Data Masking

Решения на Informatica за
архивиране на данни –
Data Archive, Data Masking, Data Subsets
1
1
The Informatica Approach
Comprehensive, Unified, Open and Economical platform
Data
Warehouse
Data
Migration
Test Data
Management
& Archiving
Data
Consolidation
Master Data
Management
Data
Synchronization
Complex
Event
Processing
B2B Data
Exchange
SWIFT
Cloud Computing
2
Application
Database
Unstructured
NACHA
Ultra
Messaging
HIPAA
…
Partner Data
2
Informatica Application ILM
• Leading provider of ILM solutions for Oracle, PeopleSoft, Siebel,
SAP, and custom apps
• Application ILM Enables Customers To:
• Data Archive – Relocate older/inactive data out of production for
performance, compliance and application retirement
• Data Privacy – Protect sensitive information in non-production
• Data Subset – Create and update smaller copies of production
databases for test and development purposes
• ILM Value Proposition:
• Lower storage and server costs
• Improve application and query performance
• Less time and cost for back-up & batch processes
• Eliminate cost, complexity by retired legacy applications
• Prevent data breaches in non-production environments
3
3
Application ILM Products & Use Cases
Improving Operational Efficiency & Compliance
•
Reduce storage, RDBMS license, personnel costs
•
Increase performance
•
Reduce effort spent on maintenance & compliance
•
Reduce data privacy risk
DATABASE SIZE
Production
Development/Testing/Training Copies
Performance
Copy 1
Copy 2
Copy 3
Informatica Data Subset
Informatica Data Archive
Copy 1
Copy 2
Copy 3
Inactive data
Active data
TIME
Informatica Data Masking
Market Drivers for Application ILM
Transaction Volumes, Data Management Costs Exploding
DATABASE SIZE
Performance
Inactive data
Active data
TIME
•
Growing storage and database license costs
•
Increasing effort spent on maintenance
•
Diminishing performance
•
Most growth is due to accumulation of inactive data
The Challenge of Increasing Data Growth
BEFORE SOLUTION
AFTER SOLUTION
Growing storage costs
Predictable manageable growth
Diminishing performance
Improved, stable performance
Increasing maintenance &
Compliance work
Reduced maintenance &
compliance work
Archive for Performance: Operational Efficiency
DATABASE METHOD
Archived
Transactional
Data
Current Data
Production
Database
Access archived
data through
production interface
Keep data in
database format
Online Archive
Database
Seamless Access Layer
FILE METHOD
Current Data
Optimized
File Archive
Archive data to
optimized file format
for storage reduction
• Compressed
• Immutable
• Accessible
Production
Database
Reporting
Informatica ILM: An Enterprise Solution
Platform & Vendor Independent
Archive for Performance, Compliance and Retirement
Production and Legacy
Databases
Seamless
Access
Informatica
Data
Discovery
Online Archive
Databases
Custom
Apps
BI / Reporting
/ SQL Tools
Optimized
File Archive
Extract to
XML or CSV
ODBC/JDBC
Archive and Retire
Store
Access
ILM Data Archive
The benefits of structured data archiving
 Improve reporting and query response times
Application
Performance
 Shorten IT maintenance tasks like backup and refresh
 Increase speed of business processes
 Reduce the risk and cost of non-compliance
Compliance
 Timely, policy-based disposal of structured data
 Guaranteed, straightforward access to data as necessary
 Rationalize IT infrastructure for massive cost savings
Application
Retirement
 Ensure ongoing, flexible access to retired data
 Reduce data footprint with massive compression
9
9
Why Customers Select ILM Data Archive
Cost
Savings
 Standardized approach offers quickest time-to-value
 Massive compression of file archive optimizes storage
 Integrated, robust retention management
Compliance
 Advanced validation of retired data
 Comprehensive auditing and granular access control
 Application accelerators for Oracle, PeopleSoft, Siebel, SAP
Productivity
 Full extensibility for custom applications and specific business
requirements
 Easy end-use access to archived data
 Transparent, flexible architecture
Versatility
 Broad connectivity (relational, mainframe, variety of applications)
 Integration w/ 3rd party storage, e-mail archiving, ECM solutions, BI and
reporting tools
10
10
Application Retirement
11
11
Who Cares About Application Retirement
I need to reduce
our IT costs!
