In the world of cybersecurity, there's a revolution happening right before our eyes. The center of gravity is shifting—moving away from traditional network perimeters and decisively toward what truly matters: the data itself.
The evidence is undeniable. In just the past month alone, we've witnessed a remarkable cascade of market validation:
When CrowdStrike and Palo Alto both acquire early stage DSPM players – it’s easy to see how the most sophisticated security platforms are racing to consolidate control planes closer to the data itself. And, when cloud data platforms like Databricks and Snowflake—who quite literally have their fingers on the pulse of enterprise data flows—are investing in specialized data security, the market is clearly speaking.
But what exactly is driving the rising tide of data centric security?
Traditional security has failed us. For decades, we've invested billions in building impenetrable walls around our networks, only to watch breach after devastating breach demonstrate the fundamental flaw in this approach: data doesn't stay put.
The shift to cloud, AI, and distributed workforces means our most valuable assets—our data—moves constantly between applications, cloud services, partner domains, and devices. In this new reality, perimeter-based security is like building a fortress around a ghost town; the crown jewels have already left the building.
This is why zero trust architectures have gained such prominence. The fundamental premise—never trust, always verify—acknowledges this new reality. But implementing zero trust correctly requires us to rethink security from the outside in, with data at the center.
The market explosion we're witnessing centers around a critical realization: data security requires a two-sided approach that goes beyond simple classification and discovery.
The first side—represented by companies like Cyera, Varonis, and Rubrik—excels at the defensive aspects of data security:
This defensive approach is absolutely essential, and the market validation we're seeing confirms it. However, it's only half the picture.
The second side of data security—where Virtru has pioneered innovation—focuses on enabling organizations to proactively and confidently share data without sacrificing security or control:
This "offensive" approach to data security is powered by our implementation of the Trusted Data Format (TDF), an open standard that embeds security and policy controls directly into data objects themselves.
In today's data-driven economy, organizations can't afford to just play defense. Data creates value only when it's used, shared, and analyzed—when it's in motion. Restricting data to prevent loss may prevent breaches, but it also prevents innovation and collaboration.
The companies thriving in this new landscape understand a fundamental truth: security must enable business, not impede it.
Rather than seeing these approaches as competing philosophies, forward-thinking security leaders are implementing them as complementary layers in a comprehensive data security lifecycle:
The timing of this market explosion is no coincidence. Several forces have converged to make data-centric security the most compelling segment in cybersecurity:
As this market continues to mature, we believe strongly that open standards like TDF will become increasingly central to comprehensive data security strategies. Proprietary approaches create silos and friction that ultimately undermine security by fragmenting control.
The Trusted Data Format, originally developed by Virtru co-founder Will Ackerly during his time at the NSA, is an emerging open standard adopted by NATO and the FVEYS and there’s also an open project that provides the foundation for true data-centric security. By embedding policy controls, encryption, and access rights directly into data objects, TDF ensures that security travels with the data itself..
The extraordinary market activity we're witnessing around data security underscores the critical importance of getting data security right.
The most sophisticated organizations are realizing that comprehensive data security requires both defensive and offensive capabilities. They need to protect sensitive information from theft or loss – and also create agency over data so it can be shared with others.
At Virtru, we're proud to play our role in this revolution, providing the open standard-based controls that enable organizations to share data confidently, knowing their security travels with their data wherever it goes. As the market continues to validate the importance of data-centric security, we remain committed to our mission: giving organizations true sovereignty over their most valuable asset—their data.
A proven executive and entrepreneur with over 25 years experience developing high-growth software companies, Matt serves as Virtu’s CMO and leads all aspects of the company’s go-to-market motion within the data protection and Zero Trust security ecosystems.
View more posts by Matt HowardSee Virtru In Action
Sign Up for the Virtru Newsletter
Contact us to learn more about our partnership opportunities.