Time to rethink the relationship between data and security in the modern data cloud

Global D2C healthcare & wellness brand, Good Health Company, trusts Acante's data-focused approach to security to ensure compliance and privacy for consumer health data.

December 19, 2023
-
Niraj Gupta, CTO, GHC

It’s an amazing time to build and grow a business. Good Health Company (GHC) is a rapidly expanding global health and wellness brand. At GHC, we have always wanted to grow, and grow fast - we have expanded quickly from India to multiple global markets including North America. 

Using the cloud (AWS in our case) to get set up and scale up on demand has become commonplace, and we are no different. Growing successfully at this pace has required us to adapt fast with sound data-driven decisions. The data cloud has evolved to provide a host of data platforms that put powerful analytics at our fingertips. Our applications, our analytical infrastructure and our recommendation systems are all powered by these data cloud platforms such as S3, Mongo Atlas, Snowflake and others – allowing us to operate with tremendous speed and automation.

Data Cloud brings security challenges 

Today, multiple teams across marketing, supply chain operations, finance, engineering and other stakeholders across GHC leverage various datasets for their business functions. In our early days, we were, like most start-ups, fairly laissez faire with our access to data - solely focused on moving fast. But as we expanded into the North American market, we faced new regulatory requirements. We introduced new growth strategies such as personalized assessments and consultations which meant we had more consumer health data. Almost 80% of our data lands up in Snowflake, and it started to get unwieldy. 

Like most companies today, data is our competitive advantage. We know we have to do things differently to secure it before becoming an impediment to business growth. That’s when we partnered with Acante. There were three key business drivers that we wanted to achieve through our Acante deployment: 

  • Compliance & Privacy: every new market we enter introduces new compliance requirements. Foundationally, it became critical for us to have a firm handle on where we have PII data - in S3, Snowflake, RDS or some other data cloud platform. Right from the start, Acante put together a Proof of Value that fit our data security needs. Having a highly automated data discovery engine is critical, and they delivered on this quickly. Plus, for the prescription data we are collecting, we could be diligent about tracking that PHI data continuously in Acante.
  • Managing Proliferation of Access to Data: Most IAM and identity-centric security solutions have no context of the data, its sensitivity or schemas. Acante emerged as the most effective option we saw that would allow us to maintain discipline in our access privileges to data. They integrate right into our access provisioning workflows via Slack and JIRA – providing the relevant data risk context so we can approve data access without much back and forth. Acante gives us a complete, accurate view of where our data lies, who has access to it and why. This really helps us ensure our PII data is always properly segregated and makes our data access reviews much less taxing. At the same time, our data engineers and other consumers are happy about getting faster access to data.
  • Preventing Data Leakage: our data teams are running a variety of queries, dashboard, analytical pipelines and notebooks with customer behavior models on the data. These workloads are becoming the new APIs for data leakage. We wanted to make sure we monitored these pathways for data leakage before we have a serious incident – not after the fact.

A data-focused approach to security

Before onboarding with Acante, we looked at the plethora of cloud security tooling available. While useful, we realized most of the other solutions’ focus lies around protecting applications and their underlying infrastructure. Acante gave us the opportunity to rethink our security strategy and implement a data-centric model. Being a largely distributed workforce, overinvesting in perimeter and infrastructure-centric security makes less sense for our business model and makes it harder to protect our most valuable assets – our data.

As we move forward, we’ll look at integrating Acante’s least-privilege remediations into our data access review workflows so we can achieve and maintain a “just right” access posture while ensuring productivity of our data teams. We are excited about using advanced data sharing capabilities in Snowflake (Data Exchange), knowing that Acante will have the security visibility and compliance considerations covered. We believe in their vision to unlock the benefits of the data cloud without compromising on the security and privacy of our data. 

Unveiling the Challenge

As our digital footprint expands, so do the challenges of securing our data assets. Acante.ai recognizes the exponential proliferation and constant change in data access patterns, creating blind spots for traditional security approaches.

