SlideShare una empresa de Scribd logo
1 de 20
© Copyright 2013 Axis Technology, LLC
DMsuiteDMsuite
Data Masking OverviewData Masking Overview
know your data • protect your data • share your data
DMsuite™ is the proprietary data masking software
product by Axis Technology Software, LLC.
With DMsuite you can profile, mask, audit, provision and
manage your data in a standardized, automated manner. It
acts like a water filter, working behind the scenes to replace
sensitive data with fictitious data when you copy it out of
your production environment. DMsuite represents a major
advance over existing one-off scripts to a fully automated,
repeatable process.
You need data masking when you:
• Copy sensitive data outside of production environments
• Move your test data to the cloud
• Leverage off-shore development/consultants
• Send data to the vendors
• Need regulatory compliance (HIPAA, PCI DSS)
• Respond to that audit item
Static Data Masking for Testing
What is it?
Ensure that Test Environments contain robust test
data that has the same characteristics as production
without containing any sensitive information
Benefits
Internal and 3rd
Party developers and
testers are free from concerns about data
breaches.
Production
Database
Real Data
Masked
Test
Database
Masked Data
4
Migration to Cloud
What is it?
Organizations want to take advantages of the
benefits of cloud computing, but are concerned about
data security.
Benefits
Moving masked test data to the cloud, can
provide the benefits of cloud computing to an
organization, without the threat of a data leak.
Production
Database
Real Data
Masked
Test
Database
In the Cloud
Masked Data
5
Training
What is it?
In both BPO and Internal Training situations,
students need to have a robust set of data to
simulate real world processing
Benefits
BPO providers and Testing organizations
can simulate real world situations without
exposing sensitive data
Production
Database
Real Data
Masked
Test
Database
Masked Data
6
Bringing on New Clients
What is it?
New clients for Prime Broker, Family Office and
other areas require testing prior to going live.
Benefits
Utilizing DMsuiteTM
can facilitate testing
while ensuring that sensitive data is
protected.
Masked
Test
Database
Masked Data
7
Masked Data
Masked Data
Internal System
Protection from Hackers
What is it?
Hackers pose a great threat to an organization’s
data. Many firms house sensitive data in their non-
production environments.
Benefits
Hackers who gain access to masked
environments, come away with NOTHING.
Organizations can focus their efforts on
production environments.
Production
Database
Real Data
Masked
Test
Database
Masked Data
8
Analytics
What is it?
Organizations are compiling data from various
sources and running them through analytical models.
Benefits
Utilizing DMsuiteTM
can facilitate testing
while ensuring that sensitive data is
protected.
Masked
Test
Database
Masked Data
9
Masked Data
Masked Data
Analytical System
DMsuite™ Static Data Masking
DMsuiteTM
replaces sensitive data with fictitious but realistic data so only
masked data flows through your organization.
DMsuite™ Dynamic Data Masking
SQL Server or MySQL
Real (Unmasked) Values Masked Values
3307
3306
Name: XXXXXXXXX
ID Number: XXXX XXX XXXX XXX
Status: Active
Last Activity: January 3rd
, 2013
Last Activity Type: A78
Name: John Smith
ID Number: 1234 123 5678 789
Status: Active
Last Activity: January 3rd
, 2013
Last Activity Type: A78
Data on the database is not changed.
Values are masked on their way to the UI.
Can be applied to any field.
Dynamic data masking only affects select
queries and bypasses insert and update queries
 Names, Phone, Email
 Medicaid Number
 Address
• Street address, Zip+4
• Care of…, Attn: ...
 SSN or other national
identifier
 Birth date and other dates
 Credit card #, bank account #
 Comment fields
 Customer ID
 Internal sequence keys
CUSTOMER PII & PATIENT PHI
 Pricing, M&A, Contracts
 Confidential/Top Secret
 Provider Contracts
 Actuarial Calculations
 Security Identifiers CUSIP, ISIN,
SEDOL
 trade date
 Financials
• Price, quantity,
legal fees, vendor payments
 Assets/holdings
 Employee or Corporate ID
 Salary, Benefits
 HR status
(termination, personnel
issues)
 Family data
 Manager information
 Cost Center data
Who Needs to Mask What Data
Any Businesses Falling Under
 HIPAA - Healthcare and Pharmaceutical are required to secure
Patient Health Information
PCI DSS: Credit Card Industry Standard
State privacy laws - All companies must follow their own similar
to Senate Bill No 1386 – State of California
Gramm-Leach-Bliley Financial Services Modernization Act
(1999)
Sarbanes-Oxley Act (2002)
CANADA: Jan 2005 – Personal Information Protection and
Electronic Documents Act
JAPAN: Apr 2005 – Personal Information Protection Law
FRANCE: Oct 2005 – Computing and Liberties Act
TYPE I TYPE II
COMPANY SECRETS
