SlideShare una empresa de Scribd logo
1 de 20
© Copyright 2013 Axis Technology, LLC
DMsuiteDMsuite
Data Masking OverviewData Masking Overview
know your data • protect your data • share your data
DMsuite™ is the proprietary data masking software
product by Axis Technology Software, LLC.
With DMsuite you can profile, mask, audit, provision and
manage your data in a standardized, automated manner. It
acts like a water filter, working behind the scenes to replace
sensitive data with fictitious data when you copy it out of
your production environment. DMsuite represents a major
advance over existing one-off scripts to a fully automated,
repeatable process.
You need data masking when you:
• Copy sensitive data outside of production environments
• Move your test data to the cloud
• Leverage off-shore development/consultants
• Send data to the vendors
• Need regulatory compliance (HIPAA, PCI DSS)
• Respond to that audit item
Static Data Masking for Testing
What is it?
Ensure that Test Environments contain robust test
data that has the same characteristics as production
without containing any sensitive information
Benefits
Internal and 3rd
Party developers and
testers are free from concerns about data
breaches.
Production
Database
Real Data
Masked
Test
Database
Masked Data
4
Migration to Cloud
What is it?
Organizations want to take advantages of the
benefits of cloud computing, but are concerned about
data security.
Benefits
Moving masked test data to the cloud, can
provide the benefits of cloud computing to an
organization, without the threat of a data leak.
Production
Database
Real Data
Masked
Test
Database
In the Cloud
Masked Data
5
Training
What is it?
In both BPO and Internal Training situations,
students need to have a robust set of data to
simulate real world processing
Benefits
BPO providers and Testing organizations
can simulate real world situations without
exposing sensitive data
Production
Database
Real Data
Masked
Test
Database
Masked Data
6
Bringing on New Clients
What is it?
New clients for Prime Broker, Family Office and
other areas require testing prior to going live.
Benefits
Utilizing DMsuiteTM
can facilitate testing
while ensuring that sensitive data is
protected.
Masked
Test
Database
Masked Data
7
Masked Data
Masked Data
Internal System
Protection from Hackers
What is it?
Hackers pose a great threat to an organization’s
data. Many firms house sensitive data in their non-
production environments.
Benefits
Hackers who gain access to masked
environments, come away with NOTHING.
Organizations can focus their efforts on
production environments.
Production
Database
Real Data
Masked
Test
Database
Masked Data
8
Analytics
What is it?
Organizations are compiling data from various
sources and running them through analytical models.
Benefits
Utilizing DMsuiteTM
can facilitate testing
while ensuring that sensitive data is
protected.
Masked
Test
Database
Masked Data
9
Masked Data
Masked Data
Analytical System
DMsuite™ Static Data Masking
DMsuiteTM
replaces sensitive data with fictitious but realistic data so only
masked data flows through your organization.
DMsuite™ Dynamic Data Masking
SQL Server or MySQL
Real (Unmasked) Values Masked Values
3307
3306
Name: XXXXXXXXX
ID Number: XXXX XXX XXXX XXX
Status: Active
Last Activity: January 3rd
, 2013
Last Activity Type: A78
Name: John Smith
ID Number: 1234 123 5678 789
Status: Active
Last Activity: January 3rd
, 2013
Last Activity Type: A78
Data on the database is not changed.
Values are masked on their way to the UI.
Can be applied to any field.
Dynamic data masking only affects select
queries and bypasses insert and update queries
 Names, Phone, Email
 Medicaid Number
 Address
• Street address, Zip+4
• Care of…, Attn: ...
 SSN or other national
identifier
 Birth date and other dates
 Credit card #, bank account #
 Comment fields
 Customer ID
 Internal sequence keys
CUSTOMER PII & PATIENT PHI
 Pricing, M&A, Contracts
 Confidential/Top Secret
 Provider Contracts
 Actuarial Calculations
 Security Identifiers CUSIP, ISIN,
SEDOL
 trade date
 Financials
• Price, quantity,
legal fees, vendor payments
 Assets/holdings
 Employee or Corporate ID
 Salary, Benefits
 HR status
(termination, personnel
issues)
 Family data
 Manager information
 Cost Center data
Who Needs to Mask What Data
Any Businesses Falling Under
 HIPAA - Healthcare and Pharmaceutical are required to secure
Patient Health Information
PCI DSS: Credit Card Industry Standard
State privacy laws - All companies must follow their own similar
to Senate Bill No 1386 – State of California
Gramm-Leach-Bliley Financial Services Modernization Act
(1999)
Sarbanes-Oxley Act (2002)
CANADA: Jan 2005 – Personal Information Protection and
Electronic Documents Act
JAPAN: Apr 2005 – Personal Information Protection Law
FRANCE: Oct 2005 – Computing and Liberties Act
TYPE I TYPE II
COMPANY SECRETS
