Acante is re-imagining secure data access for the modern data stack

Five key learnings from Acante customers about addressing the constantly evolving data attack surface. Understand his vision for giving organizations a unique opportunity to reset and rethink how they can provide security for today's modern data stack.

December 20, 2023
-
Ranga Rangachari, CEO, Acante

It’s no secret that I’m a startup guy. I love the closeness and camaraderie of a small team. I love whiteboarding until the wee hours of the night, determined to solve the issue at hand. I love the passion of a founding team of visionaries. But most of all, I love the unencumbered innovation. Startups have the freedom to discover, explore and solve real customer problems that inhibit business potential.

 

From Legato to Invio to Redhat over the past three decades, I’ve worked across multiple layers of the modern data stack. I have seen the shift from on-premises data center storage to cloud-delivered data platforms to today’s AI-driven data services. Data is no longer a backend function. Today, data is the product, and companies are racing to extract the tremendous value locked up in their data.There hasn’t been a more exciting time to be part of the data tooling ecosystem.

 

Like every “gold rush”, the modern data stack is going through a period of profound chaos - specifically around the need to secure the underlying data. Securing expanding threat surfaces and meeting compliance mandates are proving to be increasingly complex, labor intensive and expensive. Foreseeing this blocker to innovation, I co-founded Acante with Uday, Abhishek, Advait and Dhruv. We’re re-imagining data security for the modern data stack, so organizations can continue to innovate without compromise.

 

Since founding the company, we’ve met with more than 100 customers and prospects, folks up and down the IT stack who are rethinking how they provide access to data to the right user at the right time for the right use. Along the way, we discovered some interesting (and surprising) insights and some core principles that have guided our product development. While digital transformation and the cloud have evolved how business applications are delivered, we are in the early stages of this new data-driven economy. And we are just beginning to understand the new requirements this creates.

Here are a few key insights:

 

1. Data-driven business agility is at risk of becoming a liability

The sheer amount of data that organizations are gathering, the multitude of platforms they use to process and transform it, and the wide-ranging scope of their data initiatives — from customer experience to generative AI — is creating turbulence throughout operations. Unfortunately, complexity is the enemy of security. Organizations are struggling to know exactly who is accessing what data and for what reason. 

In order to truly capitalize on data-driven transformation, organizations need to regain visibility and control into their data access and use. 

 

2. Data teams need to be part of the data security solution

Many of our early conversations with customers opened our eyes to this dynamic. We’d set up a meeting with the security team, and inevitably, they’d pull in the data owners. We’d then spend most of our time with them, hashing out how we can help them deliver on their mission without increasing risk. It made us realize that security teams are looking to define and maintain the data security framework. Just like application owners are responsible for securing their applications, they want data owners to be accountable for the security of their data. 

For us, this meant that they need security solutions that are built specifically for data teams and that work seamlessly with their data tooling ecosystem.

 

3. Security should be measured through a business lens

It is clear that the role of the CISO is changing. They are no longer measured only on how many threats they’ve stopped or whether they’ve delivered on compliance requirements. Forward-leaning security leaders are now taking on more of a business role within the organization. They are measuring themselves on KPIs such as, “Can I quantify the risk to my crown jewels - my critical data?” “How long does it take us to grant access to data?” and “What is the time / cost associated with demonstrating compliance?” If security is all that matters, then the most secure data would be locked in a bunker one mile below the surface of the earth. But that would render the data pretty useless. 

Security leaders are increasingly making compliance and risk-weighted data access decisions in accordance with business objectives.

 

4. The data-centric transformation of business is an opportunity to rethink security

Remember the days when the first thing a security team would do was to deploy a firewall? Those were different times. Today, it’s all about data: where it lives, where it goes, who needs it and why they need it. And you can’t apply yesterday’s best practices, tools, processes and skills to today’s reality. 

We have an opportunity to fundamentally change how we secure the organization with a data-centric security approach that provides an order of magnitude higher ROI for their security investments. A security model that focuses not on securing the infrastructure but on directly securing the data and data access. 

 

5. Any friction slows the product adoption journey

Engineering teams want to move, and move fast. They don’t want to wait for days to get access to their data. They don’t want products that take days to learn and deploy. They don’t want long complex sales cycles. They don’t want products that require a headcount to maintain. Security teams want to enable agility and provide their engineering teams with the tooling that allows them to move fast without sacrificing security. 

They love products that are easy to trial and get going in minutes. Tools that integrate seamlessly with existing workflows. And products that quickly drive up productivity. Eliminating friction at every stage of the customers’ product adoption journey needs to be at the center of our every product development decision. 

 

I’d love to hear from you

The world of data security is radically changing, giving organizations a unique opportunity to reset and rethink how they can provide security across an ever-expanding attack surface. This is why we founded Acante and what we’ll be focusing on in the years ahead. We’ve brought on board some stellar business advisors and investors – including Clear Ventures – on this journey who are going to help us focus our efforts on securing and enabling the data-driven business. Please, I urge you to reach out at any time to discuss how secure data access can become an enabler of innovation and productivity.  Email ranga at acante dot ai.

