{"id":17728,"date":"2021-07-12T15:10:24","date_gmt":"2021-07-12T19:10:24","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=17728"},"modified":"2024-07-12T15:24:34","modified_gmt":"2024-07-12T19:24:34","slug":"increasing-sensitive-data-visibility-and-control-best-practices","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/","title":{"rendered":"Increasing Sensitive Data Visibility and Control: Best Practices"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">You might know the old saying, &#8220;What gets measured gets managed.&#8221; It rings true even in the IT sector. But there&#8217;s a catch\u2014how can you manage and measure what you can&#8217;t see?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The struggle is real for IT executives and their internal teams that protect and secure sensitive data. Wrapping your head around the amount of data within an organization is quickly becoming next to impossible.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-17733 alignleft\" style=\"text-align: center;\" src=\"\/blog\/wp-content\/uploads\/2024\/07\/Visualize-and-Secure-Your-Data-300x208.png\" alt=\"\" width=\"368\" height=\"255\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Visualize-and-Secure-Your-Data-300x208.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Visualize-and-Secure-Your-Data-768x534.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Visualize-and-Secure-Your-Data.png 954w\" sizes=\"(max-width: 368px) 100vw, 368px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">These days, organizations are pumping out data by tons. Back in 2020 alone, a staggering <\/span><a href=\"https:\/\/seedscientific.com\/how-much-data-is-created-every-day\/\"><span style=\"font-weight: 400;\">44 zettabytes were churned out daily<\/span><\/a><span style=\"font-weight: 400;\">, and that number is projected to soar to 175 zettabytes a day by 2025.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But the sheer volume isn&#8217;t the primary concern when it comes to data security. The real headache is that this data is scattered far and wide across various on-premises and cloud environments. And to top it off, it comes in various forms and formats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identifying every single byte of data has become tricky, and any data left undefined increases the risk of unauthorized access or misuse.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we&#8217;ll share the best practices you need to employ to improve sensitive data visibility and control, helping your organization stay safe and secure.<\/span><\/p>\n<h4><strong>Comprehensive Data Discovery<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Today&#8217;s enterprise data landscape is more complex than ever, with up to <\/span><a href=\"https:\/\/www.forbes.com\/sites\/bernardmarr\/2019\/10\/16\/what-is-unstructured-data-and-why-is-it-so-important-to-businesses-an-easy-explanation-for-anyone\/?sh=64c4833c15f6\"><span style=\"font-weight: 400;\">90% of it being unstructured<\/span><\/a><span style=\"font-weight: 400;\">\u2014think productivity documents, emails, photos, and social media posts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Wrangling this data has become a real headache, mainly because it&#8217;s scattered across diverse locations, and traditional discovery tools struggle to make sense of it all.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Plus, sensitive data has taken various forms, from credit card details and financial information to personally identifiable information (PII), location data, and even genetic and biometric data.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-17737\" src=\"\/blog\/wp-content\/uploads\/2024\/07\/comprehensive-data-discovery-300x223.png\" alt=\"\" width=\"449\" height=\"334\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/comprehensive-data-discovery-300x223.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/comprehensive-data-discovery-768x571.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/comprehensive-data-discovery.png 805w\" sizes=\"(max-width: 449px) 100vw, 449px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The sheer variety of formats in which this sensitive information is hidden dramatically increases the risk of false-positive alerts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">You might think, &#8220;What&#8217;s the big deal with false positives?&#8221; For the already overburdened IT and security teams, it&#8217;s a huge deal. Imagine sifting through as many as 4,000 alerts per week, only to find that a significant chunk of them is a wild goose chase.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This can eat up <\/span><a href=\"https:\/\/www.bloomberg.com\/press-releases\/2019-08-01\/ponemon-institute-reveals-security-teams-spend-approximately-25-percent-of-their-time-chasing-false-positives-response-times#:~:text=Business-,Ponemon%20Institute%20Reveals%20Security%20Teams%20Spend%20Approximately%2025%20Percent%20of,Chasing%20False%20Positives%3B%20Response%20Times\"><span style=\"font-weight: 400;\">25% of their valuable time<\/span><\/a><span style=\"font-weight: 400;\">. Hundreds, if not thousands, of hours each year are wasted on fruitless investigations, diverting attention from real security threats and more critical IT endeavors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It can <\/span><a href=\"https:\/\/www.iri.com\/products\/darkshield\/technical-details#search\"><span style=\"font-weight: 400;\">discover all data stores, assets<\/span><\/a><span style=\"font-weight: 400;\">, and users, regardless of their location and content. This comprehensive data discovery helps you better understand your data landscape, improving your overall data security posture.