have to look at how end users can view or capture data from secure locations.

Although professionals sometimes recommend techniques like full disk encryption or a comprehensive data leak prevention plan, others question whether total data-in-use security is ever really possible. This is partly because of the inherent setup of most operating systems, but another big issue is that even in the most secure systems, data has to be sent to endpoint displays in order to be useful. With that in mind, there is no single way to guarantee complete data safety, which is why companies tend to focus on ironclad agreements with employees and other end users rather than relying only on data-in-use protection systems.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.