SlideShare a Scribd company logo
1 of 29
Download to read offline
Information Security Level 2 – Sensitive
© 2018 – Proprietary & Confidential Information of SecuPI1
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI1
SecuPi Data Centric
Security & Compliance
Introduction
Information Security Level 2 – Sensitive
© 2018 – Proprietary & Confidential Information of SecuPI2
What Gartner Says About SecuPi
User Entity Behavior Analytics (UEBA)
Data-Centric Audit and Protection (DCAP)
Data Masking
“SecuPi incorporates UEBA features for sensitive data usage, analysis and protection. The
solution employs an innovative approach that relies on sensitive data access in high-risk
applications as a key factor in its UEBA model, along with other user activities”
“SecuPi provides Dynamic Data Masking (DDM) at the application tier as part of an offering
that also includes externalized authorization management (EAM), application data access
monitoring, and user behavior analytics.”
Leading Three Markets
Source: Market Guide for Data-Centric Audit and Protection
Published: 21 March 2017
YS
Information Security Level 2 – Sensitive
© 2018 – Proprietary & Confidential Information of SecuPI3
SecuPi Data Subject Privacy Management
Applied across Business Applications, Datawarehouse, Big Data & Tools
Logical Deletion
(e.g., in Big data)
Physical Deletion
Physical
Anonymization &
Masking
SecuPi
Policies
Dynamic Masking
Encryption/
Tokenization
SecuPiData&ProcessDiscovery
Anonymization
& Activity-
Monitoring
SecuPi
Modules
Retention &
Deletion
Personal Data
During Retention
Personal Data
Post Retention
Active
Data Subjects
Data Subject
Status Activity MonitoringRegulation
Consent7 |Conditions for Consent
17|Right to be Forgotten
18|Restriction of processing
21|Right to Object
30| Records of Processing
32 | Security of Processing
...
Information Security Level 2 – Sensitive
© 2018 – Proprietary & Confidential Information of SecuPI5
Addressing GDPR Requirements
Discovery, data-flow mapping
Dynamic Consent Controls
User Behavior Analytics (UBA)
Logical Deletion
Monitoring & Auditing
Physical Deletion
Matching All Technical Compliance Requirements
Processing of Personal Data5
Lawfulness of Processing6
Conditions for Consent7
Conditions of Child's Consent8
Processing Special categories9
Processing of Criminal Records10
Right of Access15
Right to be Forgotten17
Restriction of processing18
Right to Data Portability20
Right to Object21
Protection by Design & Default25
Records of Processing Activities30
Security of Processing32
Notification of Data Breach33
Communication of Data Breach34
Article # |Article Name | SecuPi FeatureArticle # |Article Name | SecuPi Feature
Anonymization & Monitoring
Module
Retention & Deletion Module
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI6
SecuPi Platform Enterprise Coverage
Front-Office ERP Finance
HR-App
ERP
Reporting Tools
CRM
e-Commerce
Front-office
Finance
Billing
Business Applications
SecuPi Platform
GDPR enablement capabilities Quick implementation No code changes
Beeline
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI7
SecuPi Customer Testimonial
Metro Group Germany (Largest Retail)
Notable SecuPi features applied on Metro applications include:
• Discovery & real-time monitoring
• “Records of processing activity”
• Breach notification, security by design/default
• “Right to be forgotten”
• Data minimization, and more…
Within 4-5 weeks, SecuPi was on-boarded in few customer facing
applications with no development effort
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI8
SecuPi Monitoring & Anonymization
> Simple installation, on-prem or on-cloud
> Applying discovery, monitoring and subject-rights on
applications, DW and Big data env.
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI9
SecuPi Monitoring & Anonymization Module
An Application Overlay, No DB agents, No Development Effort
Campaign
ERPReporting Tools HR-Apps e-Commerce
Front-officeFinanceCRM
End-Users
Applications
- CONFIDENTIAL --
SecuPi
Central Server
Databases
Discovery, data-flow mapping
Dynamic Consent Controls
User Behavior Analytics (UBA)
Logical Deletion / Pseudonymizat.
Monitoring & Auditing
Physical Deletion / Anonymization
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI10
Dynamic Masking in CRM Application (column/row basis)
