Data Masking. Cost-Effectively Protect Data Privacy in Production and Nonproduction Systems. brochure



Similar documents
The Informatica Solution for Data Privacy

Test Data Management for Security and Compliance

Informatica Dynamic Data Masking

Informatica Application Information Lifecycle Management

Informatica Application Information Lifecycle Management

Enterprise Data Integration

Enforce Governance, Risk, and Compliance Programs for Database Data

Safeguarding Sensitive Data in State and Local Governments

Upgrade to Oracle E-Business Suite R12 While Controlling the Impact of Data Growth WHITE PAPER

Data Center Consolidation in the Public Sector

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Informatica Solutions for Healthcare Providers. Unlock the Potential of Data Driven Healthcare

Preemptive security solutions for healthcare

White Paper. Successful Legacy Systems Modernization for the Insurance Industry

Informatica Master Data Management

5 Ways Informatica Cloud Data Integration Extends PowerCenter and Enables Hybrid IT. White Paper

The Informatica Platform for Data Driven Healthcare

Managing Data Growth in Oracle E-Business Suite with Data Archiving and Test Data Management. White Paper

IBM InfoSphere Optim Data Masking solution

Why Add Data Masking to Your IBM DB2 Application Environment

Informatica PowerCenter The Foundation of Enterprise Data Integration

Complete Database Security. Thomas Kyte

Informatica Data Quality Product Family

Data Masking Best Practices

Informatica Application Retirement

IBM InfoSphere Optim Test Data Management

IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite

Enhance visibility into and control over software projects IBM Rational change and release management software

The Informatica Platform for Data Driven Healthcare

IBM Software Five steps to successful application consolidation and retirement

Informatica Proactive Monitoring for PowerCenter Operations

Secure Data Transmission Solutions for the Management and Control of Big Data

Supply Chain Management Build Connections

Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?

How To Improve Your Communication With An Informatica Ultra Messaging Streaming Edition

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

How To Achieve Pca Compliance With Redhat Enterprise Linux

Data-Centric Security vs. Database-Level Security

The Informatica Solution for Improper Payments

Enable Business Agility and Speed Empower your business with proven multidomain master data management (MDM)

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Top Five Reasons Not to Master Your Data in SAP ERP. White Paper

Beyond the Single View with IBM InfoSphere

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

<Insert Picture Here> Oracle Database Security Overview

IBM InfoSphere Optim Test Data Management Solution

ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary

PCI DSS Top 10 Reports March 2011

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

A Road Map to Successful Customer Centricity in Financial Services. White Paper

Replicating Salesforce.com Data for Operational Reporting and Compliance WHITE PAPER

Windows Least Privilege Management and Beyond

Provide access control with innovative solutions from IBM.

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

White Paper. Data Quality: Improving the Value of Your Data

Symantec Residency and Managed Services

From Lab to Factory: The Big Data Management Workbook

SafeNet DataSecure vs. Native Oracle Encryption

Accenture Enterprise Services for Chemicals. Delivering high performance in enterprise resource planning

Test Data Management in the New Era of Computing

Healthcare Data Management

What Your CEO Should Know About Master Data Management

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Informatica Data Quality Product Family

Choosing the Right Master Data Management Solution for Your Organization

Authentication Strategy: Balancing Security and Convenience

Securing and protecting the organization s most sensitive data

Log Management Solution for IT Big Data

PCI DSS Reporting WHITEPAPER

Informatica PowerCenter Data Virtualization Edition

Data Governance Implementation

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Data Sheet: Disaster Recovery Veritas Volume Replicator by Symantec Data replication for disaster recovery

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

Symantec Control Compliance Suite Standards Manager

data sheet ORACLE DAILY BUSINESS INTELLIGENCE

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

AD Management Survey: Reveals Security as Key Challenge

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

10 Building Blocks for Securing File Data

Outsourcing Payment Security. How outsourcing security technology is changing the face of epayment acceptance practices

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

SAP Solution Brief SAP Solutions for Sustainability. Pave the Way for IT Innovation by Reducing Cost, Risk, and Energy Use

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

IBM Security Privileged Identity Manager helps prevent insider threats

Accelerating PCI Compliance

BUSINESS INTELLIGENCE ANALYTICS

Enabling Secure, Diverse Communications for B2B and B2C Organizations

Technology. Accenture Infrastructure Outsourcing Services

Transcription:

Data Masking Cost-Effectively Protect Data Privacy in Production and Nonproduction Systems brochure

