Ltc Paul Stanton: Yes, sir. It’s a huge concern for us. As we move towards a goal of creating a virtually consolidated data store, we have to consider the threat environment and the fact that we face a very sophisticated and evolving threat on a daily basis.
So first and foremost, we have to control access in. And so we got very tight access controls for who can gain access into the cloud environment. But of equal if not more importance is we’re securing at the data layer.
JIm Flyzik: Okay.
Ltc Paul Stanton: We’re providing metadata tags all the way down to the data layer that allow us to very fine grain control over who can access individual elements of the data. Again, this is truly revolutionary in terms of the way that we’re controlling that access such that you have to have the appropriate credentials to execute a query, to try to combine data sets at the actual data layer. And then finally, we’re implementing data prominence. So I'm tracking what's happening with the data. I create metadata tags that show me who has actually accessed the data and any modifications that had been made to it. Such that I can detect any potentially malicious or inadvertent even modifications to the data.
So we’re really focusing, zeroing in on the data tear itself.
JIm Flyzik: Right, excellent.
00:01:37 END OF AUDIO