David Hill

Network Computing Blogger


Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

See more from this blogger

Openness vs. Privacy: The Important Role Data Redaction Plays In Data Privacy

Most people know that data privacy is a hot topic for all enterprises, both private and public, and data redaction often has an important role in these efforts. That said, redaction is a term that some IT organizations have never heard of. Even if they have, they would probably be hard pressed to define it or explain its importance to their organizations. But that situation is changing quickly as organizations realize that redaction offers a solution that balances the need for data openness with the need for data privacy.

First, a disclosure: This article is a modified version of an introduction commissioned for a vendor white paper. However, I feel that redaction is important for a larger audience, this piece is a general piece, and vendors are touched upon only in the "Competitive Landscape" section.

Understand first that the complexities in the "data explosion era" are not only about storing more data, but also about managing its use. Critical to proper information management is not only ensuring that only the right people have access to that information, but that they are able to use it for legitimate purposes. Potential conflicts exist because ensuring the availability and openness of information to which some are entitled necessitates restrictions preventing access others who are not entitled because of privacy and confidentiality requirements.

Take two illustrations from the U.S. Government: The intent of the Freedom of Information Act (FOIA) is to make government organizations more accountable for their actions by making information about those actions more available on demand. On the other hand, the U.S. government's Health Insurance Portability and Accountability Act (HIPAA) is designed to prevent the unauthorized disclosure of individuals' personal healthcare information.  However, though FOIA is about openness, individuals are not entitled to access sensitive personal information or national security information embedded in documents that could otherwise be made publicly available. On the HIPAA side, physicians or other healthcare professionals with a legitimate need to know should not be prevented from accessing electronic health records for valid and beneficial purposes, but do not need to see billing information that is unrelated to providing care for patients.

So what can technology do to enable or enhance the complex balancing act between openness and privacy? The first line of defense consists of access controls that manage who is entitled to see what information. One possible solution is in the use of data loss prevention (DLP) software, which can restrict the transmission (such as through e-mail) of sensitive information from one authorized user to another unauthorized user. Encryption is also an important means for ensuring data confidentiality. But these approaches, with some exceptions, tend to be blunt instruments which too often restrict access more than is really necessary. For example, DLP solutions can reject the transmission of an email if a document attached to it contains a name associated with a social security number. That may sound sensible, but what if the intended recipient needs other information contained in that document for legitimate purposes and has no interest in or need for just the name and social security number content.


Page:  1 | 23  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers