Security First for Data Protection

Security First for Data Protection

One thing is certain about the Cloud – its rapid expansion and adoption by customers is clearly outpacing the technology it works upon.  This is happening to such an extent that protection strategies are now moving swiftly from the old network-centric days, through application-centric models, to a new age where we follow the one constant factor in security design- the data! 

Here at Marathon, we launched our drive to a Security First methodology in late 2019.  If you’ve not already read the whitepaper, you can download it here.   In an interesting development, we’re recently starting to see key vendors, resellers and other channel providers moving in the same direction. 

Here’s a quick update on our key findings and how we’re seeing the landscape change for the channel.


Security vendor McAfee recently used their own data to estimate that more than 40,000 data loss incidents are likely to be missed each month by companies who don’t monitor their cloud services. The inherent problem with data discovery is often that there’s too much to classify and it moves too quickly for us to track it.  

Unfortunately, there isn’t a magic bullet when it comes to discovery.  Yes, you can find a solution that will help, but we’ve found these to be problematic –  you either spend a lot of money and have to buy-in the skills and services to manage it; or try and patch a solution together that may not, in the end, deliver what the customer needs. 

It’s often better to look at services that help your customer get a view on where their data resides and who has access to control it.  This allows them to focus on other projects, whilst we demonstrate to senior management that proactive data security controls are being maintained.


By definition, as edge computing expands and amplifies the surface area of your data, so its attack surface is also increased. There could be more than 20 times as many smart devices at the edge of the network as there are in the core of your infrastructure by 2023, according to Gartner, so the problem is only going to get worse for the customer.

It has been a mixed bag for Edge computing In our view, with a number of benefits and challenges to integrating this into a security first model.  Customers will firstly need to look at the vulnerability of the data in relation to where it is being used.  

We’re also finding that our services are a great way to add skills and experience to the new types of security and compliance challenges that edge computing brings – with teams needing more knowledge in security virtualized network infrastructure, rules-based access control policies and multi-tenant virtualised server infrastructure, for a start. 


Further evidence from the McAfee survey showed that only 31% of companies said that their cloud security tools could enforce the same DLP policies on their devices, their network or cloud services. In order to eliminate these patches in security, which are breeding grounds for compromises and attacks, we need to understand the context and flow of our data across the Cloud, our Devices and the Web.  

We are starting to see more instances of data being shared through collaboration tools and passing between Clouds;  sectors of the market that tend to have less control over which devices have access to cloud services; along with data that suggests companies struggle to discover and remediate a growing number of unsanctioned cloud services. 

The key here is that customers are moving towards a security-led service to bring these together, to deliver a unified picture of data risk and the controls needed to protect it.  

To learn more about Security First, or to book a meeting with one of our pre-sales consultants, give us a call on 020 8329 1000 or email  

Share this post

About Us

Marathon Professional Services is your trusted IT solutions partner. We offer a range of services including Desktop Infrastructure Solutions and Virtualisation, and we act on a white-labelled basis as an extension of your business.