As an important asset of an enterprise, once data is lost or leaked, it will bring huge losses to the enterprise. According to the IT Policy Compliance Group, businesses with data loss are expected to result in an 8% decrease in their customer volume and associated revenue; For listed companies, the share price will fall by 8%; On average, the loss of a customer record results in an additional loss of $100. IBM's 2020 Cost of a Data Breach Report also points out that the average cost of a data breach to an enterprise is $3.86 million. According to surveys, nearly a million businesses around the world fail every year due to data loss.
In addition, in order to cooperate with regulatory compliance and ensure the integrity, security and availability of data, China has also issued many laws and regulations. For example, China's Cybersecurity Law requires that attention should be paid to protecting the security of sensitive information such as personal privacy, social security information, asset information, and medical information in the process of data flow. In particular, when data is used in development, testing, training, and other environments, the security risk is greater, and the use of real data will face the risk of serious data leakage. To meet this requirement, data masking technology is required for data sharing.
In some scenarios, data users use personal portable hard disks to copy data, and can only use processes to control the destruction of data after use, which lacks global control at the system level, which not only easily causes data loss or leakage, but also fails to achieve overall regulatory compliance with a unified data infrastructure, and has high security risks.
Based on core technologies such as data virtualization, Shangxun Information has created a commercial CDM product - agile data management platform. ADM is data-centric, opens up the upstream, midstream and downstream chain of data, and realizes the full lifecycle management of data from data acquisition, data storage, data construction, data use, data archiving to data destruction, and provides users with a one-stop data operation (DataOps) solution.
What are the core features of ADM?
First,Production data backup: ADM can proactively back up business data and implement automatic data recovery verification for backup data.
Second,Validation of backup data validity: ADM can be connected to the backup system of the user to achieve automatic acquisition and automatic recovery verification of backup data.
Third,Sensitive data is masked: The data desensitization function provided to non-production environments such as development and testing before delivery implements automatic discovery and intelligent desitization of sensitive information in data, including static and dynamic desensitization.
Fourth,Extremely fast delivery of test dataADM can quickly create several virtual data replicas in a few minutes through a single data copy, which takes up almost no storage space, reduces storage costs while realizing the extremely fast delivery of test environment data, and supports the version management of test data.
Fifth,Data access management: Create a virtual account for each user and assign corresponding permissions to each virtual account to prevent privileged account sharing.
Sixth,Database auditing: Provides the functions of database access prevention, alarming, and traceability, saves log records, monitors database pressure, and collects security information.
Seventh,Data OperationsBased on automated orchestration, seamless connection of data acquisition (data creation) and data consumption, data flow on demand, further streamlining the data management process, software development and testing become more agile, ensuring rapid and seamless improvement of product delivery and deployment.