Dataguise precisely detects and protects sensitive data in real time across all repositories so enterprises can safely maximize the value of all their information assets. We make sensitive data governance simple, delivering the only one-stop, out-of-the-box solution that provides the highest level of detection and protection — no customer programming required. Organizations concerned about data breaches, privacy and compliance (PII, PCI-DSS, HIPAA, HITECH, GDPR, etc.) rely on Dataguise for no-coding/no-scripting discovery, protection, audit and monitoring for sensitive data in Hadoop, DBMS, files, and other data environments both on prem and in the cloud. Dataguise complements volume-level encryption tools and perimeter-based security strategies by providing the most granular cell-level discovery and protection. Dataguise works with 100% of the major Hadoop distributions and is a certified partner of Cloudera, Hortonworks, MapR and Amazon. Dataguise also discovers and protects data in the cloud, partnering with Hadoop-as-a-Service vendors like Altiscale and Qubole.

Traditional data platforms and DBMSs supported include Oracle, SQL Server, IBM DB2, Teradata, SharePoint and files. Dataguise solutions are integrated with Kerberos, LDAP, Active Directory and others. For the third year in a row, Dataguise is recognized as a Visionary in the Gartner Magic Quadrant for Data Masking Technology (Gartner Inc., Dec 2015) for its ability to help its customers reduce the risk of data breaches and remain compliant with leading regulations (such as HIPAA, HITECH and PCI DSS) designed to protect personally identifiable information (PII) and protected health information (PHI).

SENSITIVE DATA DISCOVERY

DISCOVER SENSITIVE DATA MORE PRECISELY ACROSS THE ENTERPRISE ECOSYSTEM

As data continues to grow in volume, variety and velocity, organizations may have hundreds or thousands of data repositories, from file servers and databases to data warehouses and data lakes, both on-prem and cloud-based. They share data among employees and partners. A single individual’s data may be in multiple repositories. Finding sensitive data accurately, quickly and completely is more difficult than one might think.

100% of organizations that use Dataguise discover sensitive data they did not know existed in their data repositories. Some find entire data repositories. When compared to other solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the business and the people who trust them with their data.

Data privacy continues to grow as a concern for both individuals and organizations. Over the years, various governmental regulations and industry standards have been created to address specific types of sensitive data—such as the Payment Card Industry Data Security Standard (PCI DSS) or the Health Insurance Portability and Accountability Act (HIPAA). In the US alone there are hundreds of state and federal laws regarding digital commerce or communication that may apply to an enterprise, but there is no single overarching, cohesive law like the European Union’s General Data Protection Regulation (GDPR)—at least, not yet.

Regulatory compliance is one of the top use cases for a data discovery tool. Organizations are being called out every day in the news for their mishandling of sensitive data, and they are paying for it, in terms of brand reputation, customer relationships, and profitability.

Security and risk pros can’t expect to adequately protect customer, employee, and sensitive corporate data and IP if they don’t know what data exists, where it resides, how valuable it is to the firm, and who can use it.– Forrester ResearchRethinking Data Discovery and Classification Strategies July 10, 2018

Until now, consumers have been willing to lend their data (or have unknowingly given it away) to get convenience or information in return. Once they fully realize the consequences of this bargain they will be looking to government and business to safeguard data and hand control back to them, the customer.– ForbesData Privacy Will Be The Most Important Issue In The Next Decade, November 26, 2019

DATAGUISE DISCOVERY CAPABILITIES:

  • Handles high volumes of disparate, constantly moving, and changing data with time stamping to support incremental change and life cycle management.
  • Supports a fluid or flexible information governance model that has a mix of highly “invested” (curated) data as well as raw, unexplored (gray) data such as IoT (Internet of Things) data, clickstreams, feeds, and logs.
  • Handles a variety of data stores such as traditional relational databases and enterprise data warehouses as well as non-relational big data sources (Hadoop) and file repositories (SharePoint and file shares).
  • Processes structured, semi-structured, and unstructured or free-form data formats.
  • Provides automated detection and processing of a variety of file formats and file/directory structures, leveraging meta-data and schema-on-read where applicable.
  • Provides deep content inspection using techniques such as patent-pending neural-like network (NLN) technology, and dictionary-based and weighted keyword matches to detect sensitive data more accurately.