<\/span><\/p>\n<h4><strong>Data Classification<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Data discovery and classification are like two peas in a pod\u2014you can&#8217;t have one without the other.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once you have all your data discovered, you have to label it, tag it, and give it visual markers so both humans and machines can figure out how sensitive it is and treat it accordingly. It is sometimes easier to do that the other way around; <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\"><span style=\"font-weight: 400;\">define and then search<\/span><\/a><span style=\"font-weight: 400;\"> for it based on matchers applicable to the data you\u2019ve classified.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These classifications ensure only the right people can get their hands on the sensitive data as it moves through the whole organization. And it also helps with sharing info while keeping it safe with other data protection measures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Understanding sensitive data requires proper security and keeping up with data privacy rules. Data loss prevention (DLP) is not enough, as privacy is not just about losing data; it&#8217;s more than that.<\/span><\/p>\n<h4><strong>Define Access Controls<\/strong><\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-17739 alignright\" src=\"\/blog\/wp-content\/uploads\/2024\/07\/access-control-300x201.png\" alt=\"\" width=\"343\" height=\"230\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/access-control-300x201.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/access-control-768x514.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/access-control.png 893w\" sizes=\"(max-width: 343px) 100vw, 343px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s pretty standard for access to information to get overly restrictive, and we end up with information silos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, there&#8217;s no denying the <\/span><a href=\"https:\/\/www.avigilon.com\/blog\/importance-of-access-control\"><span style=\"font-weight: 400;\">importance of access control<\/span><\/a><span style=\"font-weight: 400;\"> and that there&#8217;s a need for the security and protection of business information, but we also need to find a fair balance with accessibility. Here are a few steps you need to go through to find that balance:<\/span><\/p>\n<h6><span style=\"font-weight: 400;\">Access Control Principles<\/span><\/h6>\n<p><span style=\"font-weight: 400;\">First things first\u2014we need some guiding principles to make sense of it all. These principles can cover things like who gets access (approved by a registered owner), sharing personal data, and deciding access based on roles and groups.<\/span><\/p>\n<h6><span style=\"font-weight: 400;\">Who Determines Access?\u00a0<\/span><\/h6>\n<p><span style=\"font-weight: 400;\">Figure out who&#8217;s in charge of granting access. Do you have some Information Asset Owners who know the whole deal? And are they going to pass on the responsibility to a Line Manager?<\/span><\/p>\n<h6><span style=\"font-weight: 400;\">Who Ensures Appropriate Access Is Implemented?<\/span><\/h6>\n<p><span style=\"font-weight: 400;\">Will it be the helpdesk, or maybe you need some Information Champions to keep an eye on things and ensure access is fair?<\/span><\/p>\n<h6><span style=\"font-weight: 400;\">How Will Access Be Documented?<\/span><\/h6>\n<p><span style=\"font-weight: 400;\">You need to document these access controls so there&#8217;s proof of what access is given to whom. Put it in an Information Asset Register, a helpdesk system, or even Active Directory.<\/span><\/p>\n<h6><span style=\"font-weight: 400;\">How The Access Controls Will Be Implemented<\/span><\/h6>\n<p><span style=\"font-weight: 400;\">Do we have a Business Classification Scheme or an Electronic document and records management system (eDRMS) that&#8217;ll help us get this done?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And when new employees come on board or someone leaves, you need to ensure access is set up, changed, or taken away as needed.<\/span><\/p>\n<h6><span style=\"font-weight: 400;\">Periodic Audit Procedure<\/span><\/h6>\n<p><span style=\"font-weight: 400;\">Regularly check if your access controls are still up to the standards and match what you need. You might need the assistance of the helpdesk or Information Champions in this.<\/span><\/p>\n<h4><strong>Encryption &amp; Data Masking<\/strong><\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-17740 alignleft\" src=\"\/blog\/wp-content\/uploads\/2024\/07\/data-encryption-300x289.png\" alt=\"\" width=\"300\" height=\"289\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/data-encryption-300x289.