The Great Myth of Data Security

MYTH: Perimeter & Endpoint Security Protects Your Data

FACT: Your Data Will Get Out

You protect your data repository.
You protect your network.
You provide users with visualizations, summaries, and exception analysis.

Yet, thousands of data files are extracted and downloaded from your repository.  These CSV and XLS files reside on your network drives, on employee machines, in the public cloud, and in employees’ email.  These data files are the most vulnerable point of attack for malicious actors.

If you are not securing data files, you are not protecting your data.

Current State of Data Security:

Data security in 2019 is achieved through a series of concentric security perimeters which attempt to ensure that access to data is authorized.  We secure network and application endpoints.  We secure, manage, monitor, and audit access to databases.  We attempt to scan and block content from leaving our perimeter.


But data gets out.  It gets out intentionally when we distribute to partners, vendors, clients.  It gets out for legitimate reasons when managers and analysts drill into the data.  It gets out when we are hacked or otherwise compromised.

We have thousands of data files that are extracts from our databases.  They exist as CSV files, as XLS files, and other delimited file types.  They reside on our network drives, on employee machines, in the public cloud, and in employees’ email.  These files are all potential security concerns.

We address this massive security concern through training employees on corporate data policies.  We instruct how data should be handled, where should it be sent and with whom should it be trusted.



The Exponam .BIG Solution:

Exponam .BIG files are an easy to use alternative to downloaded CSV files.  .BIG files are fully encrypted, ensuring that data files are completely secure anywhere they reside, at rest, in use, and in transit.  Access is controlled via passphrase, token, or multifactor authentication.  Dynamic entitlement is available for further control of sensitive GDPR or HIPAA governed data.

Your data is secure anywhere it resides – at rest, in use, and in transit.

.BIG files are highly compressed, enabling easy download, distribution, and sharing – no matter how many rows of data (thousands, millions, 100s of millions of rows).

.BIG files are easily accessed via a spreadsheet viewer for instant filtering, sorting, and finding data.  Isolated subsets are moved to excel with a single click.  .BIG data is also accessed via JDBC, Java and Windows libraries.


.BIG files are completely tamper-proof and their provenance is guaranteed.  You can be confident that the publisher is genuine, the file properties are accurate, and the data is unaltered.

It is time to learn more.  Contact us for trial information.  

Download this article

How Valuable Is Your Voter Data?

You share filesvoter files, donor lists, supporter data.
It’s how you win elections.

Who do you fear accessing your data?

~ Foreign Agents ~ Domestic Meddlers ~ Other Candidates ~

What happens when your files are stolen or altered?

~ Lost elections ~ Regulatory entanglement ~ Lost donor revenue ~


How secure is your data?  Even if you send data through an encrypted channel, once received it is vulnerable.  “Secure” zip files do not protect you.   CSVs and Excel files sitting on a laptop are not secure.  Unsecured data at rest is a huge concern.

We created .BIGTM data files to enable easy sharing and exploring of data (a few rows or hundreds of millions of rows).  But security was always our primary concern.  Our files are architected to be the most impenetrable data vehicles on the market.

Read about how .BIG files secure data.

And then download the Exponam Explorer to see how easily you can explore large sets of data.

Want to know a little secret?

Data isn’t hard. You don’t need a PhD in Data Science to understand big data. I spent years running reporting services in the finance industry.
The truth? We don’t want to give data to you.


A few reasons:

  • The tools to view, query, and sort large data sets are not made for you. They are made for programmers. If we give you a data set with 10 million records, what are you going to do with it? (Hint: It will probably mean more work for us.)
  • We don’t trust you to draw the correct conclusions from the data. This may be because the data is not “clean.” Maybe we haven’t done as good a job as we should have in storing data.  Maybe we want you to NEED us to provide you with answers.
  • Once you have the data, we don’t know what you might do with it; how you might try to use it; with whom you might (intentionally or unintentionally) share it; or, how you might corrupt it.

No longer.

Exponam .BIGTM files make data sets portable, secure, and tamper-proof. 

The Exponam ExplorerTM makes filtering and sorting data easy and fast. No need to ask your IT group to run queries for you. You don’t need to wait for someone to create custom reports.

We architected Exponam .BIG files to be the most secure data files on the market. (See Free Your Data for more on security.)

It’s your data. Download. Share. Explore.

Find out more. Visit