Skip to content
Storage Made Easy Blog

Storage Made Easy Blog

Enterprise File Fabric™

Posted on February 24, 2020April 23, 2021 by Rebecca Norman

Using Multi-Cloud Automation Rules to detect PHI / PII / SPI data

As companies undergo Digital Transformation they increasingly hold more and more sensitive information. Such information can take many forms including, but not limited too, Protected Health Information (PHI), Personally Identifiable Information (PII), and Sensitive Personal Information (SPI).

Sensitive information such as this can be securely managed by the Enterprise File Fabric™ by combining Content Discovery and Data Automation rules to perform specific actions when new files are added to the File Fabric. The File Fabric facilitates this through the use of metadata. Metadata is data that provides information about other data.

First some background. When the File Fabric first indexes a storage provider it does not cache data, it extracts enough data to be able to build a view of the remote file such as filename, date, timestamp, size etc. Such metadata enables the File Fabric to provide details of each file without the need for copying or replication, and importantly this is done for every storage system connected to the Fabric. Once the File Fabric has this initial file or object metadata it is able to do a deeper analysis of the actual content in each file.

This deeper content index can then be used to validate and any enforce pre-set organizational rules and policies.

An example of this is the File Fabric’s Personal Identified Information (PII) module  which identifies metadata content that contains personal information (such as credit card, passport numbers etc) within it and flags it for review.

Automation Rules can be configured so that specific actions can be performed as new information is discovered. For example, the File Fabric could be configured to move all documents containing specific PII data to a particular secure encrypted folder.  Concurrently the File Fabric will also automatically alert pre-configured users of  files that contain  PII/SPI data, and send emails to end users notifying them that there upload had been flagged and was under review.. It will  then additionally tag and classify the files as containing PII/SPI.

Discovering sensitive data is the first step to mitigating potential data breaches and the File Fabric can be used across public / private storage repositories to facilitate this.

If you are an enterprise, a service provider, an educational establishment or a financial service provider who  is subject to GDPR, CCPA, PCI DSS, HIPAA, GBLA, FERPA or other compliance standards please ask a Storage Made Easy Enterprise Architect for a demonstration of the Enterprise File Fabric.

Facebooktwitterredditpinterestlinkedinmailby feather
The following two tabs change content below.
  • Bio
  • Latest Posts

Rebecca Norman

Latest posts by Rebecca Norman (see all)

  • Solving the Multi-Cloud Storage Problem with Intelligent Metadata - July 16, 2020
  • Data-Centric Audit & Compliance for Remote Workers - May 18, 2020

Related posts:

  1. Multi-Cloud Content Discovery for Data Ownership, Data Governance and Identifying Sensitive Data
  2. How to securely and productively enable employees to work from home using existing company data with the File Fabric
  3. CISO Bulletin: Use Encryption to Continuously Protect Multi-Cloud Data With the Enterprise File Fabric™
  4. 5 Tips for enhancing Cloud Data Security and Privacy in 2020
CategoriesCloud Governance, Cloud Security, Cloud Storage, Cybersecurity, Data Governance, Encryption, Enterprise File Fabric, Storage Made Easy TagsCCPA, Dara Security, Data Automation, Data Compliance, Data Governance Data Control, DSVGO Compliance, FDPR, File Fabric, HIPPA, meta-data, metadata, PHI, PII, SPI

Post navigation

Previous PostPrevious Multi-Cloud Content Discovery for Data Ownership, Data Governance and Identifying Sensitive Data
Next PostNext Non-Proprietary Storage Workflows for Media Asset Management

Categories

SME Web CIFS

File Fabric Collaterals

White Papers
Video Gallery


Proudly powered by WordPress

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in settings.

Powered by  GDPR Cookie Compliance
Cookie Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

You can adjust all of your cookie settings by navigating the tabs on the left hand side.

Functional Cookies

Functional Cookies should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Analytics Cookies

This website uses:

Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Leadlander to help build intelligence about visits to our blog to provide accurate and better information for our sales teams about site visitors.

Keeping these cookies enabled helps us to improve provide more targeted services and helps us improve our site.

Please enable Strictly Necessary Cookies first so that we can save your preferences!

Privacy Policy

See our Privacy Policy and Cookie Policy for more information about the information we collect and your rights.