I need to eliminate
Legacy Application
costs.
I need to reduce the
number of applications
I manage.
CFO
Buyer
Our data centers
are
maxed out!
VP Infrastructure
Influencer
12
CIO
Buyer
I need records
for legal cases or
audits.
Director of Applications
Influencer
General Counsel
Influencer
12
According to the Analysts
Forrester
“Why waste money maintaining applications that aren’t worth keeping?
Why not redirect that money to where it will benefit the organization?”
Gartner
“Use the recession to convince senior management to allow them to dump
costly legacy IT. Look for applications to kill off.
There is now a shift in attitude which means businesses are more open to
switching off old systems if it will save them money.”
“Significant cost reduction opportunities (20% of the total application
costs) can be achieved via aggressively pursuing an applications
retirement initiative.”
13
13
The Case for Application Retirement
Why Do It?
 Cost elimination
 Hardware, software maintenance contracts
 IT staff, data center
 Reduce operational and business risks
 Eliminate reliance on IT staff w/ legacy knowledge
 Reduce IT complexity
 Compliance to regulations
 Data retention guidelines from SOX, HIPAA, BASEL II
 Central location for accessing, viewing retired data
14
14
Informatica Application Retirement Solution
BEFORE
Thin
Client
Reports
RETIRED
Thick
Client
Application
Database
Application
Data
Operating System
Reports & data
discovery portal
Hardware
Maintenance
IT Staff
15
15
5 Steps to Application Retirement
Legacy
Applications
MINE
SOURCE
Informatica Data Archive
Wizard-based UI
EXTRACT,
MOVE DATA
COMPRESS,
SECURE DATA
Informatica
Data Archive
File Archive Store
Informatica Data
Discovery
MANAGE
ACCESS
16
DEFINE
RETENTION
POLICIES
16
Informatica Dynamic Data Masking
17
17
Data Must Be Protected
Devastating Costs Of A Data Breach
Ponemon Institute
• 84% of enterprises have experienced at least one data security
breach in the last year
• The cost of a breach averages $5.5 million per company
• 41% of all cases involve insider negligence
18
18
Protecting Sensitive Data
Restrict Access, Mask Private Data
19
•
Development and Testing
•
Training
•
Support
•
Data Analysis
•
Outsourcing and Offshoring
John Smith
654-65-8945
4563-3456-9876-6342
100 Cardinal way
Redwood city
Glen Carter
900-45-2643
4563-XXXX-XXXX-6342
342 54th Street
New York
19
What is Considered Sensitive Data?
• Customer Data
• Corporate Data
• Name
• Financial Data
• Address
• Employee Information
• Phone Number
• Product Data
• Email
• Social Security Number
• Credit Card Information
• Account Numbers
• Medical Records
20
John Smith
654-65-8945
4739-1102-3517-8842
100 Cardinal way
Redwood City
20
What is Data Masking?
• Transformation of sensitive information into
de-identified, realistic-looking data
while retaining original data properties
•
•
•
•
Data remains relevant and meaningful
Preserves the shape and form of individual fields
Preserves intra-record relationships
Preserves join / foreign key relationships
John Smith
654-65-8945
4739-1146-8075-5716
100 Cardinal way
Redwood City
21
Glen Carter
900-45-2643
4739-1102-3517-8842
342 54th Street
New York
21
Data Masking – Protect Sensitive Data
Sensitive data needs
to be protected
everywhere.
• Sensitive data in test and
dev is highly exposed
We need access
to all the data.
How else can we
test it?
QA Manager
Compliance
Officer
With so many
instances of sensitive
data we need an
overall policy.