How Can Your IT Organization Protect Data Privacy? The High Cost of Data Breaches It s estimated that more than half of the data that businesses and government organizations create and collect can be classified as sensitive or even confidential. This data includes personal information such as names, addresses, Social Security numbers as well as financial information, such as revenue projections, customer purchasing histories, and pricing information. You can t open a newspaper these days without reading yet another story about a data breach at a major corporation or government agency. Data breaches can cost millions in fines, lost revenues, and damaged reputations. Data security officers, database administrators, and other security specialists do their best to anticipate internal and external threats and guard against them. But the opportunities for data breaches are as vast as their costs. Sensitive information is shared throughout your organization internally among your business users, IT teams, and developers and externally with consultants, business partners, and outsourcing/offshore teams. Your IT organization needs to protect all this sensitive information, regardless of where or with whom it resides, to comply with a veritable alphabet soup of data privacy regulations (e.g., PCI DSS, GLB, EU Data Protection Directive). Informatica Dynamic Data Masking ensures that both IT and business users using applications and tools access personal information on a need-to-know basis. Kobi Hirsh, Chief Information Security Officer Partner Communications Company Limited The Special Vulnerability of Near Production and Nonproduction Environments With so much critical data being stored and copied, databases have become targets for data breaches. Near production and nonproduction environments, including data warehouses, clones, replications, testing, training, and QA environments, are particularly vulnerable because they are often copies of production environments or contain production data. When testers either an in-house team or a third-party vendor are given copies of databases to test or develop against, the data breach risk skyrockets. In addition to the security risk, creating a complete copy of production data for nonproduction environments is inefficient and expensive. System copies devour maintenance, support, and storage resources. They clog databases and slow performance with unnecessary and obsolete data. And each new system copy increases the risk that one might escape IT s control and lead to a data breach. The Range of Data Privacy Challenges Your IT organization may think it s doing it all it can to protect data privacy. But database security solutions are hard to configure and administer. Hand coding data masking solutions is error prone and labor intensive. How are you handling the full range of data privacy challenges? How can you grant privileged users, such as database administrators or application developers, with access to data while still protecting data privacy? Does your IT team have to maintain a huge number of applications and databases, each of which has its own customized privacy solution? Are you using production data for testing purposes? How are you securing this data? Has tokenization required additional development effort and maintenance due to source code changes and application complexities? Is your database encryption technology taking a toll on your database performance? Is your IT team struggling to meet its service-level agreements while trying to mitigate the risk of data breaches?

The Informatica Data Masking Product Family The Informatica Data Masking products are a family of highly scalable, high-performance data masking software. These products mask or block sensitive and confidential information from unauthorized access in production and nonproduction systems, reducing the risk of data breaches. They empower your IT organization to comply with data privacy policies, regulations, and mandates at lower costs. With Informatica Data Masking products, application end users, database administrators, developers, testers, trainers, production support, and business analysts can perform their functions without sacrificing data security. Quickly customize data security solutions for maximum ROI Support outsourcing and cloud initiatives while protecting sensitive information Improve development, testing, and training quality Simplify test data management and increase quality of nonproduction systems Reduce data storage and maintenance costs Accelerate development/test cycles IKON Office Solutions Saves Costs and Solves Data Growth Problem Saved 18.8 terabytes of database capacity Cut backup window by 25 percent, from 8 to 6 hours Achieved ROI in 6 months Spiraling data growth in its Oracle E-Business Suite database was threating to overwhelm this innovative document management systems and services provider s storage infrastructure and impact user response times. Once copies of the production and test databases were taken into account, the total database size was forecast to reach 80 terabytes. IKON relied on Informatica Data Subset to create data subsets to replicate user-selected application data quickly and easily from its production systems into lean, nonproduction systems, such as development, test, and training environments. As a result, IKON reduced costs by up to $1.5 million over a two- to three-year lease term. Informatica Data Subset provides prebuilt accelerators for many packaged ERP, SFA, CRM, and SCM business applications, including Oracle E-Business Suite. These accelerators allow you to deploy data subset strategies quickly and easily without fear that your subset policies will cease to function when the underlying application changes.

Informatica Dynamic Data Masking Protect Data Privacy by Dynamically Masking Sensitive Information Informatica Dynamic Data Masking de-identifies data and controls unauthorized access to production environments. The software dynamically masks sensitive information and blocks, audits, and alerts end users, IT personnel, and outsourced teams who access sensitive information while ensuring compliance with privacy regulations. Informatica Dynamic Data Masking is built on a patented database network in-line proxy, transparently installed between applications and databases. Acting as a database listener, the proxy processes all inbound application requests coming from application screens, canned reports, and development tools. Once they are analyzed or acted on, they are then sent to the database for prompt execution. Your IT organization can apply sophisticated, flexible data masking rules based on a user s authentication level. Through a simple yet elegant rules engine, criteria can be specified to identify which SQL statements are to be acted upon (rewritten). When there is a match, Informatica Dynamic Data Masking applies one or more actions including mask, scramble, hide, rewrite, block, or redirect to prevent unauthorized users from accessing sensitive information in real time. Features Easy installation and configuration Comprehensive set of application accelerators and prebuilt privacy rules Policy-driven real-time business application and database security and monitoring Benefits Cost-effectively prevent data breaches without impact Quickly customize security solutions for maximum ROI Support outsourcing and cloud initiatives while protecting sensitive information Informatica Dynamic Data Masking makes names, account numbers, Social Security numbers, and other sensitive information anonymous in real time when accessed by authorized users either inside or outside your organization.