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/data-encryption.png 580w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-masking-and-data-encryption-are-not-the-same-things\/\">Data encryption and masking<\/a> are powerful techniques to protect sensitive information from unauthorized viewing. It turns your information into unreadable gibberish, so even if someone tries to intrude, they won&#8217;t make heads or tails of it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Consider <\/span><a href=\"https:\/\/cybernews.com\/best-vpn\/most-secure-vpns\/\"><span style=\"font-weight: 400;\">using secure VPN measures<\/span><\/a><span style=\"font-weight: 400;\"> to help you encrypt data during transmission. For the data stored in servers, consider using both endpoint security and data-centric data-at-rest protection solutions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The primary means of data-centric security is <\/span><span style=\"font-weight: 400;\">data masking<\/span><span style=\"font-weight: 400;\">, which substitutes original data with fictional data while maintaining the data&#8217;s format. This way, people like developers can work with the needed data without seeing any sensitive bits. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Masking functions like encryption, redaction, shuffling, and pseudonymization (substitution) are what protect only the most sensitive aspects of data while still maintaining access to the rest.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the best data masking tools we know of is <a href=\"https:\/\/www.iri.com\/products\/darkshield\">IRI DarkShield<\/a>. DarkShield can classify, locate, and mask data in structured, semi-structured, and unstructured sources on-premise and in the cloud using multiple AI-powered search methods and consistent masking rules that preserve data integrity.<\/span><\/p>\n<h4><strong>Real-Time Monitoring &amp; Auditing<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Deploying real-time monitoring and auditing mechanisms allows you to track data access and changes continuously.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It provides insights into who accessed what data. With this real-time insight, you can spot any suspicious activity quickly and nip potential security breaches in the bud.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Regular audits also help maintain compliance with data protection regulations. Review access logs and changes to be sure that your data stays safe and sound.\u00a0<\/span><\/p>\n<p>The IRI Ripcurrent change data capture module in the IRI Voracity data management platform (which also includes DarkShield and FieldShield software) is an available technology solution to <a href=\"https:\/\/www.iri.com\/blog\/migration\/data-migration\/real-time-database-data-replication\/\">masking new data in real-time<\/a>, and notifying DBAs of changes to database structures.<\/p>\n<h4><strong>Wrapping Up<\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Having good data visibility and control means you can do less fixing up when you make bad decisions or oversee any risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following the practices mentioned in the article, you can be sure that your sensitive data is secure, and this protection doesn&#8217;t come in the way of your daily operations, giving you better odds of success.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You might know the old saying, &#8220;What gets measured gets managed.&#8221; It rings true even in the IT sector. But there&#8217;s a catch\u2014how can you manage and measure what you can&#8217;t see? The struggle is real for IT executives and their internal teams that protect and secure sensitive data. Wrapping your head around the amount<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/\" title=\"Increasing Sensitive Data Visibility and Control: Best Practices\">Read More<\/a><\/div>\n","protected":false},"author":210,"featured_media":17742,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,34],"tags":[1842,1844,1081,1841,280,14,18,13,15,1840,203,1845,1843,152],"class_list":["post-17728","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-business","tag-access-control","tag-data-auditing","tag-data-classification","tag-data-control","tag-data-discovery","tag-data-masking","tag-data-privacy","tag-data-protection-2","tag-data-security","tag-data-visibility","tag-encryption","tag-it-security","tag-real-time-monitoring","tag-sensitive-data"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Increasing Sensitive Data Visibility and Control: Best Practices - IRI<\/title>\n<meta name=\"description\" content=\"Learn best practices for improving sensitive data visibility and control via search, classification, access control, masking, and monitoring.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Increasing Sensitive Data Visibility and Control: Best Practices\" \/>\n<meta property=\"og:description\" content=\"Learn best practices for improving sensitive data visibility and control via search, classification, access control, masking, and monitoring.