On Data Privacy Day – January 28, 2020 – Data Masking is in the Spotlight
31
JANUARY 2020
By: Mohie Ahmed
Data Privacy Day is held on the 28th of January every year, and is designed to raise awareness among businesses, governments, and other organizations on not only the right to privacy, but the responsibility associated with protecting the data of customers, citizens and consumers.
Data security and privacy have become a fundamental aspect of our connected world. We now regard the protection of people’s personal information as a human right. Most organizations have accepted that, as custodians of data, they bear the critical responsibility of ensuring personal information is protected.
Any organization’s security is only as strong as their weakest entry point. This includes internal data environments which, left unprotected, represent a huge risk.
On Data Privacy Day this year, the Ironsphere team is focused especially on data masking, which protects data and ensures businesses not only protect sensitive information, but also comply with regulations.
Nonintrusive data masking supports mixed IT environments without the need to modify specific applications or datasets. Done properly, data masking complements adjacent data security controls such as encryption and tokenization without the need to modify settings or configurations.
The most critical and sensitive enterprise data such as customer information, financial information, individual employee information, critical asset information and more is stored in databases.
Therefore, the security of these databases is of the utmost importance. Not only are internal security requirements imperative, but without taking additional measures to protect these databases, companies may not be in line with regulations governing compliance within their industry.
Some of these include: Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA) and General Data Protection Regulation (GDPR). These regulations and others around the world are aimed at protecting data from abuse, preventing fraud and maintaining privacy.
According to breachlevelindex.com, every second of the day, sixty-one data records (almost two billion records per year) are lost or stolen.
These numbers prove that there is not one singular and simple way of securing data. There are different dimensions of how to secure databases such as eliminating the sharing of local account credentials (sys, sysadm, system, root, etc.), eliminating database account credentials that are embedded in application scripts or configuration files, and indisputably logging DB admin and user actions, among others.
Ironsphere’s platform routinely implements these best practices to defend against insider threats.
One innovative solution in test environments is to provide fictitious but representative and coherent data instead of real sensitive data. This means that data must be masked in real-time and in such a way that it is still useful but not sensitive anymore.
Ironsphere’s unique data masking solution supports real-time masking rules include redaction, nulling, shuffling, blurring, tokenization and substitution of sensitive data in SQL accessed databases. These real-time masking rules can be used when some users/applications need to be prevented from seeing sensitive data or in application development, test and training environments where not “real” but “synthetic and realistic data” is required.
Ironsphere offers the first and the only PAM solution in the market with dynamic data masking in addition to its other powerful features; at Ironsphere we continue to work hard to innovate in order to enable our customers to “Protect What They Connect”, without compromising operational efficiency.
Data can be de-identified and de-sensitized so that sensitive information is anonymous when used for support, analytics, testing, or outsourcing.
Key features include:
- Precision for data privacy laws: Any combination of personal, health, or credit information can be anonymized to comply with complex cross-border privacy laws and regulations.
- Powerful masking capabilities: A range of masking functions is repeatable across systems to ensure business processes are reliable and precise.
- Performance: Dynamic data masking’s high-speed engine ensures no impact on user throughput. Persistent data masking can scale to mask terabytes of data for large test, outsourcing, or analytic projects.
- Role-based masking: Dynamic data masking accommodates data security and privacy policies that vary depending on users’ locations.
- Data connectivity: Take advantage of comprehensive integrations and connectors with a wealth of Informatica connectors to on-premises and cloud data sources.
- Monitoring and compliance reporting: Data security and privacy professionals can validate that identified sensitive data has been masked to meet security and privacy policies.
While this is just one aspect of comprehensive security measures, it is increasingly important and we’re proud to have developed and to promote our solution as part of Privacy Day 2020.
Similar Blogs
At The Crossroads of Risk Management and Privileged Access Management, Hyper-Automation Matters
There are few things in business that come with no risk. In fact, the future truly belongs to the bold, and those enterprises who push themselves to innovate more and accelerate digital transformation across their offerings are winning. The greatest risk of all today may be doing nothing, hoping that the status quo will be enough to keep existing customers and win new customers.
The Hidden Costs of an IP Breach: How to Analyze, Plan and Protect Priceless Digital Assets & Secrets
Corporate networks are breached for many reasons, but among the most frightening to the C-Suite and Board of Directors are attacks that target the theft of intellectual assets.
As Digital Transformation Accelerates, The Risk of Theft of IP Grows
Over the past two decades, with the rise of the Internet and the growth of cloud services, enterprises, and organizations, including government agencies, have transformed the way they do business and serve their constituents.