Wednesday 12th March 2025
The growing challenge of data security
As organisations rapidly adopt generative AI and other innovations, data is spreading across SaaS applications, public and private clouds, and on-premise systems—way beyond traditional security perimeters.
SaaS proliferation is a major factor. While corporate applications may be well managed, personal app usage is rampant, with over a quarter of users uploading, posting, or sending data to personal apps each month. Shadow IT further complicates the landscape, as unapproved apps and services handle corporate data. Data moves freely between these tools, often without security controls.
But nothing has increased the speed at which we access and interact with data like generative AI (genAI). Adoption is surging, with the number of genAI users tripling in the past year and 94% of organisations now using AI-powered applications, according to Netskope Threat Labs. However, this increases data risk, as sensitive information is shared with AI tools without oversight.
Remote and hybrid work exacerbate these challenges by blurring security perimeters. Employees access data from anywhere, making it harder to control where information flows.
Step 1: Achieving visibility
Before protecting data, organisations must know where it is. Visibility is the foundation of data security, yet achieving it is increasingly difficult.
Data no longer sits in one place—it moves across applications, cloud environments, and devices. Many systems communicate through encrypted APIs, with 90% of cloud traffic now encrypted, complicating inspection.
This is why security needs to work with networking or, in other words, secure access service edge (SASE). Organisations need to decrypt, inspect, and re-encrypt traffic to see data at scale without compromising performance. Many struggle with this, even major SaaS providers, but without inline inspection, organisations cannot track data movement, app usage, or risks, increasing the likelihood of leaks.
Fortunately, exciting new technologies like data security posture management (DSPM) are now helping organisations see even further to answer key questions:
What risky interactions are occurring?
By addressing these, organisations can locate, classify, and secure sensitive data, uncovering hidden stores they didn't realize existed.
Step 2: Taking control with analytics
Once you have visibility, the next step is control. This is where analytics comes in. Security teams already deploy tools like secure web gateways (SWG), cloud access security brokers (CASB), and data loss prevention (DLP), but without analytics, they fail to maximize value.
With the right tools, organisations can answer key questions:
Analytics shifts security from reactive to proactive. It enables organisations to prevent breaches, improve decision-making through data visualization, identify unnecessary app usage, and ensure compliance.
Analytics can also drive cost savings. By tracking cloud service usage, organisations can identify redundant apps, consolidate licensing, and eliminate wasteful expenses.
Step 3: Staying compliant while using genAI
We all want to take advantage of genAI. But with all new technologies, it's easy to not know where to start. Most use cases fall into three categories: standalone genAI apps (e.g., ChatGPT), AI-augmented SaaS apps (e.g., Salesforce, Grammarly), and AI-driven assistants (e.g., Microsoft 365 Copilot). Despite the AI buzz, these remain SaaS applications at their core.
AI-specific regulations are evolving, but existing data privacy laws like GDPR still apply. Organisations must classify and label data, enforce access controls, and track data flows to ensure compliance.
This is where SASE and zero trust excel. Security, data protection, and GRC teams can:
To give you an idea of the scale of assessment needed, at Netskope we now assess more than 80,000 applications. And to match the pace of AI app development, we ourselves use genAI to automate and scale these analyses continuously.
Step 4: Managing hybrid work risks
Hybrid work is here to stay, but it also increases security risks. The latest Verizon Data Breach Report reveals that 68% of breaches involve human error. With employees working remotely, security can no longer be tied to a single location. Instead, security must follow the data.
Each user effectively acts as their own security perimeter, choosing which apps to use and where to send data—introducing new vulnerabilities. Legacy VPNs are ineffective, granting overly broad access and exposing organisations to risk.
A better alternative is zero trust network access (ZTNA), which enforces security at the application level:
By replacing VPNs with ZTNA, organisations can secure their hybrid workforce, reducing human error and risk exposure while ensuring security moves with the data.
Step 5: The power of zero trust
Zero trust is a top security priority in 2025 because it shifts protection from the network perimeter to the data itself.
Every request is verified based on identity, device, location, and intent, providing full transparency over critical data. Keeping attackers out is no longer enough; even trusted users and applications require strict, contextual access controls. Without zero trust, organisations lack granular visibility into their data security landscape and that prevents you from applying granular policies to enable new technologies like genAI without the risk.
Wrapping up
Data security in 2025 is more complex than ever, but a unified approach that integrates security and network controls through a SASE architecture makes it manageable. By combining visibility, analytics, unified data protection controls, AI governance, hybrid work protections, and zero trust, organisations can secure their data wherever it goes.
The key takeaway? Security isn’t just about blocking threats—it’s about enabling safe, smart, and efficient ways to work in a borderless data environment.
______________________________
Keen to learn more about how Bytes and Netskope can transform your Cyber Security strategy? Reach out to your Bytes Account Manager, or email [email protected].
Want to keep informed? Sign up to our Newsletter