On Data Privacy Day – January 28, 2020 – Data Masking is in the Spotlight
By: Mohie Ahmed
Data Privacy Day is held on the 28th of January every year, and is designed to raise awareness among businesses, governments, and other organizations on not only the right to privacy, but the responsibility associated with protecting the data of customers, citizens and consumers.
Data security and privacy have become a fundamental aspect of our connected world. We now regard the protection of people’s personal information as a human right. Most organizations have accepted that, as custodians of data, they bear the critical responsibility of ensuring personal information is protected.
Any organization’s security is only as strong as their weakest entry point. This includes internal data environments which, left unprotected, represent a huge risk.
On Data Privacy Day this year, the Ironsphere team is focused especially on data masking, which protects data and ensures businesses not only protect sensitive information, but also comply with regulations.
Nonintrusive data masking supports mixed IT environments without the need to modify specific applications or datasets. Done properly, data masking complements adjacent data security controls such as encryption and tokenization without the need to modify settings or configurations.
The most critical and sensitive enterprise data such as customer information, financial information, individual employee information, critical asset information and more is stored in databases.
Therefore, the security of these databases is of the utmost importance. Not only are internal security requirements imperative, but without taking additional measures to protect these databases, companies may not be in line with regulations governing compliance within their industry.
Some of these include: Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA) and General Data Protection Regulation (GDPR). These regulations and others around the world are aimed at protecting data from abuse, preventing fraud and maintaining privacy.
According to breachlevelindex.com, every second of the day, sixty-one data records (almost two billion records per year) are lost or stolen.
These numbers prove that there is not one singular and simple way of securing data. There are different dimensions of how to secure databases such as eliminating the sharing of local account credentials (sys, sysadm, system, root, etc.), eliminating database account credentials that are embedded in application scripts or configuration files, and indisputably logging DB admin and user actions, among others.
Ironsphere’s platform routinely implements these best practices to defend against insider threats.
One innovative solution in test environments is to provide fictitious but representative and coherent data instead of real sensitive data. This means that data must be masked in real-time and in such a way that it is still useful but not sensitive anymore.
Ironsphere’s unique data masking solution supports real-time masking rules include redaction, nulling, shuffling, blurring, tokenization and substitution of sensitive data in SQL accessed databases. These real-time masking rules can be used when some users/applications need to be prevented from seeing sensitive data or in application development, test and training environments where not “real” but “synthetic and realistic data” is required.
Ironsphere offers the first and the only PAM solution in the market with dynamic data masking in addition to its other powerful features; at Ironsphere we continue to work hard to innovate in order to enable our customers to “Protect What They Connect”, without compromising operational efficiency.
Data can be de-identified and de-sensitized so that sensitive information is anonymous when used for support, analytics, testing, or outsourcing.
Key features include:
- Precision for data privacy laws: Any combination of personal, health, or credit information can be anonymized to comply with complex cross-border privacy laws and regulations.
- Powerful masking capabilities: A range of masking functions is repeatable across systems to ensure business processes are reliable and precise.
- Performance: Dynamic data masking’s high-speed engine ensures no impact on user throughput. Persistent data masking can scale to mask terabytes of data for large test, outsourcing, or analytic projects.
- Role-based masking: Dynamic data masking accommodates data security and privacy policies that vary depending on users’ locations.
- Data connectivity: Take advantage of comprehensive integrations and connectors with a wealth of Informatica connectors to on-premises and cloud data sources.
- Monitoring and compliance reporting: Data security and privacy professionals can validate that identified sensitive data has been masked to meet security and privacy policies.
While this is just one aspect of comprehensive security measures, it is increasingly important and we’re proud to have developed and to promote our solution as part of Privacy Day 2020.
As Cyber Attacks Grow, Data Center Operators Can Bring Value-Added Services to Enterprises Leveraging Cloud-Based Access Management Services
No threat facing businesses today has grown as fast, or in a manner as difficult to understand, as the danger from cyberattacks. Cyber threats are increasing in both volume and sophistication, and as the world continues to become more digital with every passing day, cyber threats will only keep growing in both aspects. As a result, organizations today are turning to robust cybersecurity solutions, such as Privileged Access Management (PAM), to keep both their data and their customer’s data safe.
Privileged Access Management as a Service: An Exciting new Value-Added Service for Data Center Service Providers
Given the increasing complexity of compliance, and the growing risk of data breaches, even as public cloud, hybrid cloud, and multi-cloud solutions are being implemented, businesses of all sizes need support in protecting what they connect, and many count on their data center providers for guidance and solutions.
How Secure Are VPNs? Given Increasing Successful Attacks, It’s Time to Take a Hard Look at PAM for Zero Trust Solutions
Since the early 1990s, VPNs (Virtual Private Networks) have been central to providing remote users with access to the corporate network.
Thirty years later, in 2020, when legislation and population health initiatives mandated work-from-home, bad actors recognized and acted upon their massive opportunity to attack VPNs and initiate data theft and ransomware attacks as applications, in the heat of the moment, moved outside the traditional perimeter.