Guardium’s Data Privacy Accelerator delivers a portfolio of pre-configured policies, real-time alerts, and audit reports tailored to the challenges of identity theft and other data privacy requirements.
With the Data Privacy Accelerator, security managers, privacy officers, and database administrators begin by “tagging” sensitive information data elements, creating “privacy sets.” For example, a privacy set can be defined as the combination of a first name, last name, and credit card or social security numbers.
Organizations can identify suspicious activity, which could indicate hacking or inappropriate insider activity, when privacy sets are accessed outside of the standard behavior profile.
For example, the system can generate real-time alerts when a high volume of requests are received for privacy set objects.
Requests can also be flagged or blocked when sensitive information is accessed in unexpected ways, such as after-hours queries or access from unapproved applications like Microsoft Excel or developer tools.
Organizations can create a detailed audit trail of the entire database session, which is important because it allows them to determine how many accounts were actually compromised.? This avoids the need to notify all customers in order to comply with notification laws if only a portion of the database has been compromised.
|