DATA CLASSIFICATION TOOLS

DGSECURE SOFTWARE SOLUTIONS

In data governance & privacy compliance, data classification tools help organizations categorize their data based upon custom or predefined policies, which can be used to ensure the security of their sensitive personal data.

Growing public concern for data privacy has resulted in governments around the world taking a closer look at how organizations obtain, and process, sensitive personal data. This has resulted in the creation of new stringent data privacy laws, such as the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA).

Dataguise’s DgSecure delivers powerful data classification software providing enterprise organizations with deeper insights into their data governance & privacy compliance programs, such as:

  • What type of sensitive personal data is collected?
  • Where is sensitive personal data stored?
  • Who has access to sensitive personal data?
  • How secure is sensitive personal data & does it adhere to compliance regulations?

DATA CLASSIFICATION HIGHLIGHTS

Predefined Privacy Policies

DgSecure comes with a handful of predefined, out-the-box policies to choose from, allowing customers to begin classifying their data quickly with just a few clicks. DgSecure’s predefined policies cover highly-recognized regulatory compliances, including:

  • HIPAA
  • PCI
  • PII
  • GDPR

Customizable Policy Builder

For customers needing customized data classification policies, DgSecure provides a powerful, yet simple to use, policy builder capable of categorizing data based upon an organization’s specific needs. Start with predefined sensitive types, such as credit card number, social security, email, etc., adding additional sensitive types based upon organizational customizations.

Persistent Data Classification

Once categorized, access to classified sensitive data is tracked on the DgSecure platform, allowing organizations to monitor the data over time. DgSecure’s persistent classification provides valuable data insight, which can be integrated with an organization’s access control system to ensure constant privacy of sensitive personal data while in motion or at rest.

Analyze Results Easily

Dataguise customers can review the results of their data classification tasks through the DgSecure Dashboard or via file export, across multiple supported formats, including pdf, csv, etc. Whether through the dashboard or export, organizations can analyze the data easily in order prioritize vulnerabilities based upon data categorizations.

Simple Workflow

Running Dataguise data classification across an organization’s repositories is simple as 1-2-3. First, pick a predefined policy or create a custom one using the policy builder; pick the repositories to run the policies against, either a single instance or over scheduled intervals; wait for the results and analyze the data. It’s that simple!

DgSECURE PROTECT

ENSURE YOUR SENSITIVE DATA IS PROTECTED IN THE EVENT OF AN AUDIT OR BREACH.

Data breaches happen, all too often. But there is a way to protect your organization’s most valuable and sensitive data even if it does fall into the wrong hands.

Dataguise delivers the first fully automated, 100% programmer-free way to lock and encrypt cell- or field-level information across all data repositories. Our fine-grained, end-to-end, data-centric protection is the most precise available — giving your organization the highest level of security. DgSecure encrypt engines run as fully automated processes (agent) across standard Hadoop ingest methods (Flume, Sqoop, and FTP) as well as for data at-rest in certified MapReduce and HIVE agents for Cloudera, Hortonworks, MapR, Pivotal, IBM Big Insights, Amazon EMR, and Microsoft HD Insights.

Dataguise’s sensitive data protection capabilities enable large enterprises in industries including finance, insurance, healthcare, government, technology and retail to:

  • Reduce breach risk and data loss through sensitive data protection.
  • Address compliance, privacy, and regulatory mandates for PII, PCI, PHI, HIPAA and data privacy and data residency laws

There were a total of 1,093 data breaches in 2016 in the United States alone, 40% more than in 2015. – Identity Theft Resource Center 2017

For retail and consumer organizations, damage to brand/reputation caused by cyberattacks was up 72% in 2015. – PwC, The Global State of Information Security Survey 2016

In the United States, 88% of CEOs are somewhat or extremely concerned about cyber threats. – PwC 2016 US CEO Global Survey

DgSECURE PROTECT CAPABILITIES:

  • State-of-the-art AES and NIST-recognized format-preserving encryption options.
  • Automated, policy-based encryption for sensitive data in TXT, AVRO, Sequence, RC, ORC, JSON, XML file formats.
  • Industry standard Key Management Interface Protocol (KMIP) client support for leading key management facilities provided by Safenet, RSA, Thales, and other KMIP key server systems.
  • The ability to control and monitor internal decryption authorization via internal ACLs, or ACLs mapped to existing LDAP/Active Directory authorization groups to gain better protection against insider risks.
  • Can be combined with data masking algorithms to give customers flexibility and choice when needing to share data with “semi-trusted” users either inside the organization or with external partners.

