It's 10:00 P.M. Do you know where your confidential data is? Organizations struggle to meet the business and regulatory requirements of controlling and protecting data related to the health, financial well being, and privacy of their business, employees, and customers.
Most people can state that their organization's confidential data—payment card information (PCI), personally identifying information (PII), and financial information—is stored, or comes to rest, within an enterprise database such as Microsoft SQL Server or Oracle. Valuable data, however, never truly comes to rest. For data to be useful for multiple purposes within your organization, it's frequently transformed and distributed throughout your enterprise. Finance might require data in spreadsheet form. Business development might require the same data in presentation format. Enterprise application integration might need the same data converted to XML format. As confidential data is widely distributed to business processes and transformed to formats optimized to those processes, unauthorized and unintended disclosure of this data becomes a major concern.
To ensure that your confidential data is adequately secured, you need to accurately identify situations in which sensitive corporate data either leaks or propagates from a relatively small number of secure and controlled database application environments to other databases—or to the unstructured world of file and mail servers. The vast number of enterprise servers, shares, folders, document types, and formats that must be examined in search of confidential data presents a major challenge to those tasked with securing data.
Identifying What Your Data-Security Solution Should Do
You need a solution that focuses on data critical to your business. To address the problem of data leakage and proliferation, your solution should give you data-oriented visibility across the various database and file servers employed in your enterprise.
Your data-security solution must be able to quickly scan your enterprise to pinpoint sources of confidential data as well as additional subsets, copies, and exports of that data. It must identify files and databases that contain
- PCI
- customer data
- PII
- financial data
- corporate intellectual property
Your solution should replace the time-consuming and error-prone efforts that are otherwise required to identify sensitive information stored across your enterprise. It should also provide reports that you can use to mitigate corporate risk.
Choosing Your Data-Security Solution
BrainTree's dbDataFinder delivers tighter control over confidential data through its five-step process:
- Identify the sources of confidential data.
- Securely profile user-specified data sets.
- Assign data categories and classification.
- Identify copies and subsets of confidential data in enterprise file and database servers.
- Mitigate risk.
By using a combination of data signatures, custom-specified search terms, and a secure profile of your organization's valued data, dbDataFinder eliminates false positives and identifies any exports of your sensitive data to
- spreadsheets
- enterprise and personal databases
- mail
- archives
- more than 200 different document types
To accomplish its task, dbDataFinder features multiple scanners, each tuned to identify the individual data elements that comprise a particular type of data. The scanners include
- a PII scanner for privacy-related data
- a PCI scanner for customer and payment card data
- a profiled data scanner for user-specified data sets
- a custom search term scanner
- an application data scanner (e.g., Oracle, PeopleSoft, Seibel)
Profiling Your Business Data
dbDataFinder can securely profile application data, which lets organizations pinpoint internal confidential data leakage and proliferation. Profile-based scanning eliminates false positives that result from the existence of files or databases containing relevant data types (e.g., PII) but irrelevant data values. Profiling lets you differentiate between files that contain leaks of corporate HR data and files or databases that contain masked or dummy data used for development purposes.
dbDataFinder enables the creation and enforcement of your organization's data-protection policies. dbDatafinder uses filter sets to group individual data elements that, when combined within a file or database, become critical information. For example, a first and last name might not in themselves constitute high risk information. However, when accompanied in a file by a Social Security number (SSN), address, or other personally identifying data, the combination of elements exponentially increases the risk.
dbDataFinder eliminates false positives and finds copies and subsets of the specific data that is important to you with pinpoint accuracy. It identifies instances in which your confidential data has moved from your structured database environment to other databases or to file systems in unstructured file formats. Concise reports that detail the location and the nature of your company's current data-related risks speed mitigation. dbDataFinder is an integral part of any data security, classification, or compliance program. dbDataFinder lets you manage and protect your organization's confidential data.
For more information, go to www.dbdatafinder.com.
To download a demonstration copy of dbDataFinder, click here.
No comments:
Post a Comment