The Acante.ai Difference

At Acante.ai, our approach to data security marks a paradigm shift in the industry. Unlike traditional security models that often succumb to the static nature of data threats, Acante.ai thrives on dynamism. We believe that true security evolves with the challenges, and that's precisely what sets us apart. The Acante.ai difference lies in our commitment to providing security teams with more than just a shield; we offer a strategic ally that anticipates, adapts, and fortifies against the unpredictable proliferation of data access patterns. Our solution doesn't just keep pace with the digital transformation journey; it propels it forward. But what truly defines the Acante.ai difference goes beyond technology; it's ingrained in our culture. We are a collective of thoughtful, compassionate, and collaborative individuals on a shared mission to disrupt the security industry. With deep expertise from major brands and startups, we've collectively built over 10 startups, resulting in category-creating businesses, acquisitions, and IPOs. Our success is a testament to the collaborative spirit within our team, where every member contributes to shaping our culture and the future of data security. Join Acante.ai, and experience the difference that drives us to redefine the limits of protection in the digital age.

Dynamic Data Security

Explore the cutting-edge realm of dynamic data security with Acante.ai. In an era where the digital landscape is in a perpetual state of flux, Acante.ai's comprehensive approach to data security becomes not just a solution but a strategic imperative. Imagine a security system that not only reacts to the ever-changing data access patterns but anticipates and adapts in real-time. This level of sophistication is what sets Acante.ai apart. Our solution not only seamlessly integrates with the native controls of your data lakes and warehouse ecosystems but also evolves with them. It's not just about protecting your data; it's about empowering it. Acante.ai's dynamic data security solution is not confined by static parameters; it's a living, breathing shield that moves in harmony with the pulse of your data. As businesses navigate the complexities of the modern data landscape, Acante.ai provides not just a safeguard but a strategic ally, ensuring that security is not a hindrance but an enabler of progress.

Conclusion

In a world where data is both a valuable asset and a potential liability, Acante.ai emerges as a beacon of innovation. Join us on this exploration of the future of data security and discover how Acante.ai is empowering organizations to navigate the evolving landscape with confidence.
Request a Demo
The Next Wave of AI Safety Needs to Focus on Data Governanceimage
The Next Wave of AI Safety Needs to Focus on Data Governance

The path to AI success requires organizations to unlock the value of their proprietary data, but in order to do that, they need to ensure that the data they feed into these AI systems, including LLMs, is secure.

Acante Announces Partnership with Commvault to Bring Together the Best of Data Access Governance and Protection for Enterprise Cloud Dataimage
Acante Announces Partnership with Commvault to Bring Together the Best of Data Access Governance and Protection for Enterprise Cloud Data

Seamless integration with Commvault Cloud provides unparalleled cyber resilience in the face of growing ransomware attacks and breaches

AI Risk Starts with Data Risk: DBTA Data Summit Keynote Summaryimage
AI Risk Starts with Data Risk: DBTA Data Summit Keynote Summary

What the first wave of AI security efforts are missing, and how the Data Layer is where new and critical security and privacy concerns need to be addressed.

Databricks has open sourced Unity Catalog: What that means for the ecosystemimage
Databricks has open sourced Unity Catalog: What that means for the ecosystem

Our point of view on why we need unified governance for Data and AI and why we are excited about Databricks releasing Unity Catalog as open source.

Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Time to rethink the relationship between data and security in the modern data cloud

It’s an amazing time to build and grow a business. Good Health Company (GHC) is a rapidly expanding global health and wellness brand. At GHC, we have always wanted to grow, and grow fast - we have expanded quickly from India to multiple global markets including North America. 

Using the cloud (AWS in our case) to get set up and scale up on demand has become commonplace, and we are no different. Growing successfully at this pace has required us to adapt fast with sound data-driven decisions. The data cloud has evolved to provide a host of data platforms that put powerful analytics at our fingertips. Our applications, our analytical infrastructure and our recommendation systems are all powered by these data cloud platforms such as S3, Mongo Atlas, Snowflake and others – allowing us to operate with tremendous speed and automation.

