Protecting Data in a Spooky world Data Masking Technologies DAMA RMC Oct. 29, 2014
|
|
|
- Amberly Bishop
- 9 years ago
- Views:
Transcription
1 Business Glossary Business Intelligence Data Architecture Master Data Management Protecting Data in a Spooky world Data Masking Technologies DAMA RMC Oct. 29, 2014 Aspen Information Solutions, Inc Lowell W. Fryman
2 Agenda What is Data Masking How do we Mask data What is the Value What are the different types of Data Masks Discuss some of the leading Technologies 2
3 What is Data Masking Data Masking is used to help protect sensitive data at rest and in transit from insiders and outsiders abuse Helps protect from abuse and negligence sensitive data such as Credit card numbers Social Security numbers Sensitive Personal data (PSI/PSI) Health data (diagnoses/ treatments) Other financial data Adapting data masking technology and processes helps raise the level of security and privacy assurance Data Masking is also called data obfuscation, sanitization, scrambling, deidentification, or deauthenticiation 3
4 How do we use the technology Data Masking should be used as an integrated portfolio of data security technologies Data Masking helps meet compliance requirements imposed as audit, security and privacy standards Data Masking prevents abuse by hiding data. Data Masking techniques include Substitution: Replacing characters with similar looking characters Masking: Replacing characters with masking characters ( x ) Replacing last names with fictional last names (Konabi) Shuffling: Reshuffling data in the database columns (random shuffle of characters) Number and Date variance: Apply variance algorithm Null out: Null or delete data in certain columns Encryption 4
5 Current Environment Data Breaches Could Data Masking have helped Target Norstroms Home Depot Florida Law (when will it be adapted by others) Financial Crimes/AML Laws 5
6 Types of Data Masking Static data masking (SDM) Applies masking technology to the physical data being stored. Used mostly to deter misuse in non-production databases. Most popular form for protecting data in development and test environments. Most mature technology Dynamic data masking (DDM) Used on production data in real time Typically a DDM Monitor intercepts each request to the database and analyzes it. The Monitor modifies the database response by masking the sensitive data based upon the masking rules and user entitlements. No physical database changes are done Data Redaction Used to mask unstructured content such as documents, PDF and spreadsheets 6
7 Gartner Magic Quadrant The Leader Quadrant IBM Informatica Oracle Other Interesting Firms Camouflage Software (Challenger) Dataguise (Visionary) Voltage Security (Visionary) 7
8 Example - Shuffling Let s take my Name and shuffle it Shuffling each character with the third character First character goes to 4 th 4 th goes to 1 st 2 nd goes to 5 th 5 th goes to 2nd Lowell Fryman (one name column) ELLLOWYMA FR N With First Name and Last Name columns ELLLOW (FIRST) MANFRY (LAST) 8
9 Gartner MQ for Masking Technologies Leaders IBM Informatica Oracle Challengers Camouflage Software Visionaries Dataguise Voltage Security 9
10 IBM Acquired Princeton Softech in 2007 Combined with acquisition of Guardium in 2009 to accelerate development of DDM InfoSphere Guardium Data Activity Monitor or InfoSphere Optim Data Privacy is DDM Largest installed base of SDM Great support within the Rational and InfoSphere suites Generally on consumers short lists New pricing model based upon volume of masked data Technical skills are inconsistent, products are complex Masking for Big Data platforms available since Q
11 Informatica Acquired Applimation in 2009 for SDM Acquired ActiveBase in 2011 for DDM SDM product is Informatica Persistent Data Masking DDM product is Informatica Dynamic Data Masking One of the largest SDM installed base Also offers data redaction In Q announced DDM support for Hadoop, Cloudera, Hortonworks, and MapR Newer lower priced cloud-based solutions Technical support skills reported as lacking 11
12 Oracle SDM product is Oracle Data Masking Pack High performance in masking data in an Oracle DB Strong adoption of Oracle Enterprise Manager promotes the Data Masking Pack DDM product is Oracle Data Redaction (part of the Advanced Security offereing) Oracle Database Gateway must be part of the solution Data Redaction not offered as a tool but offer a set of APIs Masking for Big Data only in Oracle Big Data Appliance 12
13 Camouflage Software An early stage vendor releasing SDM in 2004 See Product is Data Masking Lifecycle Management Suite Product and customization services Strong product reputation and technical support Willingness to work with developers and testers SDM is User-friendly, easy to learn, flexible to install Just started to offer DDM, data redaction limited to Excel Small network of partners Does not have other data management technologies 13
14 Dataguise SDM vendor since 2007 SDM product is DgSecure Easy to learn, user-friendly, with flexible masking rule engine Can be used with Big Data platforms Strong partner, Compuware, uses DgSecure in its SDM service offerings Strong customer service One of the pioneers in Hadoop data masking Recent large VC investments Masks a limited number of databases 14
