Solution Brief

ACCUTIVE SECURITY’S DATA DISCOVERY MASKING
Capture And Conceal With Confidence
Accutive Security's Data Discovery & Masking Banner

THE BUSINESS CHALLENGE - WHY MASK YOUR DATA?

Enterprises today face the regulatory challenge of ensuring the privacy and security of their customers’ information while still successfully conducting their daily business activities. However, organizations often copy and move sensitive data containing Personally Identifiable Information (PII) and Payment Card Industry (PCI) information from the security of their production environments to less secure testing environments or for third-party use, which can pose security risks. Prior to being copied to these environments, this sensitive data need to be identified and masked, to ensure individual privacy and meet regulatory compliance standards (PCI-DSS, GLBA, OSFI/PIPEDA, HIPAA, FERPA, GDPR). Unlike data encryption, data masking makes data unrecognizable while preserving its format, so it is still usable.
Accutive Security Data Discovery and Accutive Security Data Masking solutions provide the abilityto locate, mask, and move your critical sensitive data, while ensuring the data properties and fields remain intact across any number of sources. After being processed through the masking operation, the data will still look real, but in truth, it will have become fictitious. Additionally, the masked data will also remain consistent throughout all sources. For example, Joe Smith masked as John Doe will always be John Doe in System A, System B, etc. Masking production data for non-production environment uses will reduce the risk of data compromise, while meeting regulatory requirements.

THE BUSINESS VALUE - DATA MASKING BENEFITS

  • Reduce potential data breaches by mitigating the risk of Disclosing sensitive data that resides in testing, training, Development or third-party environments
  • Comply with data security and regulatory compliance standards for storing sensitive data, such as PCI-DSS, GLBA, OSFI/PIPDA, HIPAA, FERPA and GDPR
  • Create fictitious data that retains data field properties and is fully-functional across multiple systems
  • Reduce the cost of database software licenses in Development and testing environment
Data Security Automation
Additional Features

HOW ACCUTIVE SECURITY DATA MASKING WORKS

Accutive Security Data Discovery and Data Masking solutions incorporatea robust software platform designed to perform automated discovery of sensitive data. All source tables and field names are searched and mapped during the discovery operation and maintain all field properties of the source data. The output data will remain fully functional, yet the information will no longer be sensitive. For example, a 16-digit credit card in the source data will remain a 16-digit credit card after being masked. Furthermore, that credit card number will be the same every time you mask it, should you need it to be.

PRODUCT FEATURES AND FUNCTIONALITY

Accutive Security Data Discovery and Data Masking is built upon the reliable and scalable Java platform and is optimized for high performance. It is a web-based, Drag-and-drop user interface for rapid and simplified configuration and field mapping. The platform enables consistent, flexible and repeatable enterprise data discovery and masking capabilities.
  • Perform masking between different source and destination database engines
  • Automated scan and discovery ofsensitive data
  • Easily configure how each sensitive data field is masked
  • Supports cloud environments such as AWS, Azure, etc.
  • Track and report on all data masking operations
  • Uses a reference key to consistentlymask values across multiple databases
  • Save and reuse multiple masking Requirements and configurations
  • Multiple user authentication options For enhanced security
  • Automated alerts via email or text
  • Customize masking operations
  • Policy configuration to enable field Scanning in support of GDPR and Other compliance regulations

DEPLOYMENT AND BEST PRACTICES

Due to the complexities and challenges surrounding data visualization, there is a growing demand for data masking. In response to our Fortune 500 customers’ needs, Accutive Security continues to evolve its data masking solution. Organizations that implement Accutive Security’s Data Discovery and Data Masking solutions demonstrate to their clients, business partners, and regulatory authorities that they take data protection seriously by proactively reducing the risk of a data breach or violation of security policies and regulatory requirements.
The deployment and management of Accutive Security’s solutions consists of four phases as depicted in the diagram below. This workflow can be customized to match a client’s development lifecycle methodology.
Identities

DATA MASKING IMPLEMENTATION METHODOLOGY

DATA MASKING IMPLEMENTATION METHODOLOGY

DISCOVER

Identify Data Sources and Destinations
Sensitive data discovery
Review Security Procedures
GRC Requirements
EDM Training

DESIGN

Catalog and Classify Data
Data Mapping and Relationships
Establish Data Masking Algorithm
Establish Environment Requirements
Identify and Design Masking Customizations

DEVELOP

Establish Data Source Connections
Create Data Masking Configuration
Develop Customizations
Create Test Cases and Datasets
Deployment Planning

DEPLOY

Setup Configuration Schedules
Implement Backup and Recovery Procedures
Develop Operational Guide
Perform Data Masking

SAMPLE MASKING OPERATORS

  • First name, last name, addresses - International addresses supported
  • City, state, county, and zip code concurrently - all coordinated through therandomized zip code
  • Social security number, credit card number, phone number or any numerical field
  • Credit cards number - valid numbers that pass the LUHN test
  • Custom lists of client data which may be randomly selected for the chosen field
  • Numerical fields that preserve some preceding or trailing digits
  • Date fields which may be random or selectable within a range; for example, plus Or minus a number of years

ACCUTIVE SECURITY DATA DISCOVERY AND DATA MASKING ALLOWS YOUR ORGANIZATION TO CAPTURE AND CONCEAL DATA WITH CONFIDENCE.

At Accutive Security, we are a trusted leader in Auth + Crypto solutions. Founded in California in 2009 by FinTech engineers and consultants, our expertise is focused on safeguarding essential data and software systems. Partnered with the world’s leading Auth + Crypto companies, we deliver a comprehensive range of services and products to our mutual customers, including data discovery, data masking, key management, PKI management, certificate lifecycle management, hardware security module management, and more.

Our cutting-edge solutions are trusted by globally recognized organizations to protect their most sensitive data, regardless of its location. From cloud infrastructures to data centers, we ensure information remains secure and accessible. With our commitment to security, we empower organizations to confidently navigate their digital transformation and realize their full potential in a digitally connected future. Visit our website to learn more about our security solutions and services at www.accutivesecurity.com/adm-platform/

Download this Resource