Bigger Information Protection on System z - Extending privacy, audit and compliance for big data initiatives
Melissa Stevens 270005B76W MELISSAS@US.IBM.COM | | Tags:  ibmsecurity system-z big-data data-security privacy compliance
0 Comments | 3,596 Visits
This post is courtesy of Mark Simmonds, Product Marketing for Data Governance and System z.
Previously I talked about the security of information and highlighted some of the capabilities among others of the InfoSphere Guardium solution for the System z platform. The latest release has added support for big data feeds like Hadoop. So your compliance, security and audit capabilities on data moving between System z and other platforms continues its pervasiveness . Being an enterprise wide solution supporting many different platforms and vendor databases you might expect it to be complex but it is architected in an elegant way that makes it seem so logical. The latest version incorporates enhancement that makes the fulfillment, installation, operation and support of the solution ever simpler. The best way to find out is to sign up for the webcast below (oh and you get a complementary white paper afterwards)….
Moving on... when we hear the term 'security breaches' we are inclined to think about hackers and external threats trying to hack your mainframe or other data - and while that's true we often overlook what happens during the development and testing of applications. It only takes a member of the team to leave a test data report containing personal identifiable information lying on a desk or left open on a screen and a person's identity could be compromised. Many IT shops believe the only real way to really and thoroughly test applications or business processes is to use real data and after all, you can trust your own employees right? . Ehhhh No. Data can be breached maliciously or accidentally. So how can you protect your data from such incidents?
Masking or de-identifying the data renders it useless if stolen because personally identifiable information is no longer real - being replaced with fictitious generated data values. But that is only part of the problem. That data needs to maintain its referential integrity after it has been masked and it still needs to retain its behavioral characteristics such as structure of say a credit card, the built in check sums, zip, date of birth, social security number formats. Then you have the issue of what happens should you need to refresh the data.
So, are you looking to get started? IBM InfoSphere Optim Data Masking and Test Data Management solutions for System z may be just what you are looking for. So I’ll keep it simple - watch this short video below of how the solution works along with technical and business benefits it can bring to your organization. For more information, you can also register to attend our December 18, 2012 webcast, "Proactive, preventive real time monitoring of information systems."