You are on page 1of 33

Product Details

Summary
Data Protector Suite

Summary
Data Protector Suite 2024
FieldShield
PII / PHI Classification & masking

Summary
FieldShield – PII/PHI Classification & Masking

What FieldShield Does-


• Finds and masks data in structured (flat) files, RDBs, Excel and ASN.1-encoded CRD files
• Performs ETL while masking to push masked data into lower environments
• Automatically discovers and parses DDL and file metadata to speed job script production
• Uses built-in data classification infrastructure to assign sensitivity levels and masking rules
• Profiles, models, and searches data sources on premise or in the cloud
• Produces search reports in human and machine-readable log and dashboard formats
• Applies deterministic masking rules consistently to preserve referential integrity
• Works in combination with IRI data cleansing, transformation and report job specs
• Writes loader metadata and performs direct path loads for test DB populations
• Simultaneously creates flat-file and custom/structured detail and summary report targets
• Works with Voracity subsetting wizard to mask parent and child subset tables or files
• Runs from the Voracity Ripcurrent module to mask changed rows incrementally in real-time
• Scores the risk of re-identification based on unmasked quasi-identifiers
• Generates multiple runtime logs and diagrams for masking-related audit trails
• Pushes and pulls data classes, rules, and other job artifacts through Git for shared work
FieldShield
WorkFlow
Static Data Masking Function Categories
Character Encryption /
Scrambling Decryption

Encoding /
Hashing
Decoding

Custom Deletion &


Functions Suppression

String Blurring &


Manipulations Bucketing

Pseudonymiz
Randomization
ation

Redaction / Expression
Obfuscation Logic
Sensitive Data Classification and Search Result Reports,
Search Wizards Dashboards & Exports

Multiple Masking Job Design


Multiple Job Deployment Options
Options

Re-ID Risk Determination Masking et al in Hadoop, too

US HIPAA and FERPA regulations require that patient and


student data sets used in research or marketing have a
statistically certified “very small” chance of being re-
identifiable. Dynamic Data Masking Options
CellShield
PII / PHI Search & Mask in Excel

Summary
CellShield Search Report & Action
CellShield PII Discovery
Sheet

Intra-Cell Searching & Masking,


CellShield Masking Functions
Too

CellShield Audit Log Options


DarkShield
Data Procter Suite

Summary
Cloud & Data-Center
Services

Summary
Cloud & Data-Center Services

DC & DR Cloud
Services Solutions

Data-Center Public Cloud


Solutions

Disaster Private Cloud


Recovery
Solutions

Managed Co-
Hybrid Cloud
location

Co-location & Cloud


Dedicated Container
Rack Space
Cyber Security Portfolio

End Point Network


Data Security Cloud Security
Security
Security

Next Gen
Endpoint Data Loss CASB
Firewall
Protection Prevention

Email Security
Data Cloud
Mobile Device
Classification Workload
Management Web/Proxy
Security
Security
Digital Rights
Mobile Threat Management Web
DDoS Application
Protection Protection
Firewall
Encryption

EDR Vulnerability
Management

VA PT
Connectivity & Telecommunication Solutions

Data Services Voice Services Collaboration Marketing


Services Solutions

Internet Centrex
Zoom
Toll Free Service
PRI
MPLS VPN

SIP Trunk
Lease Lines SMS Solutions
International Bridging
Services
International
SmartOffice Bridging Services

Hosted IVR

EZ Cloud Connect
Digital Service Offerings

Digital Asset Digital Assessment Retail Intelligence


App Modernization Enterprise Application Digital XR Services Management Solutions Solution
Services Services

• Delivering a • Increase • Enable immersive • Streamline and • Modernize your • Proactive


compelling user operational user experience by automate your talent assessment intelligent insights
experience with efficiency with utilizing digital digital assets, and recruitment for forward supply
digital integrated end-to- technologies and engage modern processes to drive chain operations
infrastructure and end management of tools for products, buyers with transparency and including e-
value stream all your processes and relevant content to efficiency commerce and
management applications, people grow your brand. modern retail
solutions databases and
(DevSecOps and middleware across
CI/CD as a service) SAP, Microsoft, and
Oracle
environments.
Product
Specifications
How we help you navigate Cloud adoption complexity
• Cloud Migration Assessment Services
• Cloud Infrastructure Advisory Services
Assess • Cloud Infrastructure Migration Services
& • Modern Workplace Migration Services
Migrat • Cloud Identity Services
e

