The best way to know your customer is to know their data. Every year organizations collect exponentially more personal information on their customers and clients but often lack even basic accounting for the information ingested, processed or disposed. For most organizations personal data underpins their relationship with their customers. Preserving the trust of those customers therefore requires the protection of their data. But you can’t protect what you can’t locate; making the mapping of data residency and flow vital to preserving the security and privacy of customers.

 

Fuzzy Accounting

silvermanA business’s value is built on the assets it acquires and develops. Most companies have invested millions in sophisticated tools to inventory and track their assets whether factory equipment, computers, software or intellectual property. However when it comes to the assets that are foundational to their customer relationships ie their customer data, they lack any data driven accounting. Inventories and data flow maps today are little more than estimates based on imperfect surveys and imprecise collations. But as any auditor can attest, accountings based on guesses would not give confidence to any investor, regulator or customer.

 

Follow The Data

A photo by Alex Siale. unsplash.com/photos/qH36EgNjPJYWith proliferating privacy regulations and increased targeting of identity data by cyber hackers, the need to protect identity data has never been greater. But despite the innovations in Big Data, Data Science and Machine Learning the problem of finding and following personal data is stuck in the last century. New technology however creates the opening to shift from top-down, point-in-time guesstimates of identity data location and movement to bottom-up, data-driven, dynamic, personal data asset discovery, inventorying and mapping. We have already seen this shift in other parts of the technology stack including Application Performance Management, Network Monitoring and Document Management / Security where the days of relying on top-down Vizio drawings or similar have long ago receded into history. History would suggest similar will soon happen for identity data.

 

The Big Idea of BigID

tumblr_o5ex2lyvbw1slhhf0o1_1280BigID provides organizations software driven automation for finding and following personal data across the modern extended enterprise. The software can identify, locate, inventory, track, and govern sensitive identity data to ensure protection and privacy through the data lifecycle. Unlike other fields of security where network, endpoint, application and file protection are predicated on precise knowledge of the object being protected, when it comes to identity data organizations today resign themselves to no knowledge, leading to data maps that could easily have been reproduced by 15th century cartographers.

BigID believes that knowing — and protecting — your customer is impossible without first knowing — and protecting — their data; and this will forever remain elusive unless corporations shift to factual, data-driven data mapping. No organization would ever settle for financial accounting based on approximations and hunches, they therefore should not settle for approximations and hunches when it comes to protecting the personal identifiable information that underpins their business.

About Dimitri Sirota

Dimitri Sirota has created 23 entries.

X
X
 

Get Trial

By submitting your information, you agree to our
Terms of use and Privacy Policy.

X

X
Selected Items

By submitting your information, you agree to our
Terms of use and Privacy Policy.

Thank-you for your interest in trialling BigID.

By using our website, you agree to the use of cookies to enhance your experience and provide you with tailored content. To learn more or configure your preferences privacy-policy

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close