TYPE III
Company Data
EMPLOYEE
DMsuite provides clients with a smart way to secure sensitive data, making it
suitable for a large set of tasks without incurring unnecessary risks
– Reduces Risk of Breach
• Masked data is suitable for numerous business activities. The fewer places real data
is stored the lower your risk of a breach.
– Reduce by up to 80% the work required to Identify sensitive data
• DMsuite Profiler automates Identification of Sensitive Data across databases,
copybooks, and files where your sensitive data is stored.
– Ideal for Test Data Management (TDM)
• Automatically mask production data, with no need to do any programming.
– Enables Data Sharing
• Share masked data quickly with partners, offshore and outside vendors .
– Lowers DBA, Application Development and Testing Costs
• With fewer databases to secure and faster data provisioning, reduce your costs to
secure sensitive data (vs. Lockdown controls).
– Masks ERP and other packaged software
• PeopleSoft, Oracle E-Business Suite, Lawson, SAP, Salesforce.
DMsuite Value Proposition
DMsuite Features
A meta-data driven data masking product that automates a repeatable masking
framework with powerful features and algorithms.
“Shovel Ready” - Supports rapid implementation for a business unit and scalability
for the enterprise.
Patented 5th-generation masking algorithms designed to mask your data
consistently, no matter where or how it is stored.
Pre-populated profiles to get your masking program up and running quickly.
Uses secure platform-independent technology (Java, XML).
Conforms to your data refresh processes.
Broad coverage of relational, file masking, big data, and mainframe required for all
size enterprises:
• Automatic Referential Integrity for all of the supported persistence types
Integration features include working with LDAP & Microsoft Active Directory,
Kerberos & SiteMinder
DMsuite™ Masks
…and keeps referential integrity across all of them
Test Data Management
DMsuite™ data masking enables:
– Test Data Management - the risk of a data breach in
nonproduction environments is eliminated while still
providing the highest quality test data for software
development.
– Outsourcing, typically puts production data in
nonproduction environments for testing, putting client
data at risk if it’s not masked.
– Consulting companies are getting resistance from their
clients regarding accessing sensitive data, since they may
work for their clients’ competition as well.
– Break/Fix - If a vendor application breaks, fixes can be
developed using masked data, eliminating the risk of
exposure.
DMsuite ROI
without
DMsuite™TM
with
DMsuite™TM
Effort
Time
Program
Inception
Business as Usual
Begins
Periodic Audit Legend:
Automated Analysis
Automated Change
Capture
Automated Audit
Safe Re-Masking
• Targeted at Information Security professionals, no need to hire additional developers or DBA’s
• No impact on Developers because no programming is required!
• Makes the DBA’s life easier - only needed for initial configuration
• Analysts can identify sensitive data quickly with the DMsuite™ Profiler
• Auditors receive DMsuite™ Certification reports to show what data has been masked
DMsuite 5-Step Process
Application
Database
with real
Production
Data
Target
Environment
with Masked
Data
Step 1
Identify
Step 2
Select
Step 3
Validate
Step 4
Implement
Step 5
Certify
DM Profiler DM Manager DM Generator
DM Applicator
DM Auditor
1
2
3
4
5
DM Profiler automatically identifies the location of your sensitive
data and assigns masking algorithms.
DM Manager is the web application that allows users to manage
the masking process or, just click a button to mask your data!
DM Generator reads the sensitive data inventory that you built with
DM Profiler and DM Manager and generates XML code targeted to
your environment.
DM Applicator runs the code created by DM Generator on the
target platform: typically the DMsuite™ internal engine or other
commercial tools.
DM Auditor runs Certification jobs that monitor data security. You
set up alerts to notify you if any masked data becomes "polluted"
with unmasked data.
DMsuite Support
Axis provides world-class support through our DMsuite™ Customer Support Center
– Clients can contact the support center directly:
• Toll-free phone , E-mail and Online
– Customer Support Plans
• Standard
– Monday-Friday, Standard business hours
• Silver
– Monday-Friday, Extended business hours
• Gold
– 24/7 support
– Dedicated support specialist
– Direct access to DMsuite Product team
– All customer support plans include
• Direct access to a Customer Support Specialist
• Access to our online customer support center 24/7
• Product updates
© Copyright 2013 Axis Technology, LLC
know your data • protect your data • share your data
www.AxisDMsuite.com
Thank You!
70 Federal Streeet
Boston, MA 02110
(857) 445-0110
dmsuite@axisdmsuite.com