TYPE III
Company Data
EMPLOYEE
DMsuite provides clients with a smart way to secure sensitive data, making it
suitable for a large set of tasks without incurring unnecessary risks
– Reduces Risk of Breach
• Masked data is suitable for numerous business activities. The fewer places real data
is stored the lower your risk of a breach.
– Reduce by up to 80% the work required to Identify sensitive data
• DMsuite Profiler automates Identification of Sensitive Data across databases,
copybooks, and files where your sensitive data is stored.
– Ideal for Test Data Management (TDM)
• Automatically mask production data, with no need to do any programming.
– Enables Data Sharing
• Share masked data quickly with partners, offshore and outside vendors .
– Lowers DBA, Application Development and Testing Costs
• With fewer databases to secure and faster data provisioning, reduce your costs to
secure sensitive data (vs. Lockdown controls).
– Masks ERP and other packaged software
• PeopleSoft, Oracle E-Business Suite, Lawson, SAP, Salesforce.
DMsuite Value Proposition
DMsuite Features
A meta-data driven data masking product that automates a repeatable masking
framework with powerful features and algorithms.
“Shovel Ready” - Supports rapid implementation for a business unit and scalability
for the enterprise.
Patented 5th-generation masking algorithms designed to mask your data
consistently, no matter where or how it is stored.
Pre-populated profiles to get your masking program up and running quickly.
Uses secure platform-independent technology (Java, XML).
Conforms to your data refresh processes.
Broad coverage of relational, file masking, big data, and mainframe required for all
size enterprises:
• Automatic Referential Integrity for all of the supported persistence types
Integration features include working with LDAP & Microsoft Active Directory,
Kerberos & SiteMinder
DMsuite™ Masks
…and keeps referential integrity across all of them
Test Data Management
DMsuite™ data masking enables:
– Test Data Management - the risk of a data breach in
nonproduction environments is eliminated while still
providing the highest quality test data for software
development.
– Outsourcing, typically puts production data in
nonproduction environments for testing, putting client
data at risk if it’s not masked.
– Consulting companies are getting resistance from their
clients regarding accessing sensitive data, since they may
work for their clients’ competition as well.
– Break/Fix - If a vendor application breaks, fixes can be
developed using masked data, eliminating the risk of
exposure.
DMsuite ROI
without
DMsuite™TM
with
DMsuite™TM
Effort
Time
Program
Inception
Business as Usual
Begins
Periodic Audit Legend:
Automated Analysis
Automated Change
Capture
Automated Audit
Safe Re-Masking
• Targeted at Information Security professionals, no need to hire additional developers or DBA’s
• No impact on Developers because no programming is required!
• Makes the DBA’s life easier - only needed for initial configuration
• Analysts can identify sensitive data quickly with the DMsuite™ Profiler
• Auditors receive DMsuite™ Certification reports to show what data has been masked
DMsuite 5-Step Process
Application
Database
with real
Production
Data
Target
Environment
with Masked
Data
Step 1
Identify
Step 2
Select
Step 3
Validate
Step 4
Implement
Step 5
Certify
DM Profiler DM Manager DM Generator
DM Applicator
DM Auditor
1
2
3
4
5
DM Profiler automatically identifies the location of your sensitive
data and assigns masking algorithms.
DM Manager is the web application that allows users to manage
the masking process or, just click a button to mask your data!
DM Generator reads the sensitive data inventory that you built with
DM Profiler and DM Manager and generates XML code targeted to
your environment.
DM Applicator runs the code created by DM Generator on the
target platform: typically the DMsuite™ internal engine or other
commercial tools.
DM Auditor runs Certification jobs that monitor data security. You
set up alerts to notify you if any masked data becomes "polluted"
with unmasked data.
DMsuite Support
Axis provides world-class support through our DMsuite™ Customer Support Center
– Clients can contact the support center directly:
• Toll-free phone , E-mail and Online
– Customer Support Plans
• Standard
– Monday-Friday, Standard business hours
• Silver
– Monday-Friday, Extended business hours
• Gold
– 24/7 support
– Dedicated support specialist
– Direct access to DMsuite Product team
– All customer support plans include
• Direct access to a Customer Support Specialist
• Access to our online customer support center 24/7
• Product updates
© Copyright 2013 Axis Technology, LLC
know your data • protect your data • share your data
www.AxisDMsuite.com
Thank You!
70 Federal Streeet
Boston, MA 02110
(857) 445-0110
dmsuite@axisdmsuite.com

