Protecting PII at Scale: A Closer Look at the NetCentrics Approach

Cybersecurity

Protecting PII at Scale: A Closer Look at the NetCentrics Approach

Personally Identifiable InformationBy Carver Pace

As I wrote earlier, the pandemic is quickening the pace with which Personally Identifiable Information (PII) is produced, stored, and transmitted – opening potentially new attack surfaces for malicious actors. 

NetCentrics is stepping up efforts to protect our customers’ PII at rest and in transit. While I won’t go into specifics here, I think it is valuable for our customers to understand our approach from a 40,000 foot view. This way, you can see how our work fits into larger efforts to protect sensitive data. 

We Evaluate Data Everywhere 

Data at rest or in transit can be found in many places. We monitor: 

  • Cloud Storage Providers: Amazon AWS (S3), Microsoft Azure BLOBs/Tables/Queues, Dropbox (for individuals), Box Enterprise, Rackspace Cloud Files, and OneDrive for Business 
  • Databases / Servers: IBM DB2, IBM Informix, Microsoft SQL Server, MongoDB, Dropbox Business, MySQL, Oracle, PostgreSQL, SAP Sybase, SAP Hana, Tibero, Teradata, InterSystems Caché 2.1+, Hadoop  
  • Email: Exchange 2007+, GMail, HCL Notes, IMAP and Microsoft Office 365 

What kind of data do we protect? We identify more than 300 types of confidential data sources from over 50 countries. This includes the data you might expect needs protection (like driver’s licenses and credit cards). It also includes data that appears to be of low value to others. Since seemingly “low value” data can be triangulated with known PII, low-stakes data can cause damage if it isn’t protected properly. 

Custom Data Discovery and Immediate Scanning 

We don’t stop with out-of-the-box solutions. We create custom, internal data discovery solutions. These pattern-matching solutions protect sensitive data according your unique requirements. We scan data immediately using these parameters to complement and strengthen your data loss prevention strategy. 

Zero-Trust Security Posture and Robust Analysis  

NetCentrics implements a series of strategies to quickly remediate risks and quarantine threats. We create a zero-trust security environment at every step to encrypt, mask, or secure delete the data flowing in and out of your systems. We help you understand the environment in detail with custom reporting into Tableau, Power Bi, and more. 

Empowered Users

Finally, we create solutions that empower individuals to understand their data risks and take preventative steps. Depending on requirements, we create APIs, custom reporting, user-driven remediations, and more. We work with you to create custom solutions without the downsides: we prioritize interoperability and ease-of-use. 

In summary, we go to great lengths, and in great depth, to protect PII. We work with some of the largest government agencies, armed forces, and private industry businesses to create custom solutions built to scale. Contact us to see how NetCentrics can help protect your PII – during the covid-19 pandemic, and after.  

 

Photo: Shahadat Rahman