Más contenido relacionado

La actualidad más candente

DDD Basics - Context mapping
DDD Basics - Context mappingDDD Basics - Context mapping
DDD Basics - Context mappingStijn Volders
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyDavid J Rosenthal
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusSpencerLuke2
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptxNishmithaHc
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
Securing sensitive data with Azure Key Vault
Securing sensitive data with Azure Key VaultSecuring sensitive data with Azure Key Vault
Securing sensitive data with Azure Key VaultTom Kerkhove
 
Azure role based access control (rbac)
Azure role based access control (rbac)Azure role based access control (rbac)
Azure role based access control (rbac)Srikanth Kappagantula
 
Access Security - Privileged Identity Management
Access Security - Privileged Identity ManagementAccess Security - Privileged Identity Management
Access Security - Privileged Identity ManagementEng Teong Cheah
 
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cOracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cNabeel Yoosuf
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection Syed Sabhi Haider
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint ManagerGeorge Grammatikos
 
Container Security Using Microsoft Defender
Container Security Using Microsoft DefenderContainer Security Using Microsoft Defender
Container Security Using Microsoft DefenderRahul Khengare
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep securityTrend Micro
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information ProtectionRobert Crane
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanDavid J Rosenthal
 

La actualidad más candente (20)

DDD Basics - Context mapping
DDD Basics - Context mappingDDD Basics - Context mapping
DDD Basics - Context mapping
 
Identity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor TechnologyIdentity and Access Management from Microsoft and Razor Technology
Identity and Access Management from Microsoft and Razor Technology
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
M365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skusM365 e3 and identity and threat protection and compliance new skus
M365 e3 and identity and threat protection and compliance new skus
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptx
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
Securing sensitive data with Azure Key Vault
Securing sensitive data with Azure Key VaultSecuring sensitive data with Azure Key Vault
Securing sensitive data with Azure Key Vault
 
Azure role based access control (rbac)
Azure role based access control (rbac)Azure role based access control (rbac)
Azure role based access control (rbac)
 
Access Security - Privileged Identity Management
Access Security - Privileged Identity ManagementAccess Security - Privileged Identity Management
Access Security - Privileged Identity Management
 
Oracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12cOracle Transparent Data Encryption (TDE) 12c
Oracle Transparent Data Encryption (TDE) 12c
 
Microsoft Azure Information Protection
Microsoft Azure Information Protection Microsoft Azure Information Protection
Microsoft Azure Information Protection
 
Working with MS Endpoint Manager
Working with MS Endpoint ManagerWorking with MS Endpoint Manager
Working with MS Endpoint Manager
 
DLP
DLPDLP
DLP
 
Container Security Using Microsoft Defender
Container Security Using Microsoft DefenderContainer Security Using Microsoft Defender
Container Security Using Microsoft Defender
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Azure Information Protection
Azure Information ProtectionAzure Information Protection
Azure Information Protection
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 

Destacado

Data masking in sas
Data masking in sasData masking in sas
Data masking in sasMurphy Choy
 
Using Java & Genetic Algorithms to Beat the Market
Using Java & Genetic Algorithms to Beat the MarketUsing Java & Genetic Algorithms to Beat the Market
Using Java & Genetic Algorithms to Beat the MarketMatthew Ring
 
Data Masking
Data MaskingData Masking
Data MaskingPowerData
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceCapgemini
 
High-Frequency Trading in the FX Market
High-Frequency Trading in the FX MarketHigh-Frequency Trading in the FX Market
High-Frequency Trading in the FX MarketYoshi S.
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessNathaniel Palmer
 
Introduction to metadata management
Introduction to metadata managementIntroduction to metadata management
Introduction to metadata managementOpen Data Support
 

Destacado (9)

Data masking a developer's guide
Data masking a developer's guideData masking a developer's guide
Data masking a developer's guide
 
Data masking in sas
Data masking in sasData masking in sas
Data masking in sas
 
Using Java & Genetic Algorithms to Beat the Market
Using Java & Genetic Algorithms to Beat the MarketUsing Java & Genetic Algorithms to Beat the Market
Using Java & Genetic Algorithms to Beat the Market
 