15 Voltage Security Voltage Security focuses on encryption and data tokenization Voltage SecureData Enterprise uses Format-Perserving Encryption (FPE) and Secure Stateless Tokenization (SST) The product provides data masking functionality for production and non-production SDM masking capabilities provided via APIs to ETL tools like Informatica PowerCenter Voltage FPE is innovative and its AES-FFX cipher mode is being standardized by NIST Voltage FPE can be reversed or made irrevsible Available for Hadoop, certified for Cloudera and Hortonworks 15
16 Contact for Additional Information Lowell W. Fryman
Magic Quadrant for Data Masking Technology, Worldwide
G00273093 Magic Quadrant for Data Masking Technology, Worldwide Published: 22 December 2015 Analyst(s): Ayal Tirosh, Marc-Antoine Meunier Organizations should use data masking to protect sensitive data
Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data
Building Confidence in Big Data Innovations in Information Integration & Governance for Big Data IBM Software Group Important Disclaimer THE INFORMATION CONTAINED IN THIS PRESENTATION IS PROVIDED FOR INFORMATIONAL
Why Add Data Masking to Your IBM DB2 Application Environment
Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise
DBKDA 2012 : The Fourth International Conference on Advances in Databases, Knowledge, and Data Applications
Evaluation of Data Anonymization Tools Sergey Vinogradov Corporate Technology Siemens LLC Saint-Petersburg, Russia [email protected] Alexander Pastsyak Corporate Technology Siemens LLC Saint-Petersburg,
Data-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
INSERT COMPANY LOGO HERE. 2015 North American Big Data Analytics Product Leadership Award
2015 INSERT COMPANY LOGO HERE 2015 North American Big Data Analytics Product Leadership Award Contents Background and Company Performance... 3 Industry Challenges... 3 Product Family Attributes and Business
FREQUENTLY ASKED QUESTIONS
7650 W COURTNEY CAMPBELL CAUSEWAY, SUITE 950 TAMPA, FLORIDA 33607 ULTRAMATICS.COM 813.891-0300 FREQUENTLY ASKED QUESTIONS Questions: Business... 2 What does it take to deploy PCI-G from the standpoint
Data Sanitization Techniques
Abstract Data Sanitization is the process of making sensitive information in non-production databases safe for wider visibility. This White Paper is an overview of various techniques which can be used
Integrated Data Management: Discovering what you may not know
Integrated Data Management: Discovering what you may not know Eric Naiburg [email protected] Agenda Discovering existing data assets is hard What is Discovery Discovery and archiving Discovery, test
Streamlining Information Protection Through a Data-centric Security Approach
WHITE PAPER Streamlining Information Protection Through a Data-centric Security Approach Overview The sophistication and persistence of criminal attacks on online systems is growing, along with government
Data-Centric security and HP NonStop-centric ecosystems. Andrew Price, XYPRO Technology Corporation Mark Bower, Voltage Security
Title Data-Centric security and HP NonStop-centric ecosystems A breakthrough strategy for neutralizing sensitive data against advanced threats and attacks Andrew Price, XYPRO Technology Corporation Mark
HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015
Copyright 2015Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted HP Atalla Data-Centric Security & Encryption Solutions Jean-Charles
Business Glossary. Data Governance; Yet there is a ton of Technology. Aspen Information Solutions, Inc Castle Rock 720 352-8575 www.aspensols.
Business Glossary Business Intelligence Data Architecture Master Data Management Data Governance; It s all about the People and Process Yet there is a ton of Technology Aspen Information Solutions, Inc
Beyond the Single View with IBM InfoSphere
Ian Bowring MDM & Information Integration Sales Leader, NE Europe Beyond the Single View with IBM InfoSphere We are at a pivotal point with our information intensive projects 10-40% of each initiative
Understanding and Selecting Data Masking Solutions: Creating Secure and Useful Data
Understanding and Selecting Data Masking Solutions: Creating Secure and Useful Data Version 1.0 Released: August 10, 2012 Securosis, L.L.C. 515 E. Carefree Blvd. Suite #766 Phoenix, AZ 85085 T 602-412-3051
Big Data, Meet Enterprise Security
WHITE PAPER Big Data, Meet Enterprise Security Will Data Security and Compliance Issues Put Big Data Developments on Hold? Large organizations worldwide are working to develop and deploy Big Data analytical
Market Guide for Data-Centric Audit and Protection
G00263059 Market Guide for Data-Centric Audit and Protection Published: 21 November 2014 Analyst(s): Brian Lowans, Earl Perkins Organizations that have not developed data-centric security policies to coordinate
Mainframe Data Protection in an Age of Big Data, Mobile, and Cloud Computing
SOLUTION BRIEF Mainframe Data Protection in an Age of Big Data, Mobile, and Cloud Computing Compelling business value propositions such as improved time-to-insight, customer access, business agility, and
IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS!