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI11
For Teradata, Oracle Datawarehouse, Hive…
Campaign Mng.Applications
SecuPi Central
Management
Server
CRM
UDBs
BTEQBeeline
HDFS
Hive/
Cassandra
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI12
SecuPi Application Overlay Monitors & Applies Data Subject Rights
No Database agents nor development effort required
SecuPi Central
Management Servers
Data Sources
Application UI
& Other Interfaces
SecuPi Overlay
installed on
Application
Servers
Documents
Logs
Classification
and Labeling
Monitoring
Masking
Data flow
Discovery
Monitoring
Masking/encryption/
tokenization
Discovery and
Classification
Monitoring
Masking
Encryption/
tokenization
Data Deletion
Consent Controls
User Request Data Request
Application Server
(Java/.Net)
User Response Data Response
Encryption/
tokenization
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI13
SecuPi Solution For Datawarehouse
Field-level decryption and anonymization for Teradata, Oracle etc.,
Installed on Reporting tools
(Tableau, Business objects, Excel, etc.)
Discovery, Mapping & UEBA Comprehensive Policy Engine
- CONFIDENTIAL -
SecuPi Logical
Deletion policy
999-999-9999JXXXX XXX
SecuPi Central
Management Servers
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI14
HDFS
Hive servers
SecuPi Data-Centric Approach For Big Data
Field-level decryption & anonymization for HDFS
Beeline
Installed on the Hive
Servers
Discovery, Mapping & UEBA Comprehensive Policy Engine
JDBC
ODBC
CLI
- CONFIDENTIAL -
SecuPi Logical
Deletion policy
SecuPi Central
Management Servers
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI15
Fat Client &
Excel & DBA tools
SecuPi Central
Management
SecuPi wraps the
JDBC/ODBC/OCI drivers – on Fat
clients running on desktops, Citrix
servers and DBA’s PC
Installed where the
database drivers are used It discovers and classifies sensitive data by
entering data values from the screens.
It also monitors and audits sensitive user
activity coupled with anomaly detection
using behavior analytics models
Discovery, Mapping & UEBA
SecuPi policy can use
LDAP/AD/Kerberos to apply
field/record level encryption,
redaction, masking or blocking
sensitive data-flows
Comprehensive Policy
Engine
JDBC
ODBC
OCI
Data Source Applications running C, C++
With SecuPi Policies
SecuPi DB Driver Wrapper For Fat-clients & DBA/Dev tools
Logically deleted data
Anonymized data
Original data
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI16
SecuPi Discovery & Data-Flow Mapping
For applications in scope end-users simply mark personal data in screens &
reports, having SecuPi identify the source database objects
Initiate Discovery
Mouse click the “Select field”
button that SecuPi appends to
the screen
1
Select field
Simply click on a sensitive
VALUE on the screen
2
SecuPi Classifies the
Data
SecuPi identifies the source
table/column containing the
VALUE. Just add classifications &
risk.
3
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI17
Comply with “Security by design/default” (article 25)
using Data-centric Behavior Analytics (UBA)
- CONFIDENTIAL -
Detects Suspicious User
Behavior in Real-time
Detect abnormal/inappropriate data access, as might be
attempted by a Malicious Insider or External Attacker using
stolen credentials or subverting the application
Data protection by
design and by default
Article
25
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI18
Comply with “records of processing” & breach
notification articles (articles 30, 33)
- CONFIDENTIAL -
Comprehensive real-time
Monitoring & Forensics
Obtain real-time monitoring & full audit for all requests to any
sensitive data / sensitive transactions. Obtain a risk analysis of
data flow
Records of Processing
Activities
Article
30
Notification of a personal
data breach
Article
33
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI19
Apply Subject Rights
Mask and obscure data
Pseudonymization policies dynamically
masked sensitive information to ensure
“need-to-know” access
Data Minimization
Minimize data access at finer level than
an application might inherently support
remove or obscure data a user does not
require
Pseudonymized
field
Logical Deletion
Permit ‘logical deletion’ by hiding data
records although still retained in the data-