Data Masking
Data MaskingData Masking
Data Masking
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and Compliance
 
High-Frequency Trading in the FX Market
High-Frequency Trading in the FX MarketHigh-Frequency Trading in the FX Market
High-Frequency Trading in the FX Market
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar Slides
 
Enterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful BusinessEnterprise Architecture Governance: A Framework for Successful Business
Enterprise Architecture Governance: A Framework for Successful Business
 
Introduction to metadata management
Introduction to metadata managementIntroduction to metadata management
Introduction to metadata management
 

Similar a Automate Sensitive Data Masking with DMsuite

Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights ManagementDavid J Rosenthal
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft SolutionHarriet Schneider
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick TourActive Base
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operationsElasticsearch
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted CloudMicrosoft
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreJoel Oleson
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudErik Von Schlehenried
 

Similar a Automate Sensitive Data Masking with DMsuite (20)

Microsoft Azure Rights Management
Microsoft Azure Rights ManagementMicrosoft Azure Rights Management
Microsoft Azure Rights Management
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
Security Quick Tour
Security Quick TourSecurity Quick Tour
Security Quick Tour
 
Datumize Deck 2019
Datumize Deck 2019 Datumize Deck 2019
Datumize Deck 2019
 
Building Elastic into security operations
Building Elastic into security operationsBuilding Elastic into security operations
Building Elastic into security operations
 
Trusted Cloud
Trusted CloudTrusted Cloud
Trusted Cloud
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Make the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloudMake the Upgrade: Data protection in the cloud
Make the Upgrade: Data protection in the cloud
 

Más de Axis Technology, LLC

Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperAxis Technology, LLC
 
Tile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperTile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperAxis Technology, LLC
 
Assessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAssessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAxis Technology, LLC
 
Solution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureSolution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureAxis Technology, LLC
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Axis Technology, LLC
 
Data Architecture Strategy Brochure
Data Architecture Strategy BrochureData Architecture Strategy Brochure
Data Architecture Strategy BrochureAxis Technology, LLC
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningAxis Technology, LLC
 
Axis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology, LLC
 

Más de Axis Technology, LLC (20)

Entitlements Management Strategy-White Paper
Entitlements Management Strategy-White PaperEntitlements Management Strategy-White Paper
Entitlements Management Strategy-White Paper
 
Tile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White PaperTile-based Navigation & Analytics-White Paper
Tile-based Navigation & Analytics-White Paper
 
Assessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White PaperAssessing the Value of Rich Internet-White Paper
Assessing the Value of Rich Internet-White Paper
 
Solution Evaluation & Selection Brochure
Solution Evaluation & Selection BrochureSolution Evaluation & Selection Brochure
Solution Evaluation & Selection Brochure
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure
 
eGRC Strategy Brochure
eGRC Strategy BrochureeGRC Strategy Brochure
eGRC Strategy Brochure
 
Entitlement Management Brochure
Entitlement Management Brochure Entitlement Management Brochure
Entitlement Management Brochure
 
Data Architecture Strategy Brochure
Data Architecture Strategy BrochureData Architecture Strategy Brochure
Data Architecture Strategy Brochure
 
Data Governance Brochure
Data Governance BrochureData Governance Brochure
Data Governance Brochure
 
Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
 
Client Connections
Client Connections Client Connections
Client Connections
 
Brokerage Executive Dashboard
Brokerage Executive DashboardBrokerage Executive Dashboard
Brokerage Executive Dashboard
 
Wealth Management
Wealth ManagementWealth Management
Wealth Management
 
IRA Simplification Project
IRA Simplification ProjectIRA Simplification Project
IRA Simplification Project
 
Data Management Strategy
Data Management StrategyData Management Strategy
Data Management Strategy
 
Joint Analysis Design
Joint Analysis DesignJoint Analysis Design
Joint Analysis Design
 
Enterprise Data Architecture
Enterprise Data Architecture Enterprise Data Architecture
Enterprise Data Architecture
 
Reference Data Management
Reference Data Management Reference Data Management
Reference Data Management
 
Axis Consulting Case Studies
Axis Consulting Case StudiesAxis Consulting Case Studies
Axis Consulting Case Studies
 
