Symmetry Systems Launches Zero-trust Data Assessments

 Symmetry Systems, a data security posture management (DSPM) platform, launched its zero-trust data assessments, leveraging insights from hundreds of cloud data security posture management assessments across a variety of industries. The zero-trust data assessments help organizations develop an accurate understanding of their data across their hybrid clouds and identify common weak spots in their data security posture that can be resolved to accelerate a successful zero-trust security strategy.

As part of the assessments, Symmetry performs an agentless scan with DataGuard to identify data stores and unearth zero-trust challenges, misconfigurations and violations in their hybrid cloud. This enables customers to adjust identity access management (IAM) policies on individual data objects at scale, to ensure access is limited only to those who need it, and then monitor all accesses to lay the foundation for zero trust for data.

“Accurately understanding your organization’s crown jewel data – how it is secured today and how it is used – is a vital first step towards zero trust,” said Mohit Tiwari, Symmetry co-founder and CEO. “Our zero-trust data assessments map data flows from identities to data objects at a granular level – this has never been possible before. This assessment helps you measure how you secure your crown jewel data, and then dramatically simplify the methods to take them closer to zero ambient trust.”

Symmetry’s zero-trust data assessments provide organizations with immediate visual insights and evidence of zero-trust violations across their hybrid cloud data stores, detailed evidence that can answer critical data security posture questions and accelerate the adoption of a successful zero-trust-based security strategy, and recommended actions to fortify customers’ data security posture.

This ensures the zero-trust philosophy can be applied across the organization’s data, reducing the implicit trust provided. Symmetry’s visualizations provide impactful executive visibility to cloud data sprawl, identity lifecycle, zero trust violations and sensitive data access.

DataGuard’s data-centric focused capabilities have been implemented in use cases across a breadth of NIST cybersecurity framework (CSF) functions, including identify, protect, detect, respond and recover. This includes compliance with legal and regulatory requirements and other mandates. Through zero-trust data assessments, organizations can experience a range of capabilities, including:

  • IDENTIFY – Identify and visualize where data, and particularly customers’ sensitive data is stored.
  • PROTECT – Visualize and identify accounts with access to sensitive data including third-party identities and accounts. Understand who has access to which sensitive data in customers’ multi-cloud environments and enforce relevant zero trust control.
  • DETECT – Keep track of who is using customers’ data and what they are doing with it. Detect violations of least privilege for data access.
  • RESPOND & RECOVER – Identify and prioritize dormant identities and unused data stores to minimize the data blast radius. Use visual evidence to recommend cloud data access entitlement policy changes.

To learn more, visit