The Bloor Group IBM AND NEXT GENERATION ARCHITECTURE FOR BIG DATA & ANALYTICS VENDOR PROFILE The IBM Big Data Landscape IBM can legitimately claim to have been involved in Big Data and to have a much broader
Big Data Technologies Compared June 2014
Big Data Technologies Compared June 2014 Agenda What is Big Data Big Data Technology Comparison Summary Other Big Data Technologies Questions 2 What is Big Data by Example The SKA Telescope is a new development
HIPAA and HITECH Compliance Simplification. Sol Cates CSO @solcates [email protected]
HIPAA and HITECH Compliance Simplification Sol Cates CSO @solcates [email protected] Quick Agenda Why comply? What does Compliance look like? New Cares vs Rental Cars vs Custom Cars Vormetric Q&A Slide
Sophos Acquires Cyberoam
Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems
IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems Proactively address regulatory compliance requirements and protect sensitive data in real time Highlights Monitor and audit data activity
The Informatica Solution for Data Privacy
The Informatica Solution for Data Privacy Enforcing Data Security in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential Information
IBM Software Four steps to a proactive big data security and privacy strategy
Four steps to a proactive big data security and privacy strategy Elevate data security to the boardroom agenda Contents 2 Introduction You ve probably heard the saying Data is the new oil. Just as raw
InfoSphere Governance Solutions Maximizing your Information Supply Chain
Kimberly Madia, IBM InfoSphere Product Marketing [email protected], 412-667-3256 InfoSphere Governance Solutions Maximizing your Information Supply Chain Information Management Version 2010.09.03 What
Ensure PCI DSS compliance for your Hadoop environment. A Hortonworks White Paper October 2015
Ensure PCI DSS compliance for your Hadoop environment A Hortonworks White Paper October 2015 2 Contents Overview Why PCI matters to your business Building support for PCI compliance into your Hadoop environment
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud - Practical advice for cloud data security Ulf Mattsson CTO, Protegrity [email protected] Ulf Mattsson, Protegrity CTO Cloud Security Alliance
Synergic Partners: Spanish big-data pioneer
Synergic Partners: Spanish big-data pioneer Analyst: Katy Ring 20 Mar, 2015 Synergic Partners offers a services portfolio around data engineering, big data and data science. The company focuses on business
IBM Software Five steps to successful application consolidation and retirement
Five steps to successful application consolidation and retirement Streamline your application infrastructure with good information governance Contents 2 Why consolidate or retire applications? Data explosion:
Test Data Management in the New Era of Computing
Test Data Management in the New Era of Computing Vinod Khader IBM InfoSphere Optim Development Agenda Changing Business Environment and Data Management Challenges What is Test Data Management Best Practices
Data Security: Strategy and Tactics for Success
Data Security: Strategy and Tactics for Success DatabaseVisions,Inc. Fairfax, Va Oracle Gold Partner Solution Provider Oracle Security Specialized www.databasevisions.com Overview Cloud Computing presents
Oracle Identity Management Securing The New Digital Experience
Oracle Identity Management Securing The New Digital Experience Security: User Single Sign-On, Certifying User Access, and Masking Sensitive Data Henry Anzarouth Principal Sales Consultant, Security and
Introduction to Datawarehousing
DIPARTIMENTO DI INGEGNERIA INFORMATICA AUTOMATICA E GESTIONALE ANTONIO RUBERTI Master of Science in Engineering in Computer Science (MSE-CS) Seminars in Software and Services for the Information Society
Industry Models and Information Server
1 September 2013 Industry Models and Information Server Data Models, Metadata Management and Data Governance Gary Thompson ([email protected] ) Information Management Disclaimer. All rights reserved.