Unveiling the Challenge

As our digital footprint expands, so do the challenges of securing our data assets. Acante.ai recognizes the exponential proliferation and constant change in data access patterns, creating blind spots for traditional security approaches.

The Acante.ai Difference

At Acante.ai, our approach to data security marks a paradigm shift in the industry. Unlike traditional security models that often succumb to the static nature of data threats, Acante.ai thrives on dynamism. We believe that true security evolves with the challenges, and that's precisely what sets us apart. The Acante.ai difference lies in our commitment to providing security teams with more than just a shield; we offer a strategic ally that anticipates, adapts, and fortifies against the unpredictable proliferation of data access patterns. Our solution doesn't just keep pace with the digital transformation journey; it propels it forward. But what truly defines the Acante.ai difference goes beyond technology; it's ingrained in our culture. We are a collective of thoughtful, compassionate, and collaborative individuals on a shared mission to disrupt the security industry. With deep expertise from major brands and startups, we've collectively built over 10 startups, resulting in category-creating businesses, acquisitions, and IPOs. Our success is a testament to the collaborative spirit within our team, where every member contributes to shaping our culture and the future of data security. Join Acante.ai, and experience the difference that drives us to redefine the limits of protection in the digital age.

Dynamic Data Security

Explore the cutting-edge realm of dynamic data security with Acante.ai. In an era where the digital landscape is in a perpetual state of flux, Acante.ai's comprehensive approach to data security becomes not just a solution but a strategic imperative. Imagine a security system that not only reacts to the ever-changing data access patterns but anticipates and adapts in real-time. This level of sophistication is what sets Acante.ai apart. Our solution not only seamlessly integrates with the native controls of your data lakes and warehouse ecosystems but also evolves with them. It's not just about protecting your data; it's about empowering it. Acante.ai's dynamic data security solution is not confined by static parameters; it's a living, breathing shield that moves in harmony with the pulse of your data. As businesses navigate the complexities of the modern data landscape, Acante.ai provides not just a safeguard but a strategic ally, ensuring that security is not a hindrance but an enabler of progress.

Conclusion

In a world where data is both a valuable asset and a potential liability, Acante.ai emerges as a beacon of innovation. Join us on this exploration of the future of data security and discover how Acante.ai is empowering organizations to navigate the evolving landscape with confidence.
Request a Demo
The Next Wave of AI Safety Needs to Focus on Data Governanceimage
The Next Wave of AI Safety Needs to Focus on Data Governance

The path to AI success requires organizations to unlock the value of their proprietary data, but in order to do that, they need to ensure that the data they feed into these AI systems, including LLMs, is secure.

Acante Announces Partnership with Commvault to Bring Together the Best of Data Access Governance and Protection for Enterprise Cloud Dataimage
Acante Announces Partnership with Commvault to Bring Together the Best of Data Access Governance and Protection for Enterprise Cloud Data

Seamless integration with Commvault Cloud provides unparalleled cyber resilience in the face of growing ransomware attacks and breaches

AI Risk Starts with Data Risk: DBTA Data Summit Keynote Summaryimage
AI Risk Starts with Data Risk: DBTA Data Summit Keynote Summary

What the first wave of AI security efforts are missing, and how the Data Layer is where new and critical security and privacy concerns need to be addressed.

Databricks has open sourced Unity Catalog: What that means for the ecosystemimage
Databricks has open sourced Unity Catalog: What that means for the ecosystem

Our point of view on why we need unified governance for Data and AI and why we are excited about Databricks releasing Unity Catalog as open source.

Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Acante is re-imagining secure data access for the modern data stack

It’s no secret that I’m a startup guy. I love the closeness and camaraderie of a small team. I love whiteboarding until the wee hours of the night, determined to solve the issue at hand. I love the passion of a founding team of visionaries. But most of all, I love the unencumbered innovation. Startups have the freedom to discover, explore and solve real customer problems that inhibit business potential.

 

From Legato to Invio to Redhat over the past three decades, I’ve worked across multiple layers of the modern data stack. I have seen the shift from on-premises data center storage to cloud-delivered data platforms to today’s AI-driven data services. Data is no longer a backend function. Today, data is the product, and companies are racing to extract the tremendous value locked up in their data.There hasn’t been a more exciting time to be part of the data tooling ecosystem.

 

Like every “gold rush”, the modern data stack is going through a period of profound chaos - specifically around the need to secure the underlying data. Securing expanding threat surfaces and meeting compliance mandates are proving to be increasingly complex, labor intensive and expensive. Foreseeing this blocker to innovation, I co-founded Acante with Uday, Abhishek, Advait and Dhruv. We’re re-imagining data security for the modern data stack, so organizations can continue to innovate without compromise.

