Explore all the products and find the right solution for your business
Proactively manage server performance on-prem or in the cloud with timely alerts and analytics
Fast configuration of regulatory and audit compliance settings with proactive monitoring, alerts, and reporting
Automated database security, monitoring and management for MS SQL, Azure and Amazon RDS for SQL Server
Backup and instant recovery for SQL Server, Azure Blob Storage and Amazon S3
Discover, track and manage database inventory across the entire environment
24 Essential tools to simplify daily server administration
Get the right solution to keep your database running at peak performance.
All of the support you need at your convenience.
The data resources of an organization are one of its most valuable assets. Except for its people, the information contained in enterprise databases and how it is used is one of the most differentiating factors when comparing similar companies. Productive utilization of data assets through analytics can result in obtaining substantial competitive advantages in the marketplace.
Information streams such as big data and the Internet of Things (IoT) have increased the volume of data, its diversity, and the rate at which it is generated and collected. The differences in structured and unstructured data elements further complicate thoroughly processing and categorizing the information that ends up in databases of an organization.
Not all data is of equal importance to the entities responsible for its creation and storage. In particular, personally identifiable information (PII) needs to be handled more securely than the average data. In this whitepaper, we will discuss the methods and techniques that should be used to protect PII to safeguard the individuals identified by the data and the organizations that store these resources in enterprise databases.
This whitepaper describes what personally identifiable information is, categorizing data resources, steps to protect PII and sensitive PII in databases, identifying the PII collected and stored by the organization, locating where PII is stored, classifying data sensitivity, developing an acceptable usage policy, and encrypting PII and sensitive PII. The whitepaper also presents deleting obsolete PII, reviewing and resolving permission errors, educating employees regarding PII, creating standard procedures for employees leaving the organization, reasons to protect PII and sensitive PII, and tools for protecting PII and SPII in databases.
Presenter: Robert Agar
Robert Agar spent a long and diverse career specializing in data backup, recovery, and compliance among other areas of the IT world. Tired of being woken up at all hours to provide support, he embarked on a new career as a freelance writer focusing on various areas of the tech sector. Outside interests include music, sports, and poker. He shares his home office with two green-cheeked conures who suggest topics and engage in the occasional proofreading exercise.
Register to read the full whitepaper.
Topics: Database Compliance, Database Security Products: SQL Compliance Manager, SQL Secure