Best practices for protecting Enterprise Information in BigData & Datawarehouse. Anwar Ali, Senior Solution Consultant, Information Management
Best practices for protecting Enterprise Information in BigData & Datawarehouse Anwar Ali, Senior Solution Consultant, Information Management Big data a growing phenomenon data every day 12+ TBs of tweet
How to Choose the Right Security Information and Event Management (SIEM) Solution
How to Choose the Right Security Information and Event Management (SIEM) Solution John Burnham Director, Strategic Communications and Analyst Relations IBM Security Chris Meenan Director, Security Intelligence
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
Data Governance and Big Data - A Necessary Convergence. Richard Goldberg Chief Data Governance Officer Citibank Global Consumer Bank
Governance and Big - A Necessary Convergence Richard Goldberg Chief Governance Officer Citibank Global Consumer Bank Governance and Big A Necessary Convergence As our businesses continue to expand its
Ragy Magdy Regional Channel Manager MEA IBM Security Systems
Ragy Magdy Regional Channel Manager MEA IBM Security Systems 1 Started my career in Security in 2003 by Joining ISS 2005 was named the ISS Regional Manager for the Middle East 2006 ISS was acquired by
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Mobile, Cloud, Advanced Threats: A Unified Approach to Security
Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or
Data Masking: A baseline data security measure
Imperva Camouflage Data Masking Reduce the risk of non-compliance and sensitive data theft Sensitive data is embedded deep within many business processes; it is the foundational element in Human Relations,
Data Masking. Cost-Effectively Protect Data Privacy in Production and Nonproduction Systems. brochure
Data Masking Cost-Effectively Protect Data Privacy in Production and Nonproduction Systems brochure How Can Your IT Organization Protect Data Privacy? The High Cost of Data Breaches It s estimated that
Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance
Klarna Tech Talk: Mind the Data! Jeff Pollock InfoSphere Information Integration & Governance IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
All Things Oracle Database Encryption
All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda Database Encryption
Analytics framework: creating the data-centric organisation to optimise business performance
Research Report Analytics framework: creating the data-centric organisation to optimise business performance October 2013 Justin van der Lande 2 Contents [1] Slide no. 5. Executive summary 6. Executive
Luncheon Webinar Series May 13, 2013
Luncheon Webinar Series May 13, 2013 InfoSphere DataStage is Big Data Integration Sponsored By: Presented by : Tony Curcio, InfoSphere Product Management 0 InfoSphere DataStage is Big Data Integration
Expert Oracle Application. Express Security. Scott Spendolini. Apress"
Expert Oracle Application Express Security Scott Spendolini Apress" Contents Foreword About the Author About the Technical Reviewer Acknowledgments Introduction xv xvii xix xxi xxiii BChapter 1: Threat
VORMETRIC DATA SECURITY PLATFORM ARCHITECTURE
VORMETRIC DATA SECURITY PLATFORM ARCHITECTURE Vormetric, Inc. 2545 N. 1st Street, San Jose, CA 95131 United States: 888.267.3732 United Kingdom: +44.118.949.7711 Singapore: +65.6829.2266 [email protected]
IBM InfoSphere Optim Data Masking solution
IBM InfoSphere Optim Data Masking solution Mask data on demand to protect privacy across the enterprise Highlights: Safeguard personally identifiable information, trade secrets, financials and other sensitive
Big Data Management and Security
Big Data Management and Security Audit Concerns and Business Risks Tami Frankenfield Sr. Director, Analytics and Enterprise Data Mercury Insurance What is Big Data? Velocity + Volume + Variety = Value
Automatic Encryption With V7R1 Townsend Security
Automatic Encryption With V7R1 Townsend Security 724 Columbia Street NW, Suite 400 Olympia, WA 98501 360.359.4400 THE ENCRYPTION COMPANY 25 years experience data communication and data security Recognized
8 Steps to Holistic Database Security
Information Management White Paper 8 Steps to Holistic Database Security By Ron Ben Natan, Ph.D., IBM Distinguished Engineer, CTO for Integrated Data Management 2 8 Steps to Holistic Database Security
Big Data Multi-Platform Analytics (Hadoop, NoSQL, Graph, Analytical Database)
Multi-Platform Analytics (Hadoop, NoSQL, Graph, Analytical Database) Presented By: Mike Ferguson Intelligent Business Strategies Limited 2 Day Workshop : 25-26 September 2014 : 29-30 September 2014 www.unicom.co.uk/bigdata
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance
Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics
Effective Data Governance
