Getting Started
Detection
In Detection, you need to locate and identify sensitive data, based on the policy defined within big data, and traditional repositories such as databases and file stores.
Sampling Configuration
In PK Protect, the Sampling Configuration will detect the sensitive information in the database. By Default, the PK Protect provides two options for sampling the data.
Masking
In PK Protect, the Sampling Configuration will detect the sensitive information in the database. By Default, the PK Protect provides two options for sampling the data.
Encryption/Decryption
In PK Protect, the Sampling Configuration will detect the sensitive information in the database. By Default, the PK Protect provides two options for sampling the data.
Privacy
Regulations such as the European Union’s General Data Protection Regulation (GDPR) and California’s Consumer Privacy Act (CCPA) are forcing organizations worldwide, to revisit their Data Privacy policies and practices. Other privacy regulations around the world are likely to have data subject rights as their core principles. While there are minor variations in the specific types of information involved and the conditions under which these rights are to be respected, the fundamental requirements are similar.