Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

Home > IBM Corporation > Data Security And Privacy Thought Leadership

Data Security And Privacy Thought Leadership

White Paper Published By: IBM Corporation
IBM Corporation
Published:  Oct 20, 2011
Type:  White Paper
Length:  12 pages

News headlines about the increasing frequency of unauthorized access to  sensitive data and identity theft have focused awareness on data security and  privacy breaches-and their consequences. In response to this issue, regulations (SOX, HIPAA, PCI-DSS, FISMA, EU Data Privacy Directive) along  with the rising number of regulatory mandates have increased the pressure to  show immediate compliance, otherwise failure to ensure compliance can result   in significant financial penalties and even jail time. In addition, organizations also risk losing   customer loyalty and damaging brand equity.
    This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization's business goals, achieving compliance and reducing risk. IBM InfoSphere solutions for data security and privacy support a holistic approach ensuring the protection and integrity of your data that includes:
    . Identifying common sources of risk
    . Understanding of where the data resides
    . Protecting structured and unstructured data
    . Securing non-production environments [offline vs. online data]
    . Safeguarding heterogeneous DBMS and data warehouse platforms
    . Continuous monitoring of access to data
    . Redacting sensitive data
    . Encrypting enterprise data
    . Centralizing policies management, audit reporting and sign-offs
    . Demonstrating compliance to pass audits

Tags : 
ibm, guardium, technology, data, security, privacy, risk reduction