source (data cannot easily be physically
deleted for technical or legal reasons)
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI20
Unstructured Data Protection
SecuPi protects excel, CSV & PDF files
created in LoB applications:
Automatic & accurate labeling
Automatically labels documents at creation
Data Protection
RMS encryption is applied on file exports to secure
sensitive data
Enhanced Monitoring
Provides visibility on which sensitive data was
exported
Dynamic controls
Apply dynamic masking or data redaction to secure
sensitive data at source
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI21
Classification of Unstructured Content
The exported file contains the classifications that are derived both from
the AIP and the SecuPi classifications
Automatic and accurate labeling
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI22
Install SecuPi on business
applications
Discover personal data & map personal
data-flows from source to destination
Define policies to apply data
minimization, consent & “Forgotten”
Enforce subject rights while auditing
and monitoring in real-time all
personal data flows and processes
Install
4 Steps to GDPR
Get your business applications GDPR ready
in days and with no development effort
Start!
01
02
03
04
Ready!
Discover
Set
Go Live
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI23
SecuPi Retention & Deletion
> Simple installation, on-prem or on-cloud
> No agent required anywhere!
> Discovery of personal data (to be anonymized)
> Recording and parsing of existing customer deletion
processes for faster and safer implementation
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI24
SecuPi Implementation Options for “Right to be forgotten”
SecuPi Deletion Methods
Value at source
213-436-5723John Smith
After ~10 years
of Retention
999-999-9999JXXXX XXX
Logical Deletion
on data-flows & processes
Physical Anonymization
on databases
App.
Screen/
APIs
On DB
Level
Physical Deletion
on databases1 2 3
XXX-XXX-XXXXABCD EF
During ~10 years
of Retention
On DB
Level
Use During Retention Period or
when physical deletion not feasible
(e.g., Big Data)
Use After Retention Period Use For SalesForce/when
App. deletion API exist
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI25
SecuPi Retention and Deletion Module
Logical
Anonymization &
Masking (Big data)
Physical Deletion
SecuPi
Policies
Retention Workbench
Record & Analyze Existing
Personal Data Changes
and Deletion Processes
Retention Orchestration Workflow
1
2
3
Auditability Operability Scalability
Physical
Anonymization &
Masking
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI26
Retention & Deletion Workbench
Define retention & physical/logical deletion or pseudonymization action
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI27
Retention Orchestration Workflow Server
Graphical workflow engine for deletion orchestration across data silos
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI28
EnterpriseCompliance
Time
Wave-2 Wave-3Wave-1
Get Your Top-Risk Applications GDPR Ready in Few Weeks
It is Fast to Deploy, No DB Agents, No Code-Changes
CRM
Marketing
e-Commerce
Compliance
Ready!
SQL-Plus Toad
Campaign Mng.
• Fast to Deploy
• No DB Agents
• Minimal Code-Changes
• Agile implementation
Business
Applications
Business
Applications
Analytics
Environments
* Order of waves is subject
to DPO preference
Privileged
Access Tools
Information Security Level 2 – Sensitive
© 2018 – Proprietary & Confidential Information of SecuPI29
SecuPi Capabilities Addressing Additional Use Cases
Monitor real-time activity,
Data-flow visibility
Audit Data Access
(both Views/Reads & Writes)
Anomaly Detection/UEBA
for insider threat
Data-minimization (masking,
hiding, blocking access)
Audit
Monitor
Control
Detect
Cloud Onboarding Security
DBA/Dev. Access Control
Preventing Insider-threat
Big-data Data Protection
Capabilities Use Cases
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of SecuPI30
SecuPi Benefits
Centralized, quick and wide GDPR coverage across applications
- CONFIDENTIAL -
Most comprehensive GDPR
solution, covering all GDPR
articles across wide LoB
applications
Agile solution meeting
current & future compliance
requirements
Quick and scalable
implementation with
no code changes
CRM
e-Commerce
Front-officeBI Tool Dev. Tools
ERP
Finance
HR-App