Data Cloud brings security challenges 

Today, multiple teams across marketing, supply chain operations, finance, engineering and other stakeholders across GHC leverage various datasets for their business functions. In our early days, we were, like most start-ups, fairly laissez faire with our access to data - solely focused on moving fast. But as we expanded into the North American market, we faced new regulatory requirements. We introduced new growth strategies such as personalized assessments and consultations which meant we had more consumer health data. Almost 80% of our data lands up in Snowflake, and it started to get unwieldy. 

Like most companies today, data is our competitive advantage. We know we have to do things differently to secure it before becoming an impediment to business growth. That’s when we partnered with Acante. There were three key business drivers that we wanted to achieve through our Acante deployment: 

  • Compliance & Privacy: every new market we enter introduces new compliance requirements. Foundationally, it became critical for us to have a firm handle on where we have PII data - in S3, Snowflake, RDS or some other data cloud platform. Right from the start, Acante put together a Proof of Value that fit our data security needs. Having a highly automated data discovery engine is critical, and they delivered on this quickly. Plus, for the prescription data we are collecting, we could be diligent about tracking that PHI data continuously in Acante.
  • Managing Proliferation of Access to Data: Most IAM and identity-centric security solutions have no context of the data, its sensitivity or schemas. Acante emerged as the most effective option we saw that would allow us to maintain discipline in our access privileges to data. They integrate right into our access provisioning workflows via Slack and JIRA – providing the relevant data risk context so we can approve data access without much back and forth. Acante gives us a complete, accurate view of where our data lies, who has access to it and why. This really helps us ensure our PII data is always properly segregated and makes our data access reviews much less taxing. At the same time, our data engineers and other consumers are happy about getting faster access to data.
  • Preventing Data Leakage: our data teams are running a variety of queries, dashboard, analytical pipelines and notebooks with customer behavior models on the data. These workloads are becoming the new APIs for data leakage. We wanted to make sure we monitored these pathways for data leakage before we have a serious incident – not after the fact.

A data-focused approach to security

Before onboarding with Acante, we looked at the plethora of cloud security tooling available. While useful, we realized most of the other solutions’ focus lies around protecting applications and their underlying infrastructure. Acante gave us the opportunity to rethink our security strategy and implement a data-centric model. Being a largely distributed workforce, overinvesting in perimeter and infrastructure-centric security makes less sense for our business model and makes it harder to protect our most valuable assets – our data.

As we move forward, we’ll look at integrating Acante’s least-privilege remediations into our data access review workflows so we can achieve and maintain a “just right” access posture while ensuring productivity of our data teams. We are excited about using advanced data sharing capabilities in Snowflake (Data Exchange), knowing that Acante will have the security visibility and compliance considerations covered. We believe in their vision to unlock the benefits of the data cloud without compromising on the security and privacy of our data. 

The Next Wave of AI Safety Needs to Focus on Data Governanceimage
The Next Wave of AI Safety Needs to Focus on Data Governance

The path to AI success requires organizations to unlock the value of their proprietary data, but in order to do that, they need to ensure that the data they feed into these AI systems, including LLMs, is secure.

Acante Announces Partnership with Commvault to Bring Together the Best of Data Access Governance and Protection for Enterprise Cloud Dataimage
Acante Announces Partnership with Commvault to Bring Together the Best of Data Access Governance and Protection for Enterprise Cloud Data

Seamless integration with Commvault Cloud provides unparalleled cyber resilience in the face of growing ransomware attacks and breaches

AI Risk Starts with Data Risk: DBTA Data Summit Keynote Summaryimage
AI Risk Starts with Data Risk: DBTA Data Summit Keynote Summary

What the first wave of AI security efforts are missing, and how the Data Layer is where new and critical security and privacy concerns need to be addressed.

Databricks has open sourced Unity Catalog: What that means for the ecosystemimage
Databricks has open sourced Unity Catalog: What that means for the ecosystem

Our point of view on why we need unified governance for Data and AI and why we are excited about Databricks releasing Unity Catalog as open source.

Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now