Protegrity Data Security Methodology
A general overview of the methodology used in the Protegrity Data Security Management.
The value of any company or its business is in its data. The company or business suffers serious issues if an unauthorized user gets access to the data. Therefore, it becomes necessary for any company or business to protect its data.
The data may contain sensitive information like personally identifiable information, company secrets such as pricing information or intellectual property etc. The process of protecting sensitive data to protect the privacy and personal identity of individuals is called De-Identification.
When de-identifying data, the analysis consists of:
The Protegrity methodology together with policy management provides a framework for designing and delivering enterprise data security solutions. Data security solutions, when adopted within an organization, ensures the security of information assets. One of the key components of data security is a policy.
Policy is a set of rules that defines how sensitive data needs to be protected. These policies are designed or created and then distributed to locations in the enterprise, where data needs to be protected.
Policy management is a set of capabilities for creating, maintaining, and distributing the policies.
A general overview of the methodology used in the Protegrity Data Security Management.
A general overview of how packages are deployed to Protectors.
Instruction on how to initialize the Policy Management.
An overview of the components of a policy.
Policies contain detailed and comprehensive security definitions. Policies are distributed to the locations in your enterprise set up for policy enforcement.
In deployment, the data stores containing the policies and trusted applications are prepared to be distributed to the protection points. The protector nodes pull this policy information in the data stores from the ESA to their respective policy enforcement points. Only the policies that are deployed are distributed across the protectors. Deploying a data store also deploys the trusted applications added to that data store.
This section provides information about how to manage policy components.
The Policy Management Dashboard displays an overview of the policy components and keys.
The export package process includes an API for exporting the package from the ESA. The exported package is used by the resilient protectors.
Legacy Policy Management features no longer applicable for 10.0.x protectors.