More Related Content

What's hot

The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent ApplicationsThe Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent ApplicationsNeo4j
 
Databricks secure deployments and security baselines, doug march 2022
Databricks secure deployments and security baselines, doug march 2022Databricks secure deployments and security baselines, doug march 2022
Databricks secure deployments and security baselines, doug march 2022Henrik Brattlie
 
Building Data Pipelines with Spark and StreamSets
Building Data Pipelines with Spark and StreamSetsBuilding Data Pipelines with Spark and StreamSets
Building Data Pipelines with Spark and StreamSetsPat Patterson
 
Continuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the EnterpriseContinuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the EnterpriseDataWorks Summit
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationDenodo
 
Actionable Insights with AI - Snowflake for Data Science
Actionable Insights with AI - Snowflake for Data ScienceActionable Insights with AI - Snowflake for Data Science
Actionable Insights with AI - Snowflake for Data ScienceHarald Erb
 
User Case of Migration from MicroStrategy to Power BI
 User Case of Migration from MicroStrategy to Power BI User Case of Migration from MicroStrategy to Power BI
User Case of Migration from MicroStrategy to Power BIGreenM
 
Data Stewards – Defining and Assigning
Data Stewards – Defining and AssigningData Stewards – Defining and Assigning
Data Stewards – Defining and AssigningDATAVERSITY
 
Data modeling for Elasticsearch
Data modeling for ElasticsearchData modeling for Elasticsearch
Data modeling for ElasticsearchFlorian Hopf
 
JSON Data Modeling in Document Database
JSON Data Modeling in Document DatabaseJSON Data Modeling in Document Database
JSON Data Modeling in Document DatabaseDATAVERSITY
 
Master the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - SnowflakeMaster the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - SnowflakeMatillion
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionUlf Mattsson
 
Customer-Centric Data Management for Better Customer Experiences
Customer-Centric Data Management for Better Customer ExperiencesCustomer-Centric Data Management for Better Customer Experiences
Customer-Centric Data Management for Better Customer ExperiencesInformatica
 
Security Automation & Orchestration
Security Automation & OrchestrationSecurity Automation & Orchestration
Security Automation & OrchestrationSplunk
 
[pgday.Seoul 2022] PostgreSQL with Google Cloud
[pgday.Seoul 2022] PostgreSQL with Google Cloud[pgday.Seoul 2022] PostgreSQL with Google Cloud
[pgday.Seoul 2022] PostgreSQL with Google CloudPgDay.Seoul
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?DATAVERSITY
 
DataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data ArchitectureDataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data ArchitectureDATAVERSITY
 

What's hot (20)

The Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent ApplicationsThe Data Platform for Today’s Intelligent Applications
The Data Platform for Today’s Intelligent Applications
 
Threat Modeling Using STRIDE
Threat Modeling Using STRIDEThreat Modeling Using STRIDE
Threat Modeling Using STRIDE
 
Databricks secure deployments and security baselines, doug march 2022
Databricks secure deployments and security baselines, doug march 2022Databricks secure deployments and security baselines, doug march 2022
Databricks secure deployments and security baselines, doug march 2022
 
Building Data Pipelines with Spark and StreamSets
Building Data Pipelines with Spark and StreamSetsBuilding Data Pipelines with Spark and StreamSets
Building Data Pipelines with Spark and StreamSets
 
Continuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the EnterpriseContinuous Data Ingestion pipeline for the Enterprise
Continuous Data Ingestion pipeline for the Enterprise
 
Data Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data VirtualizationData Marketplace and the Role of Data Virtualization
Data Marketplace and the Role of Data Virtualization
 
Actionable Insights with AI - Snowflake for Data Science
Actionable Insights with AI - Snowflake for Data ScienceActionable Insights with AI - Snowflake for Data Science
Actionable Insights with AI - Snowflake for Data Science
 
User Case of Migration from MicroStrategy to Power BI
 User Case of Migration from MicroStrategy to Power BI User Case of Migration from MicroStrategy to Power BI
User Case of Migration from MicroStrategy to Power BI
 
Data Stewards – Defining and Assigning
Data Stewards – Defining and AssigningData Stewards – Defining and Assigning
Data Stewards – Defining and Assigning
 
Data modeling for Elasticsearch
Data modeling for ElasticsearchData modeling for Elasticsearch
Data modeling for Elasticsearch
 
JSON Data Modeling in Document Database
JSON Data Modeling in Document DatabaseJSON Data Modeling in Document Database
JSON Data Modeling in Document Database
 
Master the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - SnowflakeMaster the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - Snowflake
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
البيانات المفتوحة المترابطة
البيانات المفتوحة المترابطة البيانات المفتوحة المترابطة
البيانات المفتوحة المترابطة
 
Customer-Centric Data Management for Better Customer Experiences
Customer-Centric Data Management for Better Customer ExperiencesCustomer-Centric Data Management for Better Customer Experiences
Customer-Centric Data Management for Better Customer Experiences
 
Security Automation & Orchestration
Security Automation & OrchestrationSecurity Automation & Orchestration
Security Automation & Orchestration
 
[pgday.Seoul 2022] PostgreSQL with Google Cloud
[pgday.Seoul 2022] PostgreSQL with Google Cloud[pgday.Seoul 2022] PostgreSQL with Google Cloud
[pgday.Seoul 2022] PostgreSQL with Google Cloud
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
 
DataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data ArchitectureDataOps - The Foundation for Your Agile Data Architecture
DataOps - The Foundation for Your Agile Data Architecture
 
Time series databases
Time series databasesTime series databases
Time series databases
 

Similar to Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü

Keep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approachKeep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approachNagib Aouini
 
Customer Insights Prozess
Customer Insights ProzessCustomer Insights Prozess
Customer Insights ProzessCapgemini
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big DataNicolas Morales
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationDenodo
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceCloudera, Inc.
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePodGaret Keller
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...Databricks
 
Compliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient MeshCompliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient MeshChristian Posta
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...CA API Management
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityMousumi Manna
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data securityTapan Biswas
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptwebhostingguy
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptwebhostingguy
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Cso 4any ram rev 2.6 management summary
Cso 4any ram rev 2.6 management summaryCso 4any ram rev 2.6 management summary
Cso 4any ram rev 2.6 management summaryCSO GmbH
 

Similar to Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü (20)

Keep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approachKeep your data safe and be compliant via a 360° approach
Keep your data safe and be compliant via a 360° approach
 
Customer Insights Prozess
Customer Insights ProzessCustomer Insights Prozess
Customer Insights Prozess
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
GDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data VirtualizationGDPR Noncompliance: Avoid the Risk with Data Virtualization
GDPR Noncompliance: Avoid the Risk with Data Virtualization
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for complianceGDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
Encryption and Masking for Sensitive Apache Spark Analytics Addressing CCPA a...
 
Compliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient MeshCompliance and Zero Trust Ambient Mesh
Compliance and Zero Trust Ambient Mesh
 
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
Securing Your Mobile Backend featuring Forrester Research inc - Combine API B...
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Shield db data security
Shield db   data securityShield db   data security
Shield db data security
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Cso 4any ram rev 2.6 management summary
Cso 4any ram rev 2.6 management summaryCso 4any ram rev 2.6 management summary
Cso 4any ram rev 2.6 management summary
 

Recently uploaded

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 

Recently uploaded (20)

Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 

Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü

  • 1. Information Security Level 2 – Sensitive © 2018 – Proprietary & Confidential Information of SecuPI1 Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI1 SecuPi Data Centric Security & Compliance Introduction
  • 2. Information Security Level 2 – Sensitive © 2018 – Proprietary & Confidential Information of SecuPI2 What Gartner Says About SecuPi User Entity Behavior Analytics (UEBA) Data-Centric Audit and Protection (DCAP) Data Masking “SecuPi incorporates UEBA features for sensitive data usage, analysis and protection. The solution employs an innovative approach that relies on sensitive data access in high-risk applications as a key factor in its UEBA model, along with other user activities” “SecuPi provides Dynamic Data Masking (DDM) at the application tier as part of an offering that also includes externalized authorization management (EAM), application data access monitoring, and user behavior analytics.” Leading Three Markets Source: Market Guide for Data-Centric Audit and Protection Published: 21 March 2017 YS
  • 3. Information Security Level 2 – Sensitive © 2018 – Proprietary & Confidential Information of SecuPI3 SecuPi Data Subject Privacy Management Applied across Business Applications, Datawarehouse, Big Data & Tools Logical Deletion (e.g., in Big data) Physical Deletion Physical Anonymization & Masking SecuPi Policies Dynamic Masking Encryption/ Tokenization SecuPiData&ProcessDiscovery Anonymization & Activity- Monitoring SecuPi Modules Retention & Deletion Personal Data During Retention Personal Data Post Retention Active Data Subjects Data Subject Status Activity MonitoringRegulation Consent7 |Conditions for Consent 17|Right to be Forgotten 18|Restriction of processing 21|Right to Object 30| Records of Processing 32 | Security of Processing ...
  • 4. Information Security Level 2 – Sensitive © 2018 – Proprietary & Confidential Information of SecuPI5 Addressing GDPR Requirements Discovery, data-flow mapping Dynamic Consent Controls User Behavior Analytics (UBA) Logical Deletion Monitoring & Auditing Physical Deletion Matching All Technical Compliance Requirements Processing of Personal Data5 Lawfulness of Processing6 Conditions for Consent7 Conditions of Child's Consent8 Processing Special categories9 Processing of Criminal Records10 Right of Access15 Right to be Forgotten17 Restriction of processing18 Right to Data Portability20 Right to Object21 Protection by Design & Default25 Records of Processing Activities30 Security of Processing32 Notification of Data Breach33 Communication of Data Breach34 Article # |Article Name | SecuPi FeatureArticle # |Article Name | SecuPi Feature Anonymization & Monitoring Module Retention & Deletion Module
  • 5. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI6 SecuPi Platform Enterprise Coverage Front-Office ERP Finance HR-App ERP Reporting Tools CRM e-Commerce Front-office Finance Billing Business Applications SecuPi Platform GDPR enablement capabilities Quick implementation No code changes Beeline
  • 6. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI7 SecuPi Customer Testimonial Metro Group Germany (Largest Retail) Notable SecuPi features applied on Metro applications include: • Discovery & real-time monitoring • “Records of processing activity” • Breach notification, security by design/default • “Right to be forgotten” • Data minimization, and more… Within 4-5 weeks, SecuPi was on-boarded in few customer facing applications with no development effort
  • 7. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI8 SecuPi Monitoring & Anonymization > Simple installation, on-prem or on-cloud > Applying discovery, monitoring and subject-rights on applications, DW and Big data env.
