The GDPR Forefront

Aris Argyros
Think|Stack
Published in
2 min readApr 24, 2018

After reading further in to GDPR over the weekend; and learning more about how it will be affecting businesses all around the world, I thought to myself:

Yeah all of our information is secure, but how are we going to locate specific user information through our vast volumes of data?

I wanted to find a solution that would make finding PII (Personally Identifiable Information) data easy. I looked in to various software options all over the internet, I spoke with multiple professionals in the field, and even went to the lengths of contacting and speaking with the CEO of a Data Security and Encryption company.

Here is what I found:

In an AWS hosted environment, there is an amazing tool called “Macie”:

“Amazon Macie is a security service that uses machine learning to automatically discover, classify, and protect sensitive data in AWS. Amazon Macie recognizes sensitive data such as personally identifiable information (PII) or intellectual property, and provides you with dashboards and alerts that give visibility into how this data is being accessed or moved. The fully managed service continuously monitors data access activity for anomalies, and generates detailed alerts when it detects risk of unauthorized access or inadvertent data leaks. Today, Amazon Macie is available to protect data stored in Amazon S3, with support for additional AWS data stores coming later this year.”

___________________________________________________________________

For Non-AWS environments, I was able to find an equally amazing tool located within the Intelligent ID Software Suite, called SmartScan ID:

“SmartScan ID identifies every piece of sensitive information in your environment based on the content of the file itself, providing you with a comprehensive report that both identifies the data and locates precisely where it occurred. SmartScan ID can identify partial documents, snippets of data, or sensitive data that has been moved into new document formats. Each possible variable of intricate data loss is taken into consideration, making for the most full and comprehensive security overview.”

When the research and conversations were done, I was able to find two great software tools for identifying, locating, and securing sensitive data.

Feel free to comment on this page if you have any questions or would like any additional information sent to you. I would be glad to help.

Thank you for reading!

--

--