Jan 17, 2024|5 min|Technology

Cohesity and Data Security Posture Management (DSPM) integrations: How they work and why it matters

Our technical integration with Normalyze is now generally available.

Cohesity recently entered into a partnership with seven leading Data Security Posture Management (DSPM) vendors to help organizations increase resilience for their most critical data. In this blog, we explain how our technical integration with DSPM vendors works and why it matters.

Converging data security posture management (DSPM) and data protection

Cyber resilience requires that you are prepared for, and can recover from a cyberattack. First and foremost, you need visibility into your data estate—only then can you protect the “crown jewels” of your most important assets. This approach gives you a higher chance of recovery in the event of a cyberattack. Organizations that follow this best practice also enjoy many benefits, including significantly lower cyber insurance premiums.

To help increase resilience for your most critical data, Cohesity recently partnered with seven leading DSPM vendors including our long-standing partner BigID, as well as Cyera, Dig Security, Normalyze, Sentra, Securiti, and Concentric AI.

DSPM solutions provide visibility into known and forgotten data repositories across various cloud platforms, classify the data to identify sensitive information, and determine the risk of exposure for said data. DSPM helps you understand data usage, assess the security posture of the data stored, and comply with regulations.

For instance, a new rule from the U.S. Securities and Exchange Commission (SEC) requires all U.S.-listed companies to disclose cybersecurity incidents deemed “material” within four business days after the company determines it has experienced a cyber incident. In this rapidly changing landscape, knowing where your sensitive data resides and protecting them quickly is paramount.

Combining DSPM capabilities with Cohesity’s AI-powered data security and management platform helps you improve your security posture further across multiple clouds.

How the first implementation of the integration between Cohesity and DSPM solutions works

Let’s see how this integration works.

First, consider the example of a customer who uses Cohesity to protect their workloads relevant to high-priority or active business projects: virtual machines, databases, NAS, or M365. The backup administrator ensures that these important workloads are protected as part of the backup policy. But what about the data assets across multiple clouds that are NOT directly tied to these active projects but still contain potentially sensitive data assets?

Without a DSPM solution in place, these workloads can remain unidentified or forgotten and unprotected. And without that visibility, there can be gaps and inconsistencies in how the customer protects data.

In the above scenario, you have information on data assets that are included in a data protection plan, using the Cohesity solution. That’s a great place to be for many organizations.

Now, complement Cohesity with a DSPM solution. You now have information on all cloud data assets, including in forgotten databases and shadow or unknown data repositories, and whether any sensitive patterns exist based on data classification, using the DSPM solution. This is shown below.

DSPM Body Image

The integration between Cohesity and the DSPM solution merges this information. Following the above example, this connection uncovers two data assets with personally identifiable information (PII) that have not been backed up, much to the customer’s surprise.

The IT backup admin can now use the resulting reports to adjust data protection priorities and share the latest protection status with security teams. Security teams gain confidence in achieving their mandate of protecting certain data assets. Risk and compliance teams can benefit from this visibility to understand cyber recovery and compliance risks.

Benefits of the integration between Cohesity and DSPM solutions

Why are organizations like yours investing in DSPM, and then integrating it with Cohesity?
Here are three reasons:

  1. Discover sensitive data across cloud assets: Gain visibility into sensitive and critical data in your cloud infrastructure.
  2. Identify data protection gaps: Identify gaps in safeguarding your cloud workloads. Recognizing these gaps informs data protection priorities, ensuring that you can efficiently recover essential workloads when needed.
  3. Report on cyber recovery risk: By combining the capabilities of DSPM solutions with Cohesity, you can augment your assessment of data security posture with your ability to recover. This results in a more comprehensive understanding of cybersecurity risks and, as a result, more robust protection.

Cohesity and Normalyze integration is now generally available

We’re thrilled to announce that the integration with Normalyze, our initial design partner for DSPM integrations, is now generally available.

Customers who also use Normalyze can start using the integration in three easy steps:

First, configure the Normalyze app from the Cohesity dashboard.

  • From the Cohesity dashboard, click the app-selector menu and click Security Center.
  • In Security Center, select Integrations > Browse Integrations. You will see the list of all Cohesity-developed security integrations. Select Configure under the listed Normalyze application.
  • Enter the API key and the API secret and click Configure.

Completing these steps activates the integration. In the background, Cohesity is connecting to Normalyze to pull in an inventory of all assets Normalyze has discovered and identified sensitive information on. Cohesity reconciles this information with the assets’ backup profile on our end and presents a joint view.

Next, let’s take a look at this view in Cohesity.

  • In Security Center, select Data Classification, and click Sensitive Data Posture.

Note that DSPM Tags are shown, indicating the criticality of the asset. We’re also showing the Protection Status of each asset to help you determine protection gaps.

From this view, you can simply select the asset(s) that you want to protect, hit Protect, and select the appropriate protection policy for each.

Now let’s see how the equivalent view looks from the Normalyze interface. In the inventory of data stores, Normalyze classifies the data in “database-3” as “PII” and “PHI”, and the integration delivers the protection status, which for this data asset is shown as “unprotected” in Custom Tags.

Data Stores Image

The consequences of limited visibility

The repercussions of limited visibility in cloud environments are far-reaching. A cyberattack can cripple an organization’s ability to conduct business, compromise sensitive customer data, and tarnish its reputation. Without proper data visibility, enterprises face difficulties in identifying the extent of a breach, reporting it to stakeholders, and taking timely remedial action. This significantly hinders their ability to recover from an attack promptly.

Learn more

To learn more about DSPM solutions and how our combined solution can enhance your security and cyber resilience, watch this Tech Insights conversation between Normalyze CEO Amer Deeba and Cohesity’s Shelly Calhoun-Jones. And stay tuned for upcoming integrations between Cohesity and our DSPM partners.

Written by

Eleonor Lee Headshot New

Eleonor Lee

Senior Product Marketing Manager

Eleonor Lee Headshot New

Eleonor Lee

Senior Product Marketing Manager

Eleonor leads product marketing for Cohesity solutions with Cisco and the Data Security Alliance. Leveraging 20+ years of product marketing, product management, and software delivery experience, Eleonor thrives on being at the intersection of the market and tech.

Sheetal Venkatesh Headshot

Sheetal Venkatesh

Senior Director, Product Management

Sheetal Venkatesh Headshot

Sheetal Venkatesh

Senior Director, Product Management

Sheetal Venkatesh leads product management for the Data Security product line at Cohesity. With 20+ years of experience spanning product management engineering and technical sales roles, Sheetal has a well-rounded background in cybersecurity and storage/availability domains.

You may also like

resource
Blog

5 predictions for 2024

resource
Blog

RAG to riches: Unleashing the power of retrieval augmented generation (RAG) in LLMs

resource
Blog

Enhancing data security in the cloud

X image
Icon ionic ios-globe

You are now leaving the German section of www.cohesity.com/de/ and come to an English section of the site. Please click if you want to continue.

Don't show this warning again

Icon ionic ios-globe

You are now leaving the German section of www.cohesity.com/de/ and come to an English section of the site. Please click if you want to continue.

Don't show this warning again