  • 8. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI9 SecuPi Monitoring & Anonymization Module An Application Overlay, No DB agents, No Development Effort Campaign ERPReporting Tools HR-Apps e-Commerce Front-officeFinanceCRM End-Users Applications - CONFIDENTIAL -- SecuPi Central Server Databases Discovery, data-flow mapping Dynamic Consent Controls User Behavior Analytics (UBA) Logical Deletion / Pseudonymizat. Monitoring & Auditing Physical Deletion / Anonymization
  • 9. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI10 Dynamic Masking in CRM Application (column/row basis)
  • 10. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI11 For Teradata, Oracle Datawarehouse, Hive… Campaign Mng.Applications SecuPi Central Management Server CRM UDBs BTEQBeeline HDFS Hive/ Cassandra
  • 11. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI12 SecuPi Application Overlay Monitors & Applies Data Subject Rights No Database agents nor development effort required SecuPi Central Management Servers Data Sources Application UI & Other Interfaces SecuPi Overlay installed on Application Servers Documents Logs Classification and Labeling Monitoring Masking Data flow Discovery Monitoring Masking/encryption/ tokenization Discovery and Classification Monitoring Masking Encryption/ tokenization Data Deletion Consent Controls User Request Data Request Application Server (Java/.Net) User Response Data Response Encryption/ tokenization
  • 12. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI13 SecuPi Solution For Datawarehouse Field-level decryption and anonymization for Teradata, Oracle etc., Installed on Reporting tools (Tableau, Business objects, Excel, etc.) Discovery, Mapping & UEBA Comprehensive Policy Engine - CONFIDENTIAL - SecuPi Logical Deletion policy 999-999-9999JXXXX XXX SecuPi Central Management Servers
  • 13. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI14 HDFS Hive servers SecuPi Data-Centric Approach For Big Data Field-level decryption & anonymization for HDFS Beeline Installed on the Hive Servers Discovery, Mapping & UEBA Comprehensive Policy Engine JDBC ODBC CLI - CONFIDENTIAL - SecuPi Logical Deletion policy SecuPi Central Management Servers
  • 14. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI15 Fat Client & Excel & DBA tools SecuPi Central Management SecuPi wraps the JDBC/ODBC/OCI drivers – on Fat clients running on desktops, Citrix servers and DBA’s PC Installed where the database drivers are used It discovers and classifies sensitive data by entering data values from the screens. It also monitors and audits sensitive user activity coupled with anomaly detection using behavior analytics models Discovery, Mapping & UEBA SecuPi policy can use LDAP/AD/Kerberos to apply field/record level encryption, redaction, masking or blocking sensitive data-flows Comprehensive Policy Engine JDBC ODBC OCI Data Source Applications running C, C++ With SecuPi Policies SecuPi DB Driver Wrapper For Fat-clients & DBA/Dev tools Logically deleted data Anonymized data Original data
  • 15. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI16 SecuPi Discovery & Data-Flow Mapping For applications in scope end-users simply mark personal data in screens & reports, having SecuPi identify the source database objects Initiate Discovery Mouse click the “Select field” button that SecuPi appends to the screen 1 Select field Simply click on a sensitive VALUE on the screen 2 SecuPi Classifies the Data SecuPi identifies the source table/column containing the VALUE. Just add classifications & risk. 3
  • 16. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI17 Comply with “Security by design/default” (article 25) using Data-centric Behavior Analytics (UBA) - CONFIDENTIAL - Detects Suspicious User Behavior in Real-time Detect abnormal/inappropriate data access, as might be attempted by a Malicious Insider or External Attacker using stolen credentials or subverting the application Data protection by design and by default Article 25
  • 17. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI18 Comply with “records of processing” & breach notification articles (articles 30, 33) - CONFIDENTIAL - Comprehensive real-time Monitoring & Forensics Obtain real-time monitoring & full audit for all requests to any sensitive data / sensitive transactions. Obtain a risk analysis of data flow Records of Processing Activities Article 30 Notification of a personal data breach Article 33