Más contenido relacionado

La actualidad más candente

Power shell saldırılarının ayak i̇zleri
Power shell saldırılarının ayak i̇zleriPower shell saldırılarının ayak i̇zleri
Power shell saldırılarının ayak i̇zleriAdeo Security
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architectureMubashirAslam5
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1MLG College of Learning, Inc
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Distributed database management systems
Distributed database management systemsDistributed database management systems
Distributed database management systemsDhani Ahmad
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
 
1. penetration testing
1.  penetration testing1.  penetration testing
1. penetration testingJose Peña
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1Shobhit Sharma
 
White Paper: IP VPN and Ethernet WAN Services
White Paper: IP VPN and Ethernet WAN ServicesWhite Paper: IP VPN and Ethernet WAN Services
White Paper: IP VPN and Ethernet WAN ServicesMetrodata Limited
 
Hping ile IP/ICMP ve UDP Paketleri Oluşturma
Hping ile IP/ICMP ve UDP Paketleri OluşturmaHping ile IP/ICMP ve UDP Paketleri Oluşturma
Hping ile IP/ICMP ve UDP Paketleri OluşturmaBGA Cyber Security
 
Seguridad de la informacion
Seguridad de la informacionSeguridad de la informacion
Seguridad de la informacionGiovanita Caira
 
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 13, 14, 15
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 13, 14, 15Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 13, 14, 15
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 13, 14, 15BGA Cyber Security
 
Análisis de riesgos y vulnerabilidades
Análisis de riesgos y vulnerabilidades Análisis de riesgos y vulnerabilidades
Análisis de riesgos y vulnerabilidades cyberleon95
 

La actualidad más candente (20)

Power shell saldırılarının ayak i̇zleri
Power shell saldırılarının ayak i̇zleriPower shell saldırılarının ayak i̇zleri
Power shell saldırılarının ayak i̇zleri
 
Conceptual security architecture
Conceptual security architectureConceptual security architecture
Conceptual security architecture
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Owasp top 10 inceleme
Owasp top 10 incelemeOwasp top 10 inceleme
Owasp top 10 inceleme
 
Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1Information Assurance And Security - Chapter 3 - Lesson 1
Information Assurance And Security - Chapter 3 - Lesson 1
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Distributed database management systems
Distributed database management systemsDistributed database management systems
Distributed database management systems
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
 
develop security policy
develop security policydevelop security policy
develop security policy
 
1. penetration testing
1.  penetration testing1.  penetration testing
1. penetration testing
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
White Paper: IP VPN and Ethernet WAN Services
White Paper: IP VPN and Ethernet WAN ServicesWhite Paper: IP VPN and Ethernet WAN Services
White Paper: IP VPN and Ethernet WAN Services
 
Hping ile IP/ICMP ve UDP Paketleri Oluşturma
Hping ile IP/ICMP ve UDP Paketleri OluşturmaHping ile IP/ICMP ve UDP Paketleri Oluşturma
Hping ile IP/ICMP ve UDP Paketleri Oluşturma
 
Seguridad de la informacion
Seguridad de la informacionSeguridad de la informacion
Seguridad de la informacion
 
Ordbms
OrdbmsOrdbms
Ordbms
 
Information classification
Information classificationInformation classification
Information classification
 
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 13, 14, 15
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 13, 14, 15Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 13, 14, 15
Beyaz Şapkalı Hacker CEH Eğitimi - Bölüm 13, 14, 15
 
Análisis de riesgos y vulnerabilidades
Análisis de riesgos y vulnerabilidades Análisis de riesgos y vulnerabilidades
Análisis de riesgos y vulnerabilidades
 

Destacado

Data masking in sas
Data masking in sasData masking in sas
Data masking in sasMurphy Choy
 
