Expanding Your Window of Opportunity

Joe Austin

Subscribe to Joe Austin: eMailAlertsEmail Alerts
Get Joe Austin: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Related Topics: Security Journal, GRC Journal, CSO Information Security Journal

News Item

dataguise Expands Sensitive Data Discovery and Masking for Enterprises

Company to reduce data theft, loss or external breach

dataguise (http://www.dataguise.com), an innovator of security solutions for protecting sensitive data across the enterprise, today announced the next generation of the company's popular dataguise security solution - dgdiscoverTM 3.0 and dgmaskerTM 3.0. Version 3.0 is the industry's first integrated solution for comprehensive sensitive data discovery and masking. It is designed to find structured database repositories across the network, search and discover sensitive data in structured databases, and then mask or de-identify to protect sensitive data.

With dataguise, organizations now have access to a single product that finds, searches and masks sensitive data across all databases throughout the enterprise. This allows organizations to create corporate masking policies for faster adherence to compliance regulations, lower risk of a data breach, and reduced reliance on cumbersome single database masking solutions.

"Sensitive data stored in non-production databases are exposed to abuse or negligence from outsiders but mostly from enterprise employees. Potential abusers, whom data masking aims to deter, are mainly users of test databases (programmers, testers and database administrators)," says Dr. Joseph Feiman, Research Vice President and Gartner Fellow. "Adopting data masking will help enterprises raise the level of security and privacy assurance against insiders' and outsiders' abuses. At the same time, data masking will make enterprises compliant with the security and privacy standards recommended by regulating/auditing organizations."

Find IT, Search IT, and Mask IT.

In many organizations, sensitive information is scattered in unprotected databases and file servers across corporate infrastructure.

Although most enterprises have taken measures to control access to critical data in their production environments, this protection does not always extend to non-production data.   Enterprises are continuously cloning production data to support development, testing, QA and pre-production deployment.  As a result, sensitive data can be inadvertently propagated throughout the extended enterprise. This can include employee data such as Taxpayer IDs, employee names/addresses, and dependent information, customer information such as credit cards and card expiration dates, and intellectual property or classified information. The need to satisfy requirements for regulations such as, HIPAA, PCI and PII as well as data theft prevention and sound governance make it imperative that organizations implement the necessary processes to block exposure of this sensitive information. The first step is finding the databases containing the sensitive data.

Leading organizations, including Amgen (Nasdaq: AMGN), Facebook, John Muir Hospital, and the University of California Berkeley, have turned to dataguise as their partner in the protection against sensitive information loss or theft. dataguise offers the first integrated product offering of its kind to combine both discovery of databases containing sensitive data, identification of the data at risk in the database and Masking In Place (MIP) of the information for seamless security. dgdiscover 3.0 empowers these organizations by quickly determining where sensitive information resides throughout the enterprise and dgmasker 3.0 then de-identifies information targeted for use outside of the production network.

dataguise provides a high level of automation to deliver fast and reliable discovery without extensive management overhead. Unlike alternative offerings, the solution was developed to be simple and user friendly, resulting in a relatively low dependency on professional services for implementation and support. Both dgdiscover and dgmasker scale for use in small and medium size enterprises to the largest multi-national corporations for unlimited enterprise-wide discovery and masking.

Additional benefits of dgdiscover and dgmasker:

  • Rapidly determines where databases are running;
  • Quickly analyzes what tables/columns contain sensitive data for masking recommendation;
  • Easy to deploy enterprise class software without network hardware installation requirements;
  • Searches structured data repositories: Oracle, DB2, SQL Server, MySQL, Teradata, Sybase, MS Access;
  • Searches unstructured data repositories for file formats that include Text, MS Office, PDF, XML, CSV and LOG;
  • Pre-defined templates for PCI, HIPAA, and PII compliance regulations
  • Ability to easily create and add custom policies;
  • Provides an easy-to-interpret graphical summary of search results
  • Secures data in non-production environments;
  • Preserves business data rules so as not to break applications.

"The identification and protection of sensitive information across enterprise networks is a top priority to ensure more complete data protection," said Jim Krantz, President and CEO of Krantz Security Associates, New York City, New York, a leading dataguise reseller. "dataguise mitigates the risk of unauthorized use of information because with masking, the data is usable for testing, but is not associated with sensitive information in any way other than format. In addition to critical protection of information assets, dataguise automation significantly lowers total cost of ownership compared to alternatives for unmatched ease-of-use, value and security."

"Prevention of unauthorized use of privileged corporate information is a mandatory business directive in industries covered under rigid compliance mandates. This is especially true in the healthcare, biotech, government, and insurance industries," said Allan Thompson, SVP, BD, Marketing & Product Strategy for dataguise. "No other solution combines the DNA of structured and unstructured database knowledge with security, and provides the breadth and depth of dataguise in finding, searching and removing sensitive data from unauthorized access. For organizations under strict regulatory guidelines, dataguise brings a critical security layer that ensures conformity."

Pricing and Availability

The dataguise security solution, featuring dgdiscover 3.0 and dgmasker 3.0, is available immediately with pricing based on environment and configuration. Organizations with security concerns reviewed in this announcement can learn more about dataguise by visiting www.dataguise.com.

More Stories By Joe Austin

Joe Austin is Vice President, Client Relations, at Ventana Public Relations. He joined Ventana PR in 2006 with more than 14 years experience in high-tech strategic communications. His media relations experience spans both broadcast and print, and he maintains longstanding relationships with editors and reporters at business, IT, channel, and vertical publications. Austin's relationship with the media includes marquee outlets including CNN, BusinessWeek, USA Today, Bloomberg, and the Associated Press for clients ranging from startups to billion-dollar enterprises. Experience includes working with Maxell, McDATA (Acquired by Brocade), Center for Internet Security, Securent (Acquired by Cisco), Intrepidus Group/PhishMe, FireEye, Mimosa Systems, Xiotech, MOLI.com, EMC/Rainfinity, Spinnaker Networks (Acquired by NetApp), ONStor, Nexsan, Asigra, Avamar (Acquired by EMC), BakBone Software, Dot Hill, SANRAD, Open-E and others. With more than a decade of strategic planning, media tours, press conferences, and media/analyst relations for companies in the data storage, security, server virtualization, IT outsourcing and networking arenas, Austin's domain expertise assists in positioning clients for leadership. Austin was recently recognized as a “Top Tech Communicator” for the second year in a row by PRSourceCode. The editorial community – represented by more than 300 participating IT journalists – rated each winner based on best overall performance and recognized those who added the most value to their editorial processes in terms of responsiveness, reliability, and overall understanding of editorial needs.