• Maturity Assessment Service


Gover
nance • IT Governance Services
and • License Optimization Services
Optimi • Cloud Economics Services
zation
Servic
es for
Cloud

• Cloud Advisory ServiceDesk


Operat
e&
Suppor
t

• Data Platform Assessment


• Data Platform Implementation
Innova • Data Platform Management
te &
Accele
rate
Cloud Adoption Framework
Governance & Lifecycle Management Framework
Data Loss Prevention
Our advanced Data Loss Prevention (DLP) solution puts an end to data leaks and data theft while offering control of portable
storage devices and ensuring compliance with data protection regulations.

It is designed to protect confidential data against insider threats while maintaining productivity and making
work more convenient, secure, and enjoyable.

Endpoint Protector is an enterprise-grade DLP software for Windows, macOS and Linux computers, Thin Clients and Desktop-as-
a-Service (DaaS) solutions. The solution is an ideal choice for companies running on multi-OS networks and it has a modular
format that allows them to mix and match the right tools to serve specific needs.

By deploying it, organizations can safeguard personal information and meet compliance requirements for
regulations such as the GDPR, HIPAA, LGPD, CCPA, PCI DSS, etc. Endpoint Protector also offers protection
to the company’s intellectual property and trade secrets.

 Enterprise-grade security solution for any industry


 DLP for Windows, macOS and Linux
Prominent Features -
macOS / Linux
Windows /

• Lockdown, control, and monitor USB and peripheral ports to stop data theft and data loss.
Devic • Set Rights per Device, User, Computer, Group or Globally.
e
Contr
ol

Conte • Monitor and Control data in motion, deciding what confidential files can or cannot leave the company.
nt • Filters can be set per File Type, Application, Predefined and Custom Content, Regex and more.
Awar
e
Prote
ction
• Automatically secure data copied on USB storage devices with AES 256bit encryption.
Enfor • Cross-platform, password-based, easy to use and very efficient.
ced
Encry
ption

• Scan data at rest on network’s endpoints and apply remediation actions such as encrypt or delete in case
confidential data is identified on unauthorized computers.
eDisc • Cross-platform, password-based, easy to use and very efficient.
over
y
Key Benefits -
Detailed
reports of
user activity

Flexible
Easy to deployment
Install
options

Advantages

Predefined
Granular
compliance
policies
profiles

Cross-
platform
protection
DLP for Enterprises -
In the age of digital transformation and workstream collaboration platforms (WSC), addressing the risks of data loss and
noncompliance is a must for enterprises, as the consequences of data breaches include not only hefty fines but legal problems and
reputational damages also. Endpoint Protector Enterprise comes with a more effective data security solution on the market,
enabling enterprises to continuously identify, monitor, and control the data that they need to protect, wherever they are.

User Remediation
Endpoint Protector Enterprise flavor adds more flexibility to security policies. Through the user remediation feature,
end-users are allowed to self-remediate, meaning that after they justificate their activity, the transfer of specific
sensitive information is allowed for a defined amount of time.

Seamless Integration
Data loss prevention policies can be easily set for the entire network from Endpoint Protector’s centralized dashboard
that offers an enhanced user experience..

Management Console
Our solution offers integration with Active Directory (AD) integration, and Security Information & Event
Management (SIEM) technology. Integration with SIEM allows to transfer activity events to a SIEM server for
analysis and reporting. With AD large deployments can be simpler.
100% Deployment
Flexibility
 Our products are enterprise-grade and continually evolving to best serve any type of network and industry. With a
client-server architecture, they are easy to deploy and are centrally managed from the web-based interface. Besides
the Virtual Appliance, the server can be hosted by us and in major cloud infrastructures like Amazon Web Services,
Microsoft Azure or Google Cloud.

 Multiple login options, including local accounts, on-premise Active Directory (AD) authentication, Azure AD and
OKTA Single Sign-on (SSO) are available, are available, allowing simpler and easier control for admins. Multi-factor
authentication (MFA) is also possible.

 Device Control, Content Aware Protection, Enforced Encryption, and eDiscovery are available for computers running
on different Windows, macOS and Linux versions and distributions.
Q& A

You might also like