Using Java & Genetic Algorithms to Beat the Market
Using Java & Genetic Algorithms to Beat the MarketUsing Java & Genetic Algorithms to Beat the Market
Using Java & Genetic Algorithms to Beat the MarketMatthew Ring
 
Data Masking
Data MaskingData Masking
Data MaskingPowerData
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceCapgemini
 
High-Frequency Trading in the FX Market
High-Frequency Trading in the FX MarketHigh-Frequency Trading in the FX Market
High-Frequency Trading in the FX MarketYoshi S.
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingSolidQ
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessNathaniel Palmer
 
Introduction to metadata management
Introduction to metadata managementIntroduction to metadata management
Introduction to metadata managementOpen Data Support
 

Destacado (10)

Data masking a developer's guide
Data masking a developer's guideData masking a developer's guide
Data masking a developer's guide
 
Data masking in sas
Data masking in sasData masking in sas
Data masking in sas
 
Using Java & Genetic Algorithms to Beat the Market
Using Java & Genetic Algorithms to Beat the MarketUsing Java & Genetic Algorithms to Beat the Market
Using Java & Genetic Algorithms to Beat the Market
 
Data Masking
Data MaskingData Masking
Data Masking
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and Compliance
 
High-Frequency Trading in the FX Market
High-Frequency Trading in the FX MarketHigh-Frequency Trading in the FX Market
High-Frequency Trading in the FX Market
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data Masking
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar Slides
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful Business
 
Introduction to metadata management
Introduction to metadata managementIntroduction to metadata management
Introduction to metadata management
 

Similar a Automate Sensitive Data Masking with DMsuite

Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft SolutionHarriet Schneider
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick TourActive Base
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted CloudMicrosoft
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreJoel Oleson
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 

Similar a Automate Sensitive Data Masking with DMsuite (20)

Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick Tour
 
Datumize Deck 2019
Datumize Deck 2019 Datumize Deck 2019
Datumize Deck 2019
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted Cloud
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 

Más de Axis Technology, LLC

Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperAxis Technology, LLC
 
Tile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperTile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperAxis Technology, LLC
 
Assessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAssessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAxis Technology, LLC
 
Solution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureSolution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureAxis Technology, LLC
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Axis Technology, LLC
 
Data Architecture Strategy Brochure
Data Architecture Strategy BrochureData Architecture Strategy Brochure
Data Architecture Strategy BrochureAxis Technology, LLC
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningAxis Technology, LLC
 
Axis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology, LLC
 

Más de Axis Technology, LLC (20)

Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White Paper
 
Tile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperTile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White Paper
 
Assessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAssessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White Paper
 
Solution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureSolution Evaluation & Selection Brochure
Solution Evaluation & Selection Brochure
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure
 
eGRC Strategy Brochure
eGRC Strategy BrochureeGRC Strategy Brochure
eGRC Strategy Brochure
 
Entitlement Management Brochure
Entitlement Management Brochure Entitlement Management Brochure
Entitlement Management Brochure
 
Data Architecture Strategy Brochure
Data Architecture Strategy BrochureData Architecture Strategy Brochure
Data Architecture Strategy Brochure
 
Data Governance Brochure
Data Governance BrochureData Governance Brochure
Data Governance Brochure
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
 
Client Connections
Client Connections Client Connections
Client Connections
 
Brokerage Executive Dashboard
Brokerage Executive DashboardBrokerage Executive Dashboard
Brokerage Executive Dashboard
 
Wealth Management
Wealth ManagementWealth Management
Wealth Management
 
IRA Simplification Project
IRA Simplification ProjectIRA Simplification Project
IRA Simplification Project
 
Data Management Strategy
Data Management StrategyData Management Strategy
Data Management Strategy
 
Joint Analysis Design
Joint Analysis DesignJoint Analysis Design
Joint Analysis Design
 
Enterprise Data Architecture
Enterprise Data Architecture Enterprise Data Architecture
Enterprise Data Architecture
 
Reference Data Management
Reference Data Management Reference Data Management
Reference Data Management
 
Axis Consulting Case Studies
Axis Consulting Case StudiesAxis Consulting Case Studies
Axis Consulting Case Studies
 
Axis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology - Consulting Overview
Axis Technology - Consulting Overview
 

Último

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Último (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Automate Sensitive Data Masking with DMsuite