Someone needs to tell
me what to protect
Database
Administrator
22
• More data in more
places increases risk
• Disparate application
environments make
policy enforcement a
challenge
• QA and development
professionals need
access to data
Director of
Applications
22
Product Overview
Dynamic Data Masking
• Dynamic Data Masking protects sensitive information from end-users who are
not authorised for access
• Informatica Dynamic Data Masking ensures that each user will see the data
according to his or her identification, role, and responsibility – completely
transparently - without changing applications or databases
23
23
Product Overview
HR Privacy Protection Example
Dynamic Masking anonymizes
names, account numbers and
SSN dynamically when accessed
by unauthorized users,
outsourced and IT personnel
24
24
Product Overview
Development & DBA Tool Protection Example
Masking
Names are
performed
scrambled,
completely
credit card
transparent
numbersto
the calling
and
salaries
tool
are/ application
masked
25
25
CUSTOMERS_TEST
CUSTOMERS_PROD
PowerCenter +
Data Masking Option
CUSTOMER_ACCOUNTS
_PROD
26
CUSTOMER_ACCOUNTS
_TEST
26
Summary & Highlights
• Informatica Dynamic Data Masking is a pioneer of
dynamic data masking delivering a new level of data
protection for production systems
• Transparency – no need for changes to production
databases or applications
• Rapid implementation – secure critical business
applications in days
• Pre-packaged rules for leading packaged applications
• Informatica is the only vendor to offer end-to-end data
masking for all application environments throughout the
enterprise
28
28
Informatica Persistent Data Masking
29
29
Informatica Data Masking: Enterprise Solution
Total Privacy Protection
•
Production and
nonproduction have differing
requirements
Production
Support
Production
Dynamic Data Masking
Dynamic Data Masking
•
•
•
30
Dynamic Data Masking
masks, blocks, audits and
alerts about unauthorized
access to sensitive
production data
Persistent Data Masking
Permanently de-identifies
sensitive data in
nonproduction tables
Data Masking
Development
Persistent Data Masking
Testing
Persistent Data Masking
Together = Total Privacy
Protection
30
Informatica Persistent Data Masking
Permanently alter sensitive data such as credit cards,
address information, or names
Variety of Techniques:
ID
Name
City
Credit Card
•
•
•
•
0964
John
Smith
Mike Wilson
Plano
Fresno
4417 9741
1234 1949
5678 9471
9112
9388
Mark
Jerry Jones
Morrow
Modesto
Fresno
4981 1341
4078 0854
9149 0508
1491
2586
Rob
Hartford
AndyDavis
Sanders Fresno
4298 9341
0149 9544
0134 9114
0148
7310
Jeff
JoshRichards
Phillips
Shuffle Employee ID’s
Substitute Names
Constant for City
Special Credit Card Technique
Tampa
Fresno
4198 9481
9148 9147
1499 0521
1341
 Purpose built user interface
 World class ETL environment for advanced rules
31
31
Summary
Persistent Data Masking
32
•
Persistent Data Masking
mask sensitive and
confidential data in nonproduction systems such as
development, test, and
training systems
•
You can mask data such as
credit card information, social
security or national
identification numbers, and
email addresses.
•
The result is realistic data
that you can use for
development or testing
purposes, but with the
security of knowing that the
information is unidentifiable.
32
Informatica Data Subset
33
33
Data Subset
• Full size database
copies take up too
much space
I need real data
to work with.
We need more
environments!
QA Manager
Developer
Storage is
expensive!
The pace of change
is relentless.
• Lack of current data in
test and dev increases
risk and lowers quality
I don’t have enough
infrastructure for all
of these copies.
Storage
Administrator
DBA
34
• Testing for upgrades,
patches and
enhancements require
lots of environments
Director of
Applications
34
Informatica Data Subset
Lean Copies for Non-Production Use
Time
Savings
Here
Time Slice
or
Functional Slice
Space Savings
Here
DEV
900 GB
TEST
900 GB
Production
Database
15 TB
Subset
900 GB
TRAIN
900 GB
Outsorce
900 GB
35
35
Informatica Data Subset Benefits
Solution
Benefits
 Reduced cost of storage and maintaining non-production
environments
 Avoidance of future expenditure for non-production expansion
Data Subset
 Faster development and testing cycle times
 Improved quality of testing and development activities by ensuring
teams are using current data
36
36