DgSECURE MONITOR

IDENTIFY A POTENTIAL DATA BREACH IN MINUTES, NOT MONTHS.

Most companies don’t know they’ve had a data breach until months after the damage has been done. A 2015 study by the Ponemon Institute found that malicious attacks can take an average of 256 days to identify while data breaches caused by human error take an average of 158 days to identify. It also confirmed that the longer it takes to identify a breach, the greater the cost.

Why does it take so long? With a plethora of security technologies in place, enterprises must sift through mounds of data about their data before understanding where real threats exist.

DgSecure Monitor offers an early warning system focused solely on safeguarding the sensitive data an organization truly cares about, cutting through the clutter to detect potential data breaches in just minutes. It keeps track of who is doing what to your organization’s sensitive data—whether stored on premiseS or in the cloud—and delivers real-time, policy-based alerts whenever unauthorized access or unusual access behavior occurs.

DgSECURE MONITOR CAPABILITIES:

  • Fast and easy creation of sensitive data governance policies using pre-built or custom templates—no coding required
  • Continuous monitoring of all attempts to access sensitive data and the results (e.g., read, write, delete, copy, failed attempts)
  • Immediate alerting to direct policy violations
  • Immediate alerting to atypical user behavior, based on profile analytics and machine learning—crucial to detecting threats from stolen insider credentials
  • Comprehensive coverage across on-premises and cloud environments, including Hadoop, Cassandra, Amazon S3, and Blob storage
  • Dashboard views of alerts, policies, metrics, and trends to understand the extent of monitoring coverage and potential exposure of sensitive data types or sources

GDPR SOFTWARE SOLUTIONS

COMPLIANCE TOOLS FOR THE GENERAL DATA PROTECTION REGULATION

The European Union’s new General Data Protection Regulation (GDPR) has helped bring data privacy and proper data handling to the attention of enterprise executives around the globe. Fully enforced by 25 May 2018, the GDPR is a massive piece of legislation that requires data privacy to be baked into enterprise data handling—and it applies to any company that handles the personal data of EU residents, even if a company has no physical presence in the EU. With potential fines for non-compliance as high as 4% of your annual worldwide revenue, how is your enterprise preparing for General Data Protection Regulation (GDPR) compliance?

Take the Smarter Path with Dataguise

Dataguise is the only vendor to provide end-to-end sensitive data audit and protection to help you meet General Data Protection Regulation (GDPR) compliance requirements quickly and maintain compliance as your business grows. Dataguise DgSecure empowers you with the ability to detect, protect, audit, and monitor sensitive data in near real time across your enterprise data repositories, both on premises and in the cloud—all from a single platform.

The Fundamental First Step: Sensitive Data Discovery

If you don’t know where all your sensitive data is, you can’t pass an audit. Dataguise DgSecure can discover sensitive personal data in structured, semi-structured, and unstructured formats, and delivers comprehensive, visual reports and dashboards showing you precisely what sensitive data you have, where it is located, and whether or not it is being masked or encrypted. With this complete audit of your data, you can determine what next steps are needed for General Data Protection Regulation (GDPR) compliance.

Reduce Regulatory Oversight with Data Masking and Data Encryption

Only sensitive data that is germane to the business need for which data processing occurs is allowed to be part of that processing. Masked or encrypted data., however, may not necessarily be considered sensitive. Furthermore, data subjects’ rights to their data may not apply if the data cannot be easily attributable to them. Dataguise DgSecure allows extensive business applications of data without dramatically raising your enterprise’s data handling liability with regards to General Data Protection Regulation (GDPR) compliance.

Simplify Ongoing General Data Protection Regulation (GDPR) Compliance

General Data Protection Regulation (GDPR) compliance isn’t a one-time or even once-a-year requirement. Your enterprise will need to maintain a constant state of compliance—no small feat, as big data gets bigger, cloud usage grows, and more users access more data for greater business insights. Sensitive data will be flowing continually into and out of your enterprise. Dataguise DgSecure can help you detect, protect, and monitor sensitive data in real-time, continuous processes, while providing your executives one consolidated view of compliance and risk positions at any given time.