mcarmona
Contributor

Organizations face increasing pressure from regulators and their own customers to fully protect data. The threat of a costly data breach always looms, and businesses must take their role as data stewards seriously. Yet, effective data security doesn’t mean the data has to sit untouched in a vault.

De-identifying your and your customers’ data of sensitive elements fully protects the data as it moves across diverse cloud and on-premises environments—enabling your organization to use data to inform AI, machine learning, analytics, and any other data-driven initiative that will help you successfully compete in the digital world.

 

ORIGINAL DATA

Here’s what your data looks like unprotected. It’s cleartext.

 

01_Clear.JPG

 

 

PSEUDONYMIZATION: ENCRYPTION AND TOKENIZATION

One method to de-identify this data is pseudonymization. There are two effective ways to pseudonymize: encryption and tokenization.

Encryption uses mathematical algorithms and cryptographic keys to change data into binary cyphertext.

02_Encrypted.JPG

 

Tokenization converts cleartext data into a string of characters based on random values.

03_Tokenized.JPG

 

Pseudonymizing data doesn’t mean it’s gone forever: the process is reversible, allowing authorized users to view and manage the protected data afterwards. Also, tokenization maintains data type and length: when the user needs the original data, it can be restored to its original state.

  

ANONYMIZATION

Anonymization strips sensitive elements from data, irreversibly protecting it.

04_Anonymized.JPG

 

Organizations might want to anonymize data for a variety of reasons, especially to participate in data exchanges and marketplaces where data can be shared and monetized. Also, when companies want to share privately company-to-company or with SaaS systems, such as Workday or Salesforce, irreversible protection methods might be required.

 

MAKE THE MOST OF DATA BY DE-IDENTIFYING SENSITIVE ELEMENTS

De-identified data is ready to be immediately used in AI, analytics, machine learning, and other business applications without disclosing identities, sensitive personal information, and intellectual property.

De-identification meets stringent compliance, privacy, and regulatory requirements, including GDPR, PCI, PHI, HIPAA, and PII mandates.

When running Protegrity operations directly on Exasol's high-performance in-memory engine, you can protect large amounts of data within seconds instead of minutes or hours. And your data is protected at all times, no matter where it is: cloud and on-premises systems, applications, and files—even if it travels outside to a fully unprotected environment.

De-identification is compatible with Exasol for all existing and future applications. The Protegrity Database Protector for Exasol seamlessly enhances the security of any Exasol warehouse with industry leading high-performance encryption, tokenization or dynamic data masking combined with centralized policy-based protection, auditing, and reporting.

 

PROTECT DATA IN-MOTION AND AT REST

Protegrity secures data where it resides—not just when it is in motion. Rather than creating copies of data or just masking it—leaving the source data vulnerable, as some security platforms do—Protegrity protects the actual data. The Protegrity Data Protection Platform closes security gaps and simplifies the management of policies. With a cohesive approach to data protection—including de-identification of sensitive data elements—businesses can extract transformative insights to fuel growth, knowing sensitive data is always secure.

This article has been written by Marc Caromona from Protegrity, you can reach out directly to him at @mcarmona