Axis Technology - Consulting Overview
Axis Technology - Consulting OverviewAxis Technology - Consulting Overview
Axis Technology - Consulting Overview
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Automate Sensitive Data Masking with DMsuite

  • 1. © Copyright 2013 Axis Technology, LLC DMsuiteDMsuite Data Masking OverviewData Masking Overview know your data • protect your data • share your data
  • 2. DMsuite™ is the proprietary data masking software product by Axis Technology Software, LLC. With DMsuite you can profile, mask, audit, provision and manage your data in a standardized, automated manner. It acts like a water filter, working behind the scenes to replace sensitive data with fictitious data when you copy it out of your production environment. DMsuite represents a major advance over existing one-off scripts to a fully automated, repeatable process.
  • 3. You need data masking when you: • Copy sensitive data outside of production environments • Move your test data to the cloud • Leverage off-shore development/consultants • Send data to the vendors • Need regulatory compliance (HIPAA, PCI DSS) • Respond to that audit item
  • 4. Static Data Masking for Testing What is it? Ensure that Test Environments contain robust test data that has the same characteristics as production without containing any sensitive information Benefits Internal and 3rd Party developers and testers are free from concerns about data breaches. Production Database Real Data Masked Test Database Masked Data 4
  • 5. Migration to Cloud What is it? Organizations want to take advantages of the benefits of cloud computing, but are concerned about data security. Benefits Moving masked test data to the cloud, can provide the benefits of cloud computing to an organization, without the threat of a data leak. Production Database Real Data Masked Test Database In the Cloud Masked Data 5
  • 6. Training What is it? In both BPO and Internal Training situations, students need to have a robust set of data to simulate real world processing Benefits BPO providers and Testing organizations can simulate real world situations without exposing sensitive data Production Database Real Data Masked Test Database Masked Data 6
  • 7. Bringing on New Clients What is it? New clients for Prime Broker, Family Office and other areas require testing prior to going live. Benefits Utilizing DMsuiteTM can facilitate testing while ensuring that sensitive data is protected. Masked Test Database Masked Data 7 Masked Data Masked Data Internal System
  • 8. Protection from Hackers What is it? Hackers pose a great threat to an organization’s data. Many firms house sensitive data in their non- production environments. Benefits Hackers who gain access to masked environments, come away with NOTHING. Organizations can focus their efforts on production environments. Production Database Real Data Masked Test Database Masked Data 8
  • 9. Analytics What is it? Organizations are compiling data from various sources and running them through analytical models. Benefits Utilizing DMsuiteTM can facilitate testing while ensuring that sensitive data is protected. Masked Test Database Masked Data 9 Masked Data Masked Data Analytical System
  • 10. DMsuite™ Static Data Masking DMsuiteTM replaces sensitive data with fictitious but realistic data so only masked data flows through your organization.
  • 11. DMsuite™ Dynamic Data Masking SQL Server or MySQL Real (Unmasked) Values Masked Values 3307 3306 Name: XXXXXXXXX ID Number: XXXX XXX XXXX XXX Status: Active Last Activity: January 3rd , 2013 Last Activity Type: A78 Name: John Smith ID Number: 1234 123 5678 789 Status: Active Last Activity: January 3rd , 2013 Last Activity Type: A78 Data on the database is not changed. Values are masked on their way to the UI. Can be applied to any field. Dynamic data masking only affects select queries and bypasses insert and update queries
  • 12.  Names, Phone, Email  Medicaid Number  Address • Street address, Zip+4 • Care of…, Attn: ...  SSN or other national identifier  Birth date and other dates  Credit card #, bank account #  Comment fields  Customer ID  Internal sequence keys CUSTOMER PII & PATIENT PHI  Pricing, M&A, Contracts  Confidential/Top Secret  Provider Contracts  Actuarial Calculations  Security Identifiers CUSIP, ISIN, SEDOL  trade date  Financials • Price, quantity, legal fees, vendor payments  Assets/holdings  Employee or Corporate ID  Salary, Benefits  HR status (termination, personnel issues)  Family data  Manager information  Cost Center data Who Needs to Mask What Data Any Businesses Falling Under  HIPAA - Healthcare and Pharmaceutical are required to secure Patient Health Information PCI DSS: Credit Card Industry Standard State privacy laws - All companies must follow their own similar to Senate Bill No 1386 – State of California Gramm-Leach-Bliley Financial Services Modernization Act (1999) Sarbanes-Oxley Act (2002) CANADA: Jan 2005 – Personal Information Protection and Electronic Documents Act JAPAN: Apr 2005 – Personal Information Protection Law FRANCE: Oct 2005 – Computing and Liberties Act TYPE I TYPE II COMPANY SECRETS TYPE III Company Data EMPLOYEE
