• Industry News
  • CXO Spotlight
  • AI
  • Enterprise Security

 Back to New Tab

Sovereign 'Data by Design' Reshapes the Enterprise Network

Island News Desk
October 15, 2025
Enterprise Security

Vinay Prabhu, VP of Product at Graphiant, explains why enterprises are shifting to a unified network approach that integrates security and connectivity to support data sovereignty.

Credit: Outlever

A country's sovereignty doesn't stop at its physical borders. It extends to its people through embassies abroad. Data is your most valuable asset, and it deserves the same level of protection. Its defenses must follow it wherever it goes.

For decades, enterprise networks were stitched together like a fragile patchwork. Companies purchased point solutions for every problem: SD-WAN for connectivity, firewalls for security, and a half-dozen other tools for the cloud. The result was a "bolt-on" architecture where security was an afterthought and teams were pitted against each other.

But that model is cracking. Today's data no longer resides within neat geographic boundaries. It flows across clouds, partner networks, and ravenous AI models, demanding protection that can travel with it. Now, the new imperative is "sovereignty by design," a radical shift where security and connectivity are co-engineered into a single, intelligent fabric.

Some of the calls to rethink this model are coming from one of its original architects. Vinay Prabhu, Vice President of Products at the network-as-a-service platform Graphiant, helped build the SD-WAN wave at firms like Viptela and Cisco. He says enterprises must adopt an entirely new mindset to secure their future.

  • Assume breach: Start looking beyond areas that traditional tools cover, like data at rest and in processing, Prabhu advises. Instead, leaders can turn their attention to the most neglected and vulnerable state: data in motion. "Assume you've been breached. The immediate question is no longer if you're secure, but what is the blast radius? You must be able to instantly find out what was impacted and how far the damage extends."

The philosophy reframes everything from prevention to resilience. Before you can protect your data, you must be able to see it first, Prabhu explains. More than an asset, modern data is a sovereign entity. For him, that makes a foundation of visibility even more essential.

  • The data embassy: Where compute power may not exist in the data's home jurisdiction, a "data embassy" can address the practical business need to move data across borders for functions like AI model training. "A country's sovereignty doesn't stop at its physical borders. It extends to its people through embassies abroad. Data is your most valuable asset, and it deserves the same level of protection. Its defenses must follow it wherever it goes."

The "data embassy" is a direct response to the escalating reality of global regulation, Prabhu says. Frameworks like the European Union's GDPR, Canada's Digital Charter, and India's data localization laws are proof that sovereignty obligations now follow data across the globe. This pressure is colliding with a technical explosion driven by AI, he continues. Here, the primary consumer of data is a distributed AI agent. To enforce sovereignty in this new reality, policy alone is not enough.

  • Architecture as enforcement: Prabhu's approach also eliminates the risk of accidental breaches caused by human error, like a simple routing misconfiguration, that unintentionally sends sovereign data to a forbidden jurisdiction. "True enforcement isn't a firewall rule that says, 'You can't go there.' It's designing the network so that no information highway to a non-compliant region even exists. Even if a request is made, the network should make it impossible to get there because the path itself was never built."

The foundation of his vision is verifiable trust. In the old world, security was a promise, he says. But in the new world, it must be a provable reality.

  • Assurance you can see: Verifiable tracking replaces the hollow guarantees offered by a fragmented collection of security products without a unified view of the data's journey. "You wouldn't put your family in a ride-sharing vehicle if the app just promised a safe journey. You trust it because you can track the car on a map in real time. An empty assurance has no weight. It's meaningless if you can't actually see it take place."

But how is this level of visibility achieved without creating new vulnerabilities? The key is unifying the network so telemetry can be streamed passively, without decrypting traffic as it crosses public domains. Here, the network provider remains "stateless," with no knowledge of the data itself, like a courier who knows the route but cannot open the package.

Ultimately, achieving this new standard of trust requires dissolving the artificial barriers between functions, Prabhu concludes. Infrastructure strategy and security strategy can no longer operate in separate silos. Instead, they must merge into a unified vision where the network is intelligent, observable, and secure by its very nature. "Connectivity, observability, and security. They all go hand in hand."

Related content

Agentic AI Browsers Shift the Security Focus to Cultural Vulnerabilities

Joseph Sack, CEO of Smart Tech Solution LLC, explains why the primary security risk for agentic AI browsers is human behavior and how defensive AI tools can help.

Agentic AI Browsers Are Rewriting the Rules of Information Discovery and Trust

Firas Jarboui, Head of Machine Learning at Gorgias, explains how to secure Agentic AI browsers by gating actions and segregating context from workflows.

AI Browsers Need Real Oversight to Earn Enterprise Trust

Mikhail Vasilyev, a Principal Software Development Engineer at Workday, explains why AI browsers need strict visibility, containment, and auditability before enterprise use.

You might also like

See all →
AI Browsers Need Real Oversight to Earn Enterprise Trust
Island's Solutions Engineering Director on Overcoming Resistance to Public Sector Modernization
AI and the Evolving Face of Social Engineering: A Call for Smarter, Connected Defense
Powered by Island.
© ISLAND, 2025. All rights reserved