Informatica Persistent Data Masking Protect Data Privacy by Persistently Masking Sensitive Information Informatica Persistent Data Masking is scalable data masking software that helps your entire IT organization manage access to your most sensitive data. The software shields confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers, from unintended exposure to reduce the risk of data breaches. It provides unparalleled enterprise-wide scalability, robustness, and connectivity to a vast array of databases. Informatica Persistent Data Masking minimizes the risk of data breaches by masking test and development environments created from production data regardless of database, platform, or location. The software provides sophisticated, but flexible masking rules that allow your IT team to apply different types of masking techniques to various data used in testing, training, and other nonproduction environments. Features Single, scalable data masking environment Comprehensive set of application accelerators Broad connectivity and custom application support Benefits Reduce the risk of data breaches Support data privacy compliance mandates Improve development, testing, and training quality and simplify test data management Informatica Persistent Data Masking features robust masking algorithms including substitution, blurring, keymasking, and other special techniques for credit card numbers, Social Security numbers, account numbers, and financial information that enable IT organizations to maintain structural rules to de-identify values.

Informatica Data Subset Create Data Subsets to Reduce Costs and Accelerate Development Informatica Data Subset is flexible, scalable software for creating data subsets. It enables your IT team to create, update, and secure data subsets smaller, targeted databases from large, complex databases. With referentially intact subsets of production data, your IT organization dramatically reduces the amount of time, effort, and disk space needed to support nonproduction systems. Informatica Data Subset quickly replicates and refreshes production data with only the most relevant, highquality application data. This means your IT team doesn t need to create a full database copy you separate out only functionally related data from interconnected systems. By automating the test data management subset and masking operations, Informatica Data Subset minimizes cost, risk, and development times so your IT team can streamline development and testing in favor of focusing on more strategic activities. The software even reduces the size of your test and development environments so you can reallocate reclaimed storage space for other uses. Features Scalable data subset creation from heterogeneous applications Robust data subset support Comprehensive set of application accelerators Benefits Reduce data storage and maintenance costs Accelerate dev/test cycles and optimize development, testing, and training systems Facilitate test data management and increase quality of nonproduction systems KaMin LLC Quickly Divests and Saves Big Divested ERP data within 24 hours Cut new company s time to market by 6 months Saved $1 million in IT costs A leading supplier of kaolin clay to paper and industrial customers worldwide, KaMin needed to separate its own ERP data from its parent company s and create a freestanding technology infrastructure all on a tight budget and an even tighter timeline. KaMin relied on Informatica Data Subset to create a smaller, targeted version of its Oracle E-Business Suite database. As a result, the company quickly separated data along business lines, completing the divestiture in half the time it would have taken using scripting techniques and saving more than $1 million in IT costs.

Informatica Data Masking Products in the News ABOuT INFORMATICA Informatica Corporation (NASDAQ: INFA) is the world s number one independent provider of data integration software. Organizations around the world rely on Informatica for maximizing return on data to drive their top business imperatives. worldwide, over 4,630 enterprises depend on Informatica to fully leverage their information assets residing on-premise, in the Cloud and across social networks. Info Security Products Guide, the industry s leading information security research and advisory guide, awarded Informatica Dynamic Data Masking as the Most Innovative Security (Software) Product of the Year at the 2012 Global Excellence Awards. Thanks to Informatica, KaMin has become its own master faster being in a position to target, acquire, and support kaolin customers up to six months more quickly than if we had used an alternative divestiture strategy. Senad Hadzic, CIO KaMin Performance Materials LLC

Worldwide Headquarters, 100 Cardinal Way, Redwood City, CA 94063, USA phone: 650.385.5000 fax: 650.385.5500 toll-free in the US: 1.800.653.3871 informatica.com linkedin.com/company/informatica twitter.com/informaticacorp 2012 Informatica Corporation. All rights reserved. Printed in the U.S.A. Informatica, the Informatica logo, and The Data Integration Company are trademarks or registered trademarks of Informatica Corporation in the United States and in jurisdictions throughout the world. All other company and product names may be trade names or trademarks of their respective owners. IN03_0512_02007