Page 1

Shift + Delete the Risk of a Data Breach

DATA

INFOGRAPHIC

ORGANIZATIONS INADVERTENTLY BREACH INFORMATION WHEN THEY ROUTINELY COPY SENSITIVE OR REGULATED PRODUCTION DATA INTO NON-PRODUCTION ENVIRONMENTS.

Enterprises share the data from Production environments for a variety of business needs: To Facilitate Testing

For Operational Management

For Data Analysis

Adapting production data for testing provides realistic and high-quality data, enabling seamless testing across all applications

Access to the production database for customer service or technical support

Point-of-Sale customer's data is shared with market researchers to analyze the customer's buying patterns

Some Infamous Data breach incidents

October 2018

Google announced that it is going to shut down Google+ after the data exposure of 500,000 users

October 2018

Facebook revealed that a security bug has compromised the data of nearly 50 million accounts and exposed the data of 40 million more

October 2016

Uber had to pay £133m to settle the legal action over the cyber attack that exposed data from 57 million customers and drivers

November 2016

Tesco Bank had to freeze its online operations after money was stolen from 20,000 customer’s accounts

November 2016

Three, one of Britain's largest mobile operators suffered a major breach due to a compromised employee login

These leaks are further evidence that large firms need more regulatory oversight.

What is Data Masking? Gartner defines data masking as “a technology aimed at preventing the abuse of sensitive data by giving users fictitious (yet realistic) data instead of the original data.”

Data protection has grabbed press headlines like never before with the GDPR regulation, emphasizing the importance of data masking to help organizations mitigate risk.

COMMON DATA MASKING TECHNIQUES Encryption

The process of encoding a message or information in such a way that only authorized parties can access it

Character Scrambling

The order of the characters is jumbled so the original content is not revealed

Nulling Out or Deletion

The data becomes nullified and can be accessed only by the authorized parties

Substitution

The original data is substituted for another authentic looking value

Shuffling

The data is randomly shuffled within the column

BENEFITS Cost-effectively protect critical data & meet compliance requirements

Improved efficiency and effectiveness of testing and quality efforts

Support outsourcing, big data, and cloud initiatives

Protecting sensitive data in non-production environments & reduce the risk of operator errors

for Salesforce Release Management AutoRABIT, an end-end Continuous Delivery suite for SaaS platforms. Its Data Masking feature helps enterprises successfully achieve data security. www.autorabit.com

Copyright © 2018 AutoRABIT.

Profile for autorabit547

Salesforce Data Masking  

Gartner defines data masking as “a technology aimed at preventing the abuse of sensitive data by giving users fictitious (yet realistic) dat...

Salesforce Data Masking  

Gartner defines data masking as “a technology aimed at preventing the abuse of sensitive data by giving users fictitious (yet realistic) dat...

Advertisement