idiscover RELATIONSHIPS Next find any documented relationships (database level). Ex., foreign keys

Similar documents
Ensuring Compliance with Data Privacy Directives using Virtual Databases

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

McAfee Database Security

Welcome to the Oracle Enterprise Manager Technical Webcast Series

Oracle Data Masking and Subsetting

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Importing Metadata from Relational Sources in Test Data Management

Teradata and Protegrity High-Value Protection for High-Value Data

Discover Best of Show März 2016, Düsseldorf

SECURING COPPIN STATE FROM DISCOVERY TO MASKING IN PEOPLESOFT ENVIRONMENTS SESSION MARCH 7, :30 3:00 PM

Prices in Japan (Yen) Oracle Technology Global Price List December 8, 2017

The Realities of Data Security and Compliance: Compliance Security

Information empowerment for your evolving data ecosystem

SafeNet ProtectApp APPLICATION-LEVEL ENCRYPTION

Informatica Enterprise Information Catalog

CONSOLIDATING RISK MANAGEMENT AND REGULATORY COMPLIANCE APPLICATIONS USING A UNIFIED DATA PLATFORM

The 10 Principles of Security in Modern Cloud Applications

Test Data Management for Security and Compliance

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Welcome to IBM Security Guardium Analyzer!

Optim. Optim Solutions, Benefits and Value Propositions. Kari Hirvonen - SoftwareGroup/Techsales IBM Finland

Realizing the Value of Standardized and Automated Database Management SOLUTION WHITE PAPER

Progress DataDirect For Business Intelligence And Analytics Vendors

Enterprise Data Architect

ORACLE DATABASE LIFECYCLE MANAGEMENT PACK

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

IPLocks Vulnerability Assessment: A Database Assessment Solution

Netezza The Analytics Appliance

Ten Innovative Financial Services Applications Powered by Data Virtualization

Executive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration

2 The IBM Data Governance Unified Process

Survey of Oracle Database

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

Building a Data Strategy for a Digital World

Advanced Solutions of Microsoft SharePoint Server 2013 Course Contact Hours


Advanced Solutions of Microsoft SharePoint 2013

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Advanced Solutions of Microsoft SharePoint Server 2013

12,000+ Associates. Worldwide. Worldwide. 36 Countries. Customer Base 230+ Infra Supported Data Centers. 300,000+ End Users.

Informatica Data Quality Product Family

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

FIVE BEST PRACTICES FOR ENSURING A SUCCESSFUL SQL SERVER MIGRATION

The Value of Data Governance for the Data-Driven Enterprise

FEATURES BENEFITS SUPPORTED PLATFORMS. Reduce costs associated with testing data projects. Expedite time to market

Copyright 2016 Datalynx Pty Ltd. All rights reserved. Datalynx Enterprise Data Management Solution Catalogue

IBM Data Center Networking in Support of Dynamic Infrastructure

Oracle Audit Vault. Trust-but-Verify for Enterprise Databases. Tammy Bednar Sr. Principal Product Manager Oracle Database Security

Transforming the Data Center into the Information Center. Jack Domme Chief Executive Officer Hitachi Data Systems

Optim. Optim Solutions for Data Governance. R. Kudžma Information management technical sales

<Insert Picture Here> Oracle Database Security

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

ASG WHITE PAPER DATA INTELLIGENCE. ASG s Enterprise Data Intelligence Solutions: Data Lineage Diving Deeper

IBM services and technology solutions for supporting GDPR program

About Database Adapters

<Insert Picture Here> Managing Oracle Exadata Database Machine with Oracle Enterprise Manager 11g

Oracle Big Data Connectors

CA ERwin Data Modeler

Jean-Marc Krikorian Strategic Alliance Director

TECHED USER CONFERENCE MAY 3-4, 2016

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

Toad for Oracle Suite 2017 Functional Matrix

You Might Know Us As. Copyright 2016 TierPoint, LLC. All rights reserved.

Oracle Database Vault

Fundamentals of Information Systems, Seventh Edition

MODERNIZE YOUR DATA CENTER. With Cisco Nexus Switches

Delivering a 360 o View in Healthcare and Life Sciences With Agile Data

7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager

BMC Remedyforce Discovery and Client Management. Frequently asked questions

Teradata Aggregate Designer

Oracle Warehouse Builder 10g Release 2 Integrating Packaged Applications Data

The Value of Data Modeling for the Data-Driven Enterprise

Copyright 2011, Oracle and/or its affiliates. All rights reserved.