perspective Effective Data Governance Abstract Data governance is no more just another item that is good to talk about and nice to have, for global data management organizations. This PoV looks into why
Informatica and our product strategy
Informatica and our product strategy Piotr Skowronski April 2015 2015 Sales Plays: Power the -Ready Enterprise Business Imperatives Improved Decisions Cross-Sell Up-Sell Mergers & Acquisitions Business
IMS Test Data Management. Virtual IMS User Group 4 February 2014
IMS Test Data Management Virtual IMS User Group 4 February 2014 John B Boyle Informatica Software Abstract This session will look at the issues and challenges facing IT Development related to the creation
IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop
Planning a data security and auditing deployment for Hadoop 2 1 2 3 4 5 6 Introduction Architecture Plan Implement Operationalize Conclusion Key requirements for detecting data breaches and addressing
How To Use Vormetric.Com To Protect Your Data From Hackers
Data Sheet Vormetric Data Security Platform The makes it efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, products can be deployed individually,
Parallel Data Warehouse
MICROSOFT S ANALYTICS SOLUTIONS WITH PARALLEL DATA WAREHOUSE Parallel Data Warehouse Stefan Cronjaeger Microsoft May 2013 AGENDA PDW overview Columnstore and Big Data Business Intellignece Project Ability
Protecting Enterprise Data In Hadoop HPE SecureData for Hadoop
Protecting Enterprise Data In Hadoop HPE SecureData for Hadoop Introduction Big Data is an exciting concept and emerging set of technologies that hold seemingly unlimited promise to enable organizations
Big Data, Integration and Governance: Ask the Experts
Big, Integration and Governance: Ask the Experts January 29, 2013 1 The fourth dimension of Big : Veracity handling data in doubt Volume Velocity Variety Veracity* at Rest Terabytes to exabytes of existing
IBM Software Top tips for securing big data environments
IBM Software Top tips for securing big data environments Why big data doesn t have to mean big security challenges 2 Top Comprehensive tips for securing data big protection data environments for physical,
Contents. Pentaho Corporation. Version 5.1. Copyright Page. New Features in Pentaho Data Integration 5.1. PDI Version 5.1 Minor Functionality Changes
Contents Pentaho Corporation Version 5.1 Copyright Page New Features in Pentaho Data Integration 5.1 PDI Version 5.1 Minor Functionality Changes Legal Notices https://help.pentaho.com/template:pentaho/controls/pdftocfooter
Voltage Secure Stateless Tokenization
WHITE PAPER Voltage Secure Stateless Tokenization DATA PROTECTION AND PCI SCOPE REDUCTION FOR TODAY S BUSINESSES Introduction Cyber criminals have proved adept at thwarting existing IT defenses and exploiting
Data Integration Checklist
The need for data integration tools exists in every company, small to large. Whether it is extracting data that exists in spreadsheets, packaged applications, databases, sensor networks or social media
Integrating Netezza into your existing IT landscape
Marco Lehmann Technical Sales Professional Integrating Netezza into your existing IT landscape 2011 IBM Corporation Agenda How to integrate your existing data into Netezza appliance? 4 Steps for creating
End to End Solution to Accelerate Data Warehouse Optimization. Franco Flore Alliance Sales Director - APJ
End to End Solution to Accelerate Data Warehouse Optimization Franco Flore Alliance Sales Director - APJ Big Data Is Driving Key Business Initiatives Increase profitability, innovation, customer satisfaction,
Securing and protecting the organization s most sensitive data
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
Data-Centric Security Key to Cloud and Digital Business
Data-Centric Security Key to Cloud and Digital Business Ulf Mattsson CTO, Protegrity Ulf.Mattsson AT protegrity.com Ulf Mattsson, Protegrity CTO Cloud Security Alliance (CSA) PCI Security Standards Council
Encryption is Fundamental: A Technical Overview of Guardium Data Encryption October 2014
IBM Security Systems Encryption is Fundamental: A Technical Overview of Guardium Data Encryption October 2014 Tim Parmenter InfoSphere Guardium Technical Professional Mark Jamison Accelerated Value Specialist
Washington State s Use of the IBM Data Governance Unified Process Best Practices
STATS-DC 2012 Data Conference July 12, 2012 Washington State s Use of the IBM Data Governance Unified Process Best Practices Bill Huennekens Washington State Office of Superintendent of Public Instruction,
Paxata Security Overview
Paxata Security Overview Ensuring your most trusted data remains secure Nenshad Bardoliwalla Co-Founder and Vice President of Products [email protected] Table of Contents: Introduction...3 Secure Data