 

Since founding the company, we’ve met with more than 100 customers and prospects, folks up and down the IT stack who are rethinking how they provide access to data to the right user at the right time for the right use. Along the way, we discovered some interesting (and surprising) insights and some core principles that have guided our product development. While digital transformation and the cloud have evolved how business applications are delivered, we are in the early stages of this new data-driven economy. And we are just beginning to understand the new requirements this creates.

Here are a few key insights:

 

1. Data-driven business agility is at risk of becoming a liability

The sheer amount of data that organizations are gathering, the multitude of platforms they use to process and transform it, and the wide-ranging scope of their data initiatives — from customer experience to generative AI — is creating turbulence throughout operations. Unfortunately, complexity is the enemy of security. Organizations are struggling to know exactly who is accessing what data and for what reason. 

In order to truly capitalize on data-driven transformation, organizations need to regain visibility and control into their data access and use. 

 

2. Data teams need to be part of the data security solution

Many of our early conversations with customers opened our eyes to this dynamic. We’d set up a meeting with the security team, and inevitably, they’d pull in the data owners. We’d then spend most of our time with them, hashing out how we can help them deliver on their mission without increasing risk. It made us realize that security teams are looking to define and maintain the data security framework. Just like application owners are responsible for securing their applications, they want data owners to be accountable for the security of their data. 

For us, this meant that they need security solutions that are built specifically for data teams and that work seamlessly with their data tooling ecosystem.

 

3. Security should be measured through a business lens

It is clear that the role of the CISO is changing. They are no longer measured only on how many threats they’ve stopped or whether they’ve delivered on compliance requirements. Forward-leaning security leaders are now taking on more of a business role within the organization. They are measuring themselves on KPIs such as, “Can I quantify the risk to my crown jewels - my critical data?” “How long does it take us to grant access to data?” and “What is the time / cost associated with demonstrating compliance?” If security is all that matters, then the most secure data would be locked in a bunker one mile below the surface of the earth. But that would render the data pretty useless. 

Security leaders are increasingly making compliance and risk-weighted data access decisions in accordance with business objectives.

 

4. The data-centric transformation of business is an opportunity to rethink security

Remember the days when the first thing a security team would do was to deploy a firewall? Those were different times. Today, it’s all about data: where it lives, where it goes, who needs it and why they need it. And you can’t apply yesterday’s best practices, tools, processes and skills to today’s reality. 

We have an opportunity to fundamentally change how we secure the organization with a data-centric security approach that provides an order of magnitude higher ROI for their security investments. A security model that focuses not on securing the infrastructure but on directly securing the data and data access. 

 

5. Any friction slows the product adoption journey

Engineering teams want to move, and move fast. They don’t want to wait for days to get access to their data. They don’t want products that take days to learn and deploy. They don’t want long complex sales cycles. They don’t want products that require a headcount to maintain. Security teams want to enable agility and provide their engineering teams with the tooling that allows them to move fast without sacrificing security. 

They love products that are easy to trial and get going in minutes. Tools that integrate seamlessly with existing workflows. And products that quickly drive up productivity. Eliminating friction at every stage of the customers’ product adoption journey needs to be at the center of our every product development decision. 

 

I’d love to hear from you

The world of data security is radically changing, giving organizations a unique opportunity to reset and rethink how they can provide security across an ever-expanding attack surface. This is why we founded Acante and what we’ll be focusing on in the years ahead. We’ve brought on board some stellar business advisors and investors – including Clear Ventures – on this journey who are going to help us focus our efforts on securing and enabling the data-driven business. Please, I urge you to reach out at any time to discuss how secure data access can become an enabler of innovation and productivity.  Email ranga at acante dot ai.

The Next Wave of AI Safety Needs to Focus on Data Governanceimage
The Next Wave of AI Safety Needs to Focus on Data Governance

The path to AI success requires organizations to unlock the value of their proprietary data, but in order to do that, they need to ensure that the data they feed into these AI systems, including LLMs, is secure.

Acante Announces Partnership with Commvault to Bring Together the Best of Data Access Governance and Protection for Enterprise Cloud Dataimage
Acante Announces Partnership with Commvault to Bring Together the Best of Data Access Governance and Protection for Enterprise Cloud Data

Seamless integration with Commvault Cloud provides unparalleled cyber resilience in the face of growing ransomware attacks and breaches

AI Risk Starts with Data Risk: DBTA Data Summit Keynote Summaryimage
AI Risk Starts with Data Risk: DBTA Data Summit Keynote Summary

What the first wave of AI security efforts are missing, and how the Data Layer is where new and critical security and privacy concerns need to be addressed.

Databricks has open sourced Unity Catalog: What that means for the ecosystemimage
Databricks has open sourced Unity Catalog: What that means for the ecosystem

Our point of view on why we need unified governance for Data and AI and why we are excited about Databricks releasing Unity Catalog as open source.

Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now
Nam quis nulla. Integer malesuada. In in enim a arcu imperdiet malesuada. Sed vel lectus. Donec odio urna, tempus molestie, porttitor ut, iaculis quis
Read now