{"id":14701,"date":"2016-01-14T10:43:24","date_gmt":"2016-01-14T18:43:24","guid":{"rendered":"https:\/\/blogs.technet.microsoft.com\/dataplatforminsider\/2016\/01\/14\/data-security-sql-server-2016-and-your-business\/"},"modified":"2024-01-22T22:52:21","modified_gmt":"2024-01-23T06:52:21","slug":"data-security-sql-server-2016-and-your-business","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/sql-server\/blog\/2016\/01\/14\/data-security-sql-server-2016-and-your-business\/","title":{"rendered":"Data security, SQL Server 2016, and your business"},"content":{"rendered":"
Security is unquestionably a major priority for Microsoft. A recent news story<\/a> reported that the company \u201cis spending $1 billion a year to make Microsoft products more secure.\u201d The Microsoft data platform, including SQL Server and Azure SQL Database, is at the top of the list of products investing in security. But, be aware that a commitment to data security is actually nothing new. SQL Server has long been recognized for its outstanding security record: According to the National Institute of Standards and Technology(NIST)1<\/span> public security board, for the past six years, SQL Server has had the fewest security vulnerabilities when compared with the major database vendors. In addition, SQL Server has been deemed \u201cthe most secure database\u201d by the Information Technology Industry Council (ITIC). Despite this excellent security record, Microsoft is not content to rest on its laurels and is continuing to invest in security, providing customers with new and improved tools to secure data and applications.<\/p>\n From an IT infrastructure and compliance perspective, the importance of protecting data is clear. Witness the fact that security has been identified as one of the \u201cEight emerging data center trends to follow in 2016<\/a>.\u201d But data protection also has profound business implications and can even be a competitive differentiator by helping drive customer loyalty and retention, create opportunities for premium offers and new sources of revenue, and protect future revenue streams, according to Forrester Research 2<\/span>.To help deal with the complexity and scope of data security \u2014 and diminish risks to your business \u2014 Microsoft provides an across-the-board, in-depth security approach that includes application security, network security, and database security.<\/p>\n Data Security and SQL Server<\/strong><\/p>\n Playing into this overall approach, SQL Server 2016 and Azure SQL Database include advanced, layered security functionality to help protect data itself as well as access to that data, and then provide monitoring capabilities. Data security features include (but are not limited to) the following:<\/p>\n This layered approach to data security and Microsoft\u2019s overall commitment to advancing security and privacy protection address important considerations for business today. Upcoming blogs will go into deep technical detail on these security capabilities, but examining a business scenario can help illuminate the business benefits that data security can help ensure.<\/p>\n Business implications The business implications of data security range from speeding up customer service, to impacting the bottom line, to protecting shareholder value. Underscoring the potential bottom-line concerns of financial executives, a recent survey<\/a> found that 66 percent of CFOs consider security to be a high or very high priority. Even at the end-user level, the potential business impact of exposing sensitive data is recognized: Another recent survey<\/a> discloses that \u201c71 percent of end users say that they have access to company data they should not be able to see.\u201d<\/p>\n How can Microsoft\u2019s data security capabilities ease such concerns? Consider just one example showing how Dynamic Data Masking, as a part of your data security program, can help you address the point raised by those end users who admitted they had access to data (such as Social Security Numbers or health details) that they shouldn\u2019t be able to view. For example, suppose you have a call center where representatives deal with customer billing questions. When a customer record comes up, the representative needs to see certain information to answer questions. But some customer information, such as specific personal health details, need to remain confidential for HIPAA compliance. With Dynamic Data Masking, IT administrators can take simple steps to define policies, or rules, to mask any personally identifiable information that is not needed for the customer interaction. This way, the representative can view a customer record without having access to confidential information. Customer information is secured, but at the same time, customer service is able to answer questions by accessing appropriate data without compromising privacy.<\/p>\n Commitment to security built-In<\/strong><\/p>\n As the article cited above emphasizes, Microsoft is spending $1 billion per year to ensure that its products are secured so that businesses are protected. SQL Server and Azure SQL Database are continuously building-in state-of-the-industry security technologies as part of this ongoing commitment to security. For business, this means you don\u2019t have to pay extra to give IT staff security tools that are easy to deploy and maintain \u2014 those tools are built into Microsoft\u2019s data platform. At the same time, businesses can build data security infrastructure that supports customers and provides a competitive edge. To learn more about Microsoft\u2019s data security approach, see the Security Center for SQL Server Database Engine and Azure SQL Database.<\/a><\/p>\n See the other posts in the SQL Server 2016 blogging series<\/a><\/em><\/p>\n\n
\n<\/strong>
\nData has become not only a business asset, but it is now also a competitive differentiator: A company that can ensure that customer and business data are secured has a competitive edge over a company that does not make data security a priority. This means that for business and technical decision-makers to enable their businesses to compete effectively, they need a data platform with built-in security features and they need a strategy that takes advantage of the built-in security capabilities.<\/p>\n