Archive

Posts Tagged ‘cost reduction’

Is Data Masking better than Encryption?

November 11, 2011 Leave a comment
Is Data Masking better than Encryption?

Data masking vs Encryption. Is one better than another? No, they are two parts of a whole

By Vitaly Dubravin

Strange question, isn’t it? Data masking and encryption are like apples and oranges, but the question is not strange at all. There are many similarities between both technologies, though the differences are substantial. Each of them is designed to ensure data protection, which can be substantially improved when both are used in synergy.

Data encryption is the process of transforming information using some algorithm (a cipher) to make it unreadable to anyone except those possessing a key. It is widely used to protect files on a local, network or cloud disk drives (EFS, PIE), Network communications (IPSEC, VPN) or just a web/email traffic protection (TLS/SSL). All these technologies are designed to secure communication/storage media from the intruders, though provide limited ability to control data privacy on a very granular level (like a database record). There are known methods to make an encrypted document accessible by the multiple people with individual keys, but it requires an expensive investment into the security infrastructure and becomes impractical when applied to the database. Data encryption ensures that only people who should have access to the data will gain safe access to the datasets, including the ones they are not suppose to see. Data encryption is not designed to address a role based security problem.

Read more…

Advertisements

Dynamic Data Masking Inside Out

Dynamic Data Masking Engine plays an essential role in the Enterprise Security and Data Privacy frameworks

By Vitaly Dubravin

Dynamic Data Masking has grown over the years into a robust and mature product. It has become one of the primary tools to combat private information leaks from production environments. It limits, if not completely eliminates, all sensitive data exposures due to the application security design flaws, inadequate testing, ever changing regulatory requirements and aggressive production release schedule.

It is important to understand that Dynamic Data Masking (DDM) is not a replacement for a traditional data protection and security measures. It was designed to address a very specific but extremely damaging situation when private data gets in the wrong hands. Data Masking works as a proxy that secures only data communication channel and should be deeply integrated with the Enterprise Authentication and Authorization infrastructure as well as network security tools to gain maximum advantage and significantly reduce implementation and operation costs. Read more…

Dynamic Data Masking Engine as an Enterprise Security Proxy

Dynamic Data Masking Engine as an Enterprise Security Proxy

How to reduce application development costs by including dynamic data masking in the data security infrastructure.

By Vitaly Dubravin

Data leaks happen, it’s a fact. These leaks cause reputational damage, they impact day-to-day operations and trigger costly litigation processes for non-compliance. Although there is no solution that guarantees 100% assurance against data leaks there are data protection systems available to help minimize the probability of such an event. Here I’ll explain how a Dynamic Data Masking engine can operate as an Enterprise Security Proxy for all enterprise applications and why it should be a part of system and application design from day one.

Physical database server access should be prohibited and a decent firewall with intrusion detection is a necessary part of design; I’m not going to even consider the possibility of their absence. Most databases expose only one port to applications for data exchange and that single port is the source of most data leaks. Read more…

DW/BI: Cost Reduction for Better Security

Data Warehouse implementation: Cost reduction for better security

Dynamic Data Masking can help drastically reduce Data Warehouse development cost while improving overall data security.

By Vitaly Dubravin

Data Warehouse and Business Intelligence (DW/BI) implementation is frequently considered a black hole for the IT budget.  It is hard (almost impossible) to run a business without one, but requires substantial investment to reshape your existing transactional systems to clean “dirty” data, fix existing (but broken) business processes and formalize analytical needs for different departments. Vast majority of these costs have nothing to do with the Data Warehouse, but become noticeable during DW/BI project.

My team at GRT Corporation has deployed tens of Data Warehouses for Fortune 50, as well as smaller size companies.  One of the most common challenges for DW/BI implementation is loose definition of business requirements by the business. This is not something that can be fixed, for a simple reason – it’s very hard to tell what you need for the system until you start using it every day. Good Data Warehouses are built in phases not because the scope is huge, but because user requirements are changing while the business is getting hands-on experience analyzing real data. Read more…

Perfect Skype setup: Step one – get personal Skype account (FREE)

December 19, 2010 1 comment

By Vitaly Dubravin

Go to www.skype.com and click “Join Skype” (or “Create an Account”). This is simple and straight forward process.  Use your real name when asked – it is so annoying to see names like “anKJqm183” in the contact list. Specify your location as well. You will see why in the step three. Be careful choosing your Skype Name – your id in Skype – this is what you will give to others to connect. There is no way to change it! You will use this id for life. Skype also asks for your email – it is used to send you account related information (like Skype purchases). I have not seen any 3rd party messages coming to my email, so you should not be concerned about new spam heading your way. Profile information is optional, but is recommended – Skype will remind your friends that today is your birthday etc.

Read more…

Perfect Skype setup: Step two – install Skype and test it (FREE)

December 19, 2010 2 comments

By Vitaly Dubravin

You have to have Skype client somewhere to use it with your account. There are clients for almost all imaginable devices – from a laptop to a cell phone and even TV set. I’ll not be surprised if a fridge or a microwave version will come out soon. But your computer (Windows or Mac) is always a good starting point.

Read more…

Perfect Skype setup: Step three – add your buddies and colleagues with Skype accounts (FREE)

December 19, 2010 3 comments

By Vitaly Dubravin

Skype has reported over 100 million accounts created, so there is a good chance that your friends are already there. Use “Add a Contact” tab in Skype client to add them. Try searching by name first. You may get a huge list with people around the word with the same name.  Here is where location information becomes handy.

Read more…