
Using Selection to Reduce Data Bulk (and Improve Data…
One of the best ways to speed up big data processing operations is to not process so much data in the first place; i.e. to eliminate unnecessary data ahead of time. Read More
One of the best ways to speed up big data processing operations is to not process so much data in the first place; i.e. to eliminate unnecessary data ahead of time. Read More
According to Trent Henry of the Burton Group,
Data protection needs to take into account both internal and external threats, including those against critical database and application resources. Read More
Editors Note: This article covers redacting PII and sensitive information. Specifically, it explains the full or partial column/field redaction of strings in structured databases or flat files. Read More
Summary
The protection of sensitive information and data loss prevention (DLP) are critical elements of modern data governance. IRI’s FieldShield is a uniquely versatile tool for securing sensitive fields in database tables and flat files with a choice of protections that operate according to business rules to de-identify or remove individualizing characteristics, without cutting off access to the rest of the data or changing their basic appearance. Read More
Protecting Data at Rest and in Motion
Database applications that update and query tables may need to secure data going into, or being retrieved from, those tables. Read More
In the course of protecting personally identifiable information (PII) moving into and out of databases, FieldShield and CoSort typically externalize protection of the full table(s) they connect to. Read More
Editor’s Note: Note that this article refers to older but still supported methods for obfuscating PII elements like dates of birth and ages in IRI FieldShield. Read More
Data at Rest is Data at Risk. Mitigate the Risk through Data-Centric Security
Data Risk Mitigation … the need for it is on the rise in the United States and around the globe. Read More
Encryption key management is one of the most important “basics” for an organization dealing with security and privacy protection. Major data losses and regulatory compliance requirements have prompted a dramatic increase in the use of encryption within corporate data centers. Read More
Data privacy breaches are becoming more and more prevalent and common in the United States today. Â Did you know that on average, as many as 72,000 documented breaches of personally identifiable information (i.e. Read More