What is Sensitive Information and How Can it be Protected?
Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.
There are three main types of sensitive information:
- Personal information: Sensitive personally identifiable information (PII) is data that can be traced back to an individual and that, if disclosed, could result in harm to that person. Examples include biometric data, medical information, personally identifiable financial information (PIFI) and unique identifiers such as passport or Social Security numbers. Threats include not only crimes such as identity theft but also disclosure of personal information that the individual would prefer remained private. Sensitive PII should be encrypted both while at-rest and in-motion.
- Business information: Sensitive business information includes anything that poses a risk to the company in question if discovered by a competitor or the general public. Examples include intellectual property (IP), acquisition plans, financial data and supplier and customer information. With the ever-increasing amount of data generated by businesses, methods of protecting corporate information from unauthorized access are becoming integral to corporate security. These methods include data encryption.
- Classified information: Classified information pertains to a government body and is restricted according to level of sensitivity (for example, restricted, confidential, secret and top secret). Information is generally classified to protect security. Data encryption is deployed as a proven means of making classified information inaccessible to anyone except the individual(s) authorized to decrypt and view it.
Where does Zettaset add value?
Security and privacy issues are magnified by the massive volumes of data being generated, shared and stored. The emergence of large-scale cloud infrastructures, the diversity of data sources and formats, the streaming nature of data acquisition, and the high volume inter-cloud migration further complicate data protection. Traditional, legacy encryption mechanisms, which are tailored to small-scale, static (as opposed to streaming) data are inadequate.
Zettaset’s XCrypt line of encryption products are optimized for unmatched performance and infinite scalability to address the demanding data protection requirements of today’s high-volume compute, storage, and cloud environments.