  • 13. DMsuite provides clients with a smart way to secure sensitive data, making it suitable for a large set of tasks without incurring unnecessary risks – Reduces Risk of Breach • Masked data is suitable for numerous business activities. The fewer places real data is stored the lower your risk of a breach. – Reduce by up to 80% the work required to Identify sensitive data • DMsuite Profiler automates Identification of Sensitive Data across databases, copybooks, and files where your sensitive data is stored. – Ideal for Test Data Management (TDM) • Automatically mask production data, with no need to do any programming. – Enables Data Sharing • Share masked data quickly with partners, offshore and outside vendors . – Lowers DBA, Application Development and Testing Costs • With fewer databases to secure and faster data provisioning, reduce your costs to secure sensitive data (vs. Lockdown controls). – Masks ERP and other packaged software • PeopleSoft, Oracle E-Business Suite, Lawson, SAP, Salesforce. DMsuite Value Proposition
  • 14. DMsuite Features A meta-data driven data masking product that automates a repeatable masking framework with powerful features and algorithms. “Shovel Ready” - Supports rapid implementation for a business unit and scalability for the enterprise. Patented 5th-generation masking algorithms designed to mask your data consistently, no matter where or how it is stored. Pre-populated profiles to get your masking program up and running quickly. Uses secure platform-independent technology (Java, XML). Conforms to your data refresh processes. Broad coverage of relational, file masking, big data, and mainframe required for all size enterprises: • Automatic Referential Integrity for all of the supported persistence types Integration features include working with LDAP & Microsoft Active Directory, Kerberos & SiteMinder
  • 15. DMsuite™ Masks …and keeps referential integrity across all of them
  • 16. Test Data Management DMsuite™ data masking enables: – Test Data Management - the risk of a data breach in nonproduction environments is eliminated while still providing the highest quality test data for software development. – Outsourcing, typically puts production data in nonproduction environments for testing, putting client data at risk if it’s not masked. – Consulting companies are getting resistance from their clients regarding accessing sensitive data, since they may work for their clients’ competition as well. – Break/Fix - If a vendor application breaks, fixes can be developed using masked data, eliminating the risk of exposure.
  • 17. DMsuite ROI without DMsuite™TM with DMsuite™TM Effort Time Program Inception Business as Usual Begins Periodic Audit Legend: Automated Analysis Automated Change Capture Automated Audit Safe Re-Masking • Targeted at Information Security professionals, no need to hire additional developers or DBA’s • No impact on Developers because no programming is required! • Makes the DBA’s life easier - only needed for initial configuration • Analysts can identify sensitive data quickly with the DMsuite™ Profiler • Auditors receive DMsuite™ Certification reports to show what data has been masked
  • 18. DMsuite 5-Step Process Application Database with real Production Data Target Environment with Masked Data Step 1 Identify Step 2 Select Step 3 Validate Step 4 Implement Step 5 Certify DM Profiler DM Manager DM Generator DM Applicator DM Auditor 1 2 3 4 5 DM Profiler automatically identifies the location of your sensitive data and assigns masking algorithms. DM Manager is the web application that allows users to manage the masking process or, just click a button to mask your data! DM Generator reads the sensitive data inventory that you built with DM Profiler and DM Manager and generates XML code targeted to your environment. DM Applicator runs the code created by DM Generator on the target platform: typically the DMsuite™ internal engine or other commercial tools. DM Auditor runs Certification jobs that monitor data security. You set up alerts to notify you if any masked data becomes "polluted" with unmasked data.
  • 19. DMsuite Support Axis provides world-class support through our DMsuite™ Customer Support Center – Clients can contact the support center directly: • Toll-free phone , E-mail and Online – Customer Support Plans • Standard – Monday-Friday, Standard business hours • Silver – Monday-Friday, Extended business hours • Gold – 24/7 support – Dedicated support specialist – Direct access to DMsuite Product team – All customer support plans include • Direct access to a Customer Support Specialist • Access to our online customer support center 24/7 • Product updates
  • 20. © Copyright 2013 Axis Technology, LLC know your data • protect your data • share your data www.AxisDMsuite.com Thank You! 70 Federal Streeet Boston, MA 02110 (857) 445-0110 dmsuite@axisdmsuite.com