A Solution to Locate Regulated or Sensitive Data on IBM i
Nanuet, New York – April 15, 2018 – Raz-Lee Security Inc announces the release of Data Discovery for GDPR & PCI, a solution that provides organizations a clear and accurate view of where regulated or sensitive data resides within their organization.
Common sense and regulations such as PCI and GDPR dictate that sensitive data must be secured by encryption. An important step to protect sensitive data such as personal data or credit card details is to identify its existence. With the IBM i collecting data over the course of a business’s life, there is a vast amount of data stored on it and locating regulated or sensitive data is time consuming and often a complex process. Couple that with the constant motion of data and undocumented copies of data in unpredictable places, locating all the sensitive data becomes near impossible. “Raz-Lee Security is committed to providing real solutions to problems faced by IBM i shops,” says Shmuel Zailer, CEO, Raz-Lee Security. “Our new Data Discovery simplifies the process of isolating the location of sensitive data and is an invaluable tool to add to your tool kit.”
Raz-Lee Security’s Data Discovery is a unique solution that scans for specific data in your database. Data Discovery is powered by a GUI based, user-friendly wizard, that allows users to define the search characteristics of sensitive fields that need to be pinpointed. It then scans IBM i data on the defined system to reveal the location of the sensitive data. The results are then presented in a report to allow organizations to assess and implement necessary policies to help mitigate risk associated with the retention of this type of data. Data Discovery reduces IT staffing costs associated with manual detection of regulated and sensitive data on the IBM i and allows organization to estimate the scope of compliance projects.
Data Discovery is part of Raz-Lee’s new iSecurity Security Investigator Suite, which will be released soon and also includes Authority Inspector and Assessment. Authority Inspector provides insight on excessive user authority, Assessment identifies the security risks to your system, and Data Discovery reveals the location of sensitive data. Together, they deliver a comprehensive view of the vulnerabilities within an organization. Data Discovery is agent-less, only installed on a PC and connects to the IBM i in order to scan the data on it without adding risk, overhead or additional footprints. Critical data never leaves the IBM i.
A limited version of iSecurity Security Investigator is available for a free one-month trial. The full version can be obtained by purchasing a license or an external audit service from one of our certified business partners.