A Unique Approach to Data Governance
Cybersecurity start-up Cinchy provides a new approach to data governance that liberates data from underlying siloed implementations.

A Unique Approach to Data Governance

Albert Einstein once said that if he had an hour to solve a problem, he’d spend 55 minutes thinking about the problem and five minutes thinking about the solution. Borrowing from the master, I’d suggest that if I had an hour to solve some data governance or data security task, I’d spend 55 minutes curating the data and five minutes on the solution.

This seems like an appropriate way to introduce a start-up company called Cinchy that our TAG Cyber analysts spent some time with this past week. The Cinchy team focuses on a new concept called dataware that appears to have strong relevance for data governance, data science, and data security teams. Let me share what we learned:

The observation by the Cinchy founders, led by Dan Demers, former RBC and Citibank executive, is that valuable enterprise data can be liberated from the underlying siloed implementation. What results is a new data layer that allows for powerful and effective leveraging for 360 views, improved resilience, and yes – better security.

The Cinchy Dataware Platform involves data management tools that provide visibility into data connections and dependencies across premise, cloud applications, and systems. A multi-domain hub simplifies app-to-app data integration, and the centralized view of the data supports direct control and support for user self-service through a novel data browser.

One component of the solution is the familiar process of extract, transform, and load (ETL), which is all about integrating data from various sources into a common framework for analysis. Companies like IBM have good solutions in this area – and based on what we saw, the Cinchy solution addresses common ETL needs in enterprise.

From a cybersecurity perspective, the Cinchy dataware solution enables federated governance across the data with the ability to write fine-grained policies. Enterprise teams can use the Cinchy platform to make sure that role and attribute-based controls are being properly applied and enforced – which is especially helpful for compliance.

One feature that stood out to the TAG Cyber team during our demo was the intense focus the Cinchy team has placed on creating stunning visual displays. When you sit for a demo with this team, you’ll have to focus hard on the discussion versus just gaping at the beautiful visuals being shown. Cinchy users must give great demos to executives and board members.

From an industry analyst perspective, the idea of creating a separate data layer, this notion of dataware, seems like a good idea. Anything that simplifies how data is collected, curated, organized, and stored will help with governance, but will also play a key role in establishing superior data security controls.

So, if you agree with Professor Einstein’s recommend time proportion when solving problems, including our modest extrapolation to security, then you’ll likely agree with the approach being taken by Cinchy. Give them a call – and even if the approach does not connect with your plans, you’ll really like the visuals.

Let us know what you think.

Bill Ender, CCBW

CISO | CTO | Executive Security Advisor | AI Evangelist | Investor | Board Advisor

2 年

Intriguing, Edward Amoroso! Thank you for sharing. I wonder how Cinchy addresses the challenge of managing PII/PCI/PHI ... ??

回复
Ali Samouti

Cyber security consultant and PhD candidate (IT engineering)

2 年

great thanks

回复

Interesting approach - an abstraction layer that provides visibility and then also overlays identity. Want to hear more.

要查看或添加评论,请登录

Edward Amoroso的更多文章

  • Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    Protecting the U.S. Bitcoin Reserve and Stockpile from Cyber Threats

    As you no doubt have heard, plans are in place to establish a Strategic Bitcoin Reserve and Digital Asset Stockpile…

    15 条评论
  • Parable of Network Observability

    Parable of Network Observability

    I’d like to discuss here a common problem we see in our work at TAG every day – namely, the deployment of “network…

    23 条评论
  • Parable of the Cyber Industrial Complex

    Parable of the Cyber Industrial Complex

    Preamble In 1961, Eisenhower gave a famous speech that warned of the dangers of the so-called military-industrial…

    34 条评论
  • The Challenges of CISOs Working for Cybersecurity Vendors

    The Challenges of CISOs Working for Cybersecurity Vendors

    (Note to Reader: Normally these reports are available only to TAG Research as a Service (RaaS) subscribers. But with…

    27 条评论
  • Have Uncle Joe Read This Before He Invests in Crypto

    Have Uncle Joe Read This Before He Invests in Crypto

    I’ve been lecturing to my graduate students on the foundations of cryptocurrency and blockchain for years. Starting…

    15 条评论
  • Why TAG is Now Rating Cybersecurity Vendors

    Why TAG is Now Rating Cybersecurity Vendors

    by Edward Amoroso The first time I ever paid attention to an analyst quadrant – fully two decades ago, I found myself…

    11 条评论
  • Predicting the Impact of Trump’s Election on Cyber

    Predicting the Impact of Trump’s Election on Cyber

    Below are seven predictions from our team at TAG for how the recent Trump election of 2024 will impact U.S.

    83 条评论
  • Five Tips for Working CISOs

    Five Tips for Working CISOs

    Our team at TAG has been coaching CISOs for years – and this includes private discussions just about every day of every…

    11 条评论
  • The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    The SEC is Weakening the Cybersecurity Posture of the United States. Here is Why.

    Preface During May and June of 2024, draft versions of this article were shared with Chief Information Security…

    123 条评论
  • Sad Loss Today

    Sad Loss Today

    Several years ago, before the Pandemic, I received a friendly call from a law firm I’d done some business with – and…

    9 条评论

社区洞察

其他会员也浏览了