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-12T19:10:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T19:24:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"644\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Cybernews.com Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cybernews.com Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/\"},\"author\":{\"name\":\"Cybernews.com Team\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/6e0ad1d6fb6412cd5e247895108fd7a6\"},\"headline\":\"Increasing Sensitive Data Visibility and Control: Best Practices\",\"datePublished\":\"2021-07-12T19:10:24+00:00\",\"dateModified\":\"2024-07-12T19:24:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/\"},\"wordCount\":1220,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png\",\"keywords\":[\"Access Control\",\"Data Auditing\",\"data classification\",\"Data Control\",\"data discovery\",\"data masking\",\"data privacy\",\"data protection\",\"data security\",\"Data Visibility\",\"encryption\",\"IT Security\",\"Real-Time Monitoring\",\"sensitive data\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/\",\"name\":\"Increasing Sensitive Data Visibility and Control: Best Practices - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png\",\"datePublished\":\"2021-07-12T19:10:24+00:00\",\"dateModified\":\"2024-07-12T19:24:34+00:00\",\"description\":\"Learn best practices for improving sensitive data visibility and control via search, classification, access control, masking, and monitoring.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png\",\"width\":1344,\"height\":644},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Increasing Sensitive Data Visibility and Control: Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/6e0ad1d6fb6412cd5e247895108fd7a6\",\"name\":\"Cybernews.com Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cab62e852aa16425d6bf02e92ed348c9?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cab62e852aa16425d6bf02e92ed348c9?s=96&d=blank&r=g\",\"caption\":\"Cybernews.com Team\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/cybernews\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Increasing Sensitive Data Visibility and Control: Best Practices - IRI","description":"Learn best practices for improving sensitive data visibility and control via search, classification, access control, masking, and monitoring.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Increasing Sensitive Data Visibility and Control: Best Practices","og_description":"Learn best practices for improving sensitive data visibility and control via search, classification, access control, masking, and monitoring.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/","og_site_name":"IRI","article_published_time":"2021-07-12T19:10:24+00:00","article_modified_time":"2024-07-12T19:24:34+00:00","og_image":[{"width":1344,"height":644,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png","type":"image\/png"}],"author":"Cybernews.com Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cybernews.com Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/"},"author":{"name":"Cybernews.com Team","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/6e0ad1d6fb6412cd5e247895108fd7a6"},"headline":"Increasing Sensitive Data Visibility and Control: Best Practices","datePublished":"2021-07-12T19:10:24+00:00","dateModified":"2024-07-12T19:24:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/"},"wordCount":1220,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png","keywords":["Access Control","Data Auditing","data classification","Data Control","data discovery","data masking","data privacy","data protection","data security","Data Visibility","encryption","IT Security","Real-Time Monitoring","sensitive data"],"articleSection":["Data Masking\/Protection","IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/","name":"Increasing Sensitive Data Visibility and Control: Best Practices - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png","datePublished":"2021-07-12T19:10:24+00:00","dateModified":"2024-07-12T19:24:34+00:00","description":"Learn best practices for improving sensitive data visibility and control via search, classification, access control, masking, and monitoring.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png","width":1344,"height":644},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/increasing-sensitive-data-visibility-and-control-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Increasing Sensitive Data Visibility and Control: Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/6e0ad1d6fb6412cd5e247895108fd7a6","name":"Cybernews.com Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cab62e852aa16425d6bf02e92ed348c9?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cab62e852aa16425d6bf02e92ed348c9?s=96&d=blank&r=g","caption":"Cybernews.com Team"},"url":"https:\/\/www.iri.com\/blog\/author\/cybernews\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2024\/07\/Increasing-Sensitive-Data-Visibility-featured-image.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17728"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/210"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=17728"}],"version-history":[{"count":8,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17728\/revisions"}],"predecessor-version":[{"id":17746,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/17728\/revisions\/17746"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/17742"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=17728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=17728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=17728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}