  • 18. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI19 Apply Subject Rights Mask and obscure data Pseudonymization policies dynamically masked sensitive information to ensure “need-to-know” access Data Minimization Minimize data access at finer level than an application might inherently support remove or obscure data a user does not require Pseudonymized field Logical Deletion Permit ‘logical deletion’ by hiding data records although still retained in the data- source (data cannot easily be physically deleted for technical or legal reasons)
  • 19. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI20 Unstructured Data Protection SecuPi protects excel, CSV & PDF files created in LoB applications: Automatic & accurate labeling Automatically labels documents at creation Data Protection RMS encryption is applied on file exports to secure sensitive data Enhanced Monitoring Provides visibility on which sensitive data was exported Dynamic controls Apply dynamic masking or data redaction to secure sensitive data at source
  • 20. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI21 Classification of Unstructured Content The exported file contains the classifications that are derived both from the AIP and the SecuPi classifications Automatic and accurate labeling
  • 21. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI22 Install SecuPi on business applications Discover personal data & map personal data-flows from source to destination Define policies to apply data minimization, consent & “Forgotten” Enforce subject rights while auditing and monitoring in real-time all personal data flows and processes Install 4 Steps to GDPR Get your business applications GDPR ready in days and with no development effort Start! 01 02 03 04 Ready! Discover Set Go Live
  • 22. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI23 SecuPi Retention & Deletion > Simple installation, on-prem or on-cloud > No agent required anywhere! > Discovery of personal data (to be anonymized) > Recording and parsing of existing customer deletion processes for faster and safer implementation
  • 23. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI24 SecuPi Implementation Options for “Right to be forgotten” SecuPi Deletion Methods Value at source 213-436-5723John Smith After ~10 years of Retention 999-999-9999JXXXX XXX Logical Deletion on data-flows & processes Physical Anonymization on databases App. Screen/ APIs On DB Level Physical Deletion on databases1 2 3 XXX-XXX-XXXXABCD EF During ~10 years of Retention On DB Level Use During Retention Period or when physical deletion not feasible (e.g., Big Data) Use After Retention Period Use For SalesForce/when App. deletion API exist
  • 24. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI25 SecuPi Retention and Deletion Module Logical Anonymization & Masking (Big data) Physical Deletion SecuPi Policies Retention Workbench Record & Analyze Existing Personal Data Changes and Deletion Processes Retention Orchestration Workflow 1 2 3 Auditability Operability Scalability Physical Anonymization & Masking
  • 25. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI26 Retention & Deletion Workbench Define retention & physical/logical deletion or pseudonymization action
  • 26. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI27 Retention Orchestration Workflow Server Graphical workflow engine for deletion orchestration across data silos
  • 27. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI28 EnterpriseCompliance Time Wave-2 Wave-3Wave-1 Get Your Top-Risk Applications GDPR Ready in Few Weeks It is Fast to Deploy, No DB Agents, No Code-Changes CRM Marketing e-Commerce Compliance Ready! SQL-Plus Toad Campaign Mng. • Fast to Deploy • No DB Agents • Minimal Code-Changes • Agile implementation Business Applications Business Applications Analytics Environments * Order of waves is subject to DPO preference Privileged Access Tools
  • 28. Information Security Level 2 – Sensitive © 2018 – Proprietary & Confidential Information of SecuPI29 SecuPi Capabilities Addressing Additional Use Cases Monitor real-time activity, Data-flow visibility Audit Data Access (both Views/Reads & Writes) Anomaly Detection/UEBA for insider threat Data-minimization (masking, hiding, blocking access) Audit Monitor Control Detect Cloud Onboarding Security DBA/Dev. Access Control Preventing Insider-threat Big-data Data Protection Capabilities Use Cases
  • 29. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of SecuPI30 SecuPi Benefits Centralized, quick and wide GDPR coverage across applications - CONFIDENTIAL - Most comprehensive GDPR solution, covering all GDPR articles across wide LoB applications Agile solution meeting current & future compliance requirements Quick and scalable implementation with no code changes CRM e-Commerce Front-officeBI Tool Dev. Tools ERP Finance HR-App