IBM DB2 Web Query for System i

Hybrid Cloud Management: Transforming hybrid cloud delivery

This document lists the certifications for the HPE Structured Data Manager release The document is divided into the following sections:

Accessibility Features in the SAS Intelligence Platform Products

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

STREAMLINED CERTIFICATION PATHS

Oracle Application Server 10g Integration Interconnect. An Oracle Technical White Paper January 2005

Delivering information you can trust June IBM InfoSphere Information Server: Simplify integration with unified metadata

Brochure. Data Masking. Cost-Effectively Protect Data Privacy in Production and Nonproduction Systems

To the Designer Where We Need Your Help

BUYER S GUIDE APPLICATION SECURITY BUYER S GUIDE:

IBM Data Replication for Big Data

Achieving the Goals of the DoD Netcentric Data Strategy Using Embarcadero All-Access

2008 WebSphere System z Podcasts Did you say Mainframe? TITLE: Announcing WebSphere Business Monitor for Linux on System z

Technical Overview. Elastic Path Commerce

Data Virtualization for the Enterprise

JOB TITLE: Senior Database Administrator PRIMARY JOB DUTIES Application Database Development

Hospital System Lowers IT Costs After Epic Migration Flatirons Digital Innovations, Inc. All rights reserved.

CenturyLink for Microsoft

Upgrade Strategies for Oracle E-Business: Leveraging Archiving Best Practices

CipherCloud CASB+ Connector for ServiceNow

Chapter 6. Foundations of Business Intelligence: Databases and Information Management VIDEO CASES

Managing your Cloud with Confidence

Enterprise Data Warehousing

Oracle GoldenGate for Big Data

MarketUpdate. Test Data Management

Transcription:

idiscover Discover Accurately In every implementation without exception, MENTIS has found unprotected data in tens to hundreds, and in some cases, thousands of undocumented locations. If you aren t finding 100% it might as well be zero. Analysts at Bloor said of the MENTIS product, idiscover, that it goes further than any other suppliers in its facilities for discovering sensitive data. It was first launched in 2008 and has evolved continuously since then. DATA Discovery Process 1 DICTIONARY Find columns and tables for classification by comparing known Table & Columns Names against the data dictionary. Ex., look for column called NATIONAL_IDENTIFIER 2 RELATIONSHIPS Next find any documented relationships (database level). Ex., foreign keys 3 VALUES Compare data values against actual data stored in Tables & Columns. Ex., Robert PATTERN 4 Using pattern recognition, search for known patterns of sensitive data. Ex., NNNN-NNNN-NNNN-NNNN (Where N is a number) when looking for credit cards MASTER DATA 5 To help eliminate false positives, compare discovered column data against known column data. CODE 6 To further eliminate false positives, and to document columns that might not contain any data (say, Key-Value temp tables), review DB and Application code. Ex., PL/SQL procedures

MENTIS Architecture EBS, PEOPLESOFT, INTELLIGENCE PACKS RELATONAL DBS BIG DATA STORES AUDIT LOGS USERS Oracle 10g or higher Enterprise Edition Java + Partitioning APP INTELLIGENCE RULES APPLICATION SERVER Tomcat Linux / Windows MAINFRAMES, SERVERS FILE SERVERS MENTIS CENTRAL REPOSITORY APPLICATION SERVER CLOUD DATA TEMPLATES ENGINE PROXY SERVER Linux, or Unix Virtual S Relational Hierarchial Big-Data INTELLIGENCE PACKS Oracle EBS PSFT Banner Lawson, etc. USERS HIGH PERFORMANCE DISCOVERY 7 100 785 3 7 ALL 785 24 1 ALL 469 11 Analyst Recognition To increase the accuracy of discovery and identify the best masking algorithm for each data classification, Mentis analyzes not only data but also the application codes that access the data and then shares this intelligence across the platform - Gartner The vendor s offerings provides useful templates for packaged systems, such as Oracle E-business Suite(EBS) and PeopleSoft - Gartner Mentis goes further, in our opinion, than any other supplier in its facilities for discovering sensitive data - Bloor

