SHARE
Facebook X Pinterest WhatsApp

How CI Tightens Enterprise Data Security

thumbnail
How CI Tightens Enterprise Data Security

Internet lock

With data security becoming ever-more challenging, continuous intelligence can offer hope to the enterprise.

Written By
thumbnail
James Connolly
James Connolly
Jul 8, 2021

The importance of a strong data security strategy is pretty clear. Even little “Mom and Pop” businesses worry about hackers stealing personal information, planting ransomware, and launching denial of service attacks. For the enterprise, the job of the CISO and their team keeps getting tougher, particularly since the pandemic changed everything.

Take the case of the Texas health and human services agency. Prior to the pandemic that department saw 90 million attack attempts per year. Since Covid-19 hit the attacks have increased five times over to 532 million attacks in a year. Meanwhile, CISOs across industries are relying on outdated, report-based threat intelligence.

Download Infographic Now: The 5 intelligence gaps curbing your climb to digital  success

Security challenges have outpaced the ability for humans and yesterday’s security tools to deal with them. The old idea of human staff chasing down every alert generated by security software doesn’t scale in the face of a million attacks per day. Plus, experts estimate that up to half of all alerts are based on false positives. So, blocking everything isn’t feasible.

A scary new world

In addition, today’s reality for the evolving enterprise is that cloud computing and third-party apps are core concepts. That means massive amounts of data are stored or created outside of the legacy on-premise systems. Then factor in how a growing number of employees are working from home.

All of this highlights the need for context in security systems. Those systems need to learn what is “normal” in operations to weed out the false positives. A security strategy also requires a multi-faceted understanding of how new threat signatures and vulnerabilities are emerging. The systems then must balance risk factors so staff can act on the attacks that are most likely to damage the business.

See Also: Continuous Intelligence Insights

Complicating everything is the fact that security strategies require real-time monitoring and proactive responses to threats. A next-day report just won’t cut it in a 24×7 work environment where data changes by the second.

Advertisement

CI-enabled data security

That’s where continuous intelligence (CI) can play a key role in a cybersecurity strategy. Think of CI as the ability for security tools to constantly learn what is going on within enterprise systems and which threats require immediate action.

CI is a capability built into a CI platform or paired with an existing application, such as security software or financial applications. Leveraging machine learning and artificial intelligence, CI can learn to recognize what data or usage patterns are normal and what may be signs of an attack.

While many enterprise security teams are reluctant to implement new technologies and are still in the “lock down everything” mindset, the changing nature of enterprise computing may require a fresh approach to security. With enterprises relying so heavily on third-party apps, cloud, work from home and partnerships, security teams have to trust that data sitting outside the physical environment. They need tools that can separate the bad activity from the good.

CI is designed to operate within a modernized architecture, living in the cloud and working in real time to identify problems and recommend solutions. CI for data security shapes up as a must-have for today and the future.

Download Infographic Now: The 5 intelligence gaps curbing your climb to digital  success
thumbnail
James Connolly

James Connolly is a technology journalist with deep experience as a reporter, writer, and editor. He formerly was lead editor with Informa/UBM's InformationWeek, Network Computing, and All Analytics media sites. He has more than 30 years experience in tech publishing, including work with Computerworld, TechTarget, and MassHighTech. He has covered a wide variety of information technology sectors with a focus on how enterprise organizations implement and derive benefits from tech. He is a former news reporter for the Boston Herald.

Recommended for you...

AI Agents Need Keys to Your Kingdom
Securing Patient Intake: The Hidden Threats to Protected Health Information
Yaron Galant
Dec 9, 2025
AI That Plays by Your Rules: Why Enterprise MCP Integration Changes Everything
Tim Freestone
Dec 3, 2025
Addressing the Hidden Security Risks of AI Agents in Industrial Operations

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.