  • 1. © Copyright 2013 Axis Technology, LLC DMsuiteDMsuite Data Masking OverviewData Masking Overview know your data • protect your data • share your data
  • 2. DMsuite™ is the proprietary data masking software product by Axis Technology Software, LLC. With DMsuite you can profile, mask, audit, provision and manage your data in a standardized, automated manner. It acts like a water filter, working behind the scenes to replace sensitive data with fictitious data when you copy it out of your production environment. DMsuite represents a major advance over existing one-off scripts to a fully automated, repeatable process.
  • 3. You need data masking when you: • Copy sensitive data outside of production environments • Move your test data to the cloud • Leverage off-shore development/consultants • Send data to the vendors • Need regulatory compliance (HIPAA, PCI DSS) • Respond to that audit item
  • 4. Static Data Masking for Testing What is it? Ensure that Test Environments contain robust test data that has the same characteristics as production without containing any sensitive information Benefits Internal and 3rd Party developers and testers are free from concerns about data breaches. Production Database Real Data Masked Test Database Masked Data 4
  • 5. Migration to Cloud What is it? Organizations want to take advantages of the benefits of cloud computing, but are concerned about data security. Benefits Moving masked test data to the cloud, can provide the benefits of cloud computing to an organization, without the threat of a data leak. Production Database Real Data Masked Test Database In the Cloud Masked Data 5
  • 6. Training What is it? In both BPO and Internal Training situations, students need to have a robust set of data to simulate real world processing Benefits BPO providers and Testing organizations can simulate real world situations without exposing sensitive data Production Database Real Data Masked Test Database Masked Data 6
  • 7. Bringing on New Clients What is it? New clients for Prime Broker, Family Office and other areas require testing prior to going live. Benefits Utilizing DMsuiteTM can facilitate testing while ensuring that sensitive data is protected. Masked Test Database Masked Data 7 Masked Data Masked Data Internal System
  • 8. Protection from Hackers What is it? Hackers pose a great threat to an organization’s data. Many firms house sensitive data in their non- production environments. Benefits Hackers who gain access to masked environments, come away with NOTHING. Organizations can focus their efforts on production environments. Production Database Real Data Masked Test Database Masked Data 8
  • 9. Analytics What is it? Organizations are compiling data from various sources and running them through analytical models. Benefits Utilizing DMsuiteTM can facilitate testing while ensuring that sensitive data is protected. Masked Test Database Masked Data 9 Masked Data Masked Data Analytical System
  • 10. DMsuite™ Static Data Masking DMsuiteTM replaces sensitive data with fictitious but realistic data so only masked data flows through your organization.
  • 11. DMsuite™ Dynamic Data Masking SQL Server or MySQL Real (Unmasked) Values Masked Values 3307 3306 Name: XXXXXXXXX ID Number: XXXX XXX XXXX XXX Status: Active Last Activity: January 3rd , 2013 Last Activity Type: A78 Name: John Smith ID Number: 1234 123 5678 789 Status: Active Last Activity: January 3rd , 2013 Last Activity Type: A78 Data on the database is not changed. Values are masked on their way to the UI. Can be applied to any field. Dynamic data masking only affects select queries and bypasses insert and update queries
  • 12.  Names, Phone, Email  Medicaid Number  Address • Street address, Zip+4 • Care of…, Attn: ...  SSN or other national identifier  Birth date and other dates  Credit card #, bank account #  Comment fields  Customer ID  Internal sequence keys CUSTOMER PII & PATIENT PHI  Pricing, M&A, Contracts  Confidential/Top Secret  Provider Contracts  Actuarial Calculations  Security Identifiers CUSIP, ISIN, SEDOL  trade date  Financials • Price, quantity, legal fees, vendor payments  Assets/holdings  Employee or Corporate ID  Salary, Benefits  HR status (termination, personnel issues)  Family data  Manager information  Cost Center data Who Needs to Mask What Data Any Businesses Falling Under  HIPAA - Healthcare and Pharmaceutical are required to secure Patient Health Information PCI DSS: Credit Card Industry Standard State privacy laws - All companies must follow their own similar to Senate Bill No 1386 – State of California Gramm-Leach-Bliley Financial Services Modernization Act (1999) Sarbanes-Oxley Act (2002) CANADA: Jan 2005 – Personal Information Protection and Electronic Documents Act JAPAN: Apr 2005 – Personal Information Protection Law FRANCE: Oct 2005 – Computing and Liberties Act TYPE I TYPE II COMPANY SECRETS TYPE III Company Data EMPLOYEE