idiscover PRODUCT FEATURES CUSTOMER BENEFITS Allows for logical discovery based on configurable data classifications that can be modified and added to. Preconfigured, out-of-the-box data classifications on how to find metadata covers well-known direct and indirect customer identifying data. It supports Oracle EBS and PeopleSoft Intelligence packs to find sensitive data in Forms, PeopleSoft Pages, PeopleSoft Code, and user roles from permission lists. Find and map sensitive data within and across applications and data sources for referential integrity; Rapid implementation with preconfigured data classifications; Flexible solutions. Offers role-based access for multi-stakeholder participation and collaboration Application Owners, Architects, Security and Compliance, and DBAs. Effective collaboration; Segregation of duties for better security and compliance. idiscover Data Industry leading scan capability that goes beyond dictionary search, to pattern match, relationship match, and master data match. The optional idiscover Code module scans DB and application code for sensitive data access while the optional idiscover Location maps user access to sensitive data. Find sensitive data even where there are no explicit matches and even in empty temporary tables with code scans; Minimal false positives; Learning application for continuous improvement in future scans. Supports scans across diverse data sources in an enterprise, including DBMS Oracle, SQL Server, Sybase, DB2, My SQL, IMS, Server scans, External files, and documents such as Excel, PDF, and XML. Single scan solution that works for all data sources. Data source scanning takes advantage of native infrastructure and database features. The core engine relies on minimal hardware requirements (Oracle 10g and above on Linux or Windows). No redundant copies of data; Scalable high performance architecture; Minimal infrastructure overhead. (See High Performance Discovery) Enterprise sensitive data intelligence in the form of templates with a single repository for all metadata in the form of templates. Seamless lifecycle solution, covering discovery to masking, monitoring, and retirement. Customer Recognition In 17 years working on this system, there is no way I could have known that. - HCM application owner talking about the value of MENTIS Sensitive Data Discovery We could never have found all the sensitive data locations that were identified by MENTIS discovery... even with 22 years of PeopleSoft application knowledge. - Applications Director, Large Healthcare Company

idiscover Customer Successes idiscover has a proven track record as illustrated by the real-world examples shown below. After showing significantly superior results and in every instance, when compared to competing products including those from Oracle, IBM, and Informatica, idiscover has become the system of record. LEADING AMERICAN BANK Credit card information in IVR fields of CTI software. RISK ANALYTICS AND REPORTING PROVIDER Sensitive data in feeds and risk analytics of leading US banks. LEADING MIDDLE EASTERN BANK Information on 65,000 credit cards stored in text fields. CALIFORNIA HEALTH CARE PROVIDER Identified 4x more unaccounted sensitive data on homegrown patient record and billing applications. IVY LEAGUE UNIVERSITY IN THE US Uncovered large amounts of sensitive data during DB integration after their in-house team certified them as completely sanitized. FORTUNE 10 MULTINATIONAL MANUFACTURING AND FINANCIAL SERVICES CONGLOMERATE During a sample SSN scan, discovered 20% more sensitive data locations that only idiscover could locate in critical PSFT HR and compensation applications. Analyst Accolades Challenger, Gartner s Magic Quadrant on Data Masking (2013-2015); Visionary (20); Cool Vendor (20) Bloor Innovator (2015)

MENTIS SOFTWARE idiscover is part of a complete enterprise sensitive data security software suite from MENTIS. idiscover finds ALL sensitive data locations and user access across all data sources. The templates from idiscover are used by downstream applications for masking, monitoring and retirement across nonproduction, production and pre- production environments. Non-production idiscover Find ALL sensitive data across all sources and metadata based on data classifications and sophisticated search. iscramble Static data masking that supports 54 different masking methods, with full referential integrity and high performance scrambling across heterogeneous databases and unstructured data. isubset Creates subsets of production data for masking. production idiscover Find ALL sensitive data across all sources and metadata based on data classifications and sophisticated search. imask imonitor iprotect iretire Dynamic data masking for databases and applications with unique role based, conditional and location-aware masking. For continuous monitoring of connections and statements of sensitive data access by authorized users. Both imask and imonitor have minimal latency. Offers intrusion protection at the database level as additional security. A tokenization solution for retiring sensitive data in production. Pre-Production MENTIS unique shared enterprise sensitive data intelligence and integrated architecture combines both static (iscramble ) and dynamic (imask ) data masking. Code scan at preproduction for any changes in sensitive data access can be embedded as security acceptance testing as part of pre-deployment checks and approval. Contact Us 3 Columbus Circle, 15th Floor New York, NY 10019 800.267.0858 sales@mentisoftware.com