
image credit: unsplash
Organizations usually manage the security of data, applications and edge computing from disparate technologies and across different teams. That traditional approach will not work going forward because your IT infrastructure is changing rapidly, the way you deliver services to your customers is evolving and security threats are becoming more complex.
Increasingly, sophisticated attacks start at the edge or application layers and move laterally to the data layer without detection. In fact, an analysis by Imperva Research Labs of 100 data breaches over the past year, finds that almost 50% of those incidents began at the application layer. This demonstrates just how frequently malicious access requests to databases are coming from APIs and applications.