  • 13. DMsuite provides clients with a smart way to secure sensitive data, making it suitable for a large set of tasks without incurring unnecessary risks – Reduces Risk of Breach • Masked data is suitable for numerous business activities. The fewer places real data is stored the lower your risk of a breach. – Reduce by up to 80% the work required to Identify sensitive data • DMsuite Profiler automates Identification of Sensitive Data across databases, copybooks, and files where your sensitive data is stored. – Ideal for Test Data Management (TDM) • Automatically mask production data, with no need to do any programming. – Enables Data Sharing • Share masked data quickly with partners, offshore and outside vendors . – Lowers DBA, Application Development and Testing Costs • With fewer databases to secure and faster data provisioning, reduce your costs to secure sensitive data (vs. Lockdown controls). – Masks ERP and other packaged software • PeopleSoft, Oracle E-Business Suite, Lawson, SAP, Salesforce. DMsuite Value Proposition
  • 14. DMsuite Features A meta-data driven data masking product that automates a repeatable masking framework with powerful features and algorithms. “Shovel Ready” - Supports rapid implementation for a business unit and scalability for the enterprise. Patented 5th-generation masking algorithms designed to mask your data consistently, no matter where or how it is stored. Pre-populated profiles to get your masking program up and running quickly. Uses secure platform-independent technology (Java, XML). Conforms to your data refresh processes. Broad coverage of relational, file masking, big data, and mainframe required for all size enterprises: • Automatic Referential Integrity for all of the supported persistence types Integration features include working with LDAP & Microsoft Active Directory, Kerberos & SiteMinder
  • 15. DMsuite™ Masks …and keeps referential integrity across all of them
  • 16. Test Data Management DMsuite™ data masking enables: – Test Data Management - the risk of a data breach in nonproduction environments is eliminated while still providing the highest quality test data for software development. – Outsourcing, typically puts production data in nonproduction environments for testing, putting client data at risk if it’s not masked. – Consulting companies are getting resistance from their clients regarding accessing sensitive data, since they may work for their clients’ competition as well. – Break/Fix - If a vendor application breaks, fixes can be developed using masked data, eliminating the risk of exposure.
  • 17. DMsuite ROI without DMsuite™TM with DMsuite™TM Effort Time Program Inception Business as Usual Begins Periodic Audit Legend: Automated Analysis Automated Change Capture Automated Audit Safe Re-Masking • Targeted at Information Security professionals, no need to hire additional developers or DBA’s • No impact on Developers because no programming is required! • Makes the DBA’s life easier - only needed for initial configuration • Analysts can identify sensitive data quickly with the DMsuite™ Profiler • Auditors receive DMsuite™ Certification reports to show what data has been masked
  • 18. DMsuite 5-Step Process Application Database with real Production Data Target Environment with Masked Data Step 1 Identify Step 2 Select Step 3 Validate Step 4 Implement Step 5 Certify DM Profiler DM Manager DM Generator DM Applicator DM Auditor 1 2 3 4 5 DM Profiler automatically identifies the location of your sensitive data and assigns masking algorithms. DM Manager is the web application that allows users to manage the masking process or, just click a button to mask your data! DM Generator reads the sensitive data inventory that you built with DM Profiler and DM Manager and generates XML code targeted to your environment. DM Applicator runs the code created by DM Generator on the target platform: typically the DMsuite™ internal engine or other commercial tools. DM Auditor runs Certification jobs that monitor data security. You set up alerts to notify you if any masked data becomes "polluted" with unmasked data.
  • 19. DMsuite Support Axis provides world-class support through our DMsuite™ Customer Support Center – Clients can contact the support center directly: • Toll-free phone , E-mail and Online – Customer Support Plans • Standard – Monday-Friday, Standard business hours • Silver – Monday-Friday, Extended business hours • Gold – 24/7 support – Dedicated support specialist – Direct access to DMsuite Product team – All customer support plans include • Direct access to a Customer Support Specialist • Access to our online customer support center 24/7 • Product updates
  • 20. © Copyright 2013 Axis Technology, LLC know your data • protect your data • share your data www.AxisDMsuite.com Thank You! 70 Federal Streeet Boston, MA 02110 (857) 445-0110 dmsuite@axisdmsuite.com