What Being Trapped in an Abusive Trauma Bond Feels Like

Narcissistic people are an odd sort, and narcissistic relationships are a “gift” that keeps on “giving”. These relationships are nothing like your garden-variety relationships between healthy — or…

Smartphone

独家优惠奖金 100% 高达 1 BTC + 180 免费旋转




Enter the Hybrid SaaS Solution

So, while cloud-based solutions are becoming, by and large, the standard, some companies understandably prefer to keep as much control as possible over their and their users’ data. As a result, when sensitive information is involved, these companies still consider avoiding cloud solutions, hoping to hold all of their data on-premises (on-prem).

Common sense dictates that keeping data bunkered in one location would be safer, and allowing it to travel would be less safe. While often true, avoiding cloud solutions also carries significant costs. Major pain-points of the on-prem approach include increased system complexity, challenges to support & debugging processes, foreign IT systems that become the responsibility of the clients’ tech-team, slower and more difficult system update mechanisms - and that’s just to name a few.

These drawbacks can easily be converted into man-hours and an inflated price tag, which is never negligible.

In addition to all of the above, on-prem solutions for data management are generally a lose-lose situation for both the client and the industry. Data that remains on-prem cannot be leveraged as training-sets, critical for the development of machine-learning models that benefit our clients in the long run. Essentially, on-prem solutions bar them from taking full advantage of the precision and efficiency ML-powered compliance solutions have to offer.

In this blog post, we weigh the added security of keeping data strictly on-prem against the aforementioned costs. We then explain how the right, tailored security measures allow us to offer a solution that minimizes the vulnerabilities associated with cloud technology, while enabling all of its added benefits.

In line with our mission — helping our clients grow faster and safer — neither on-prem nor traditional-SaaS approaches truly achieve the combined level of service and PII security we wanted our onboarding solution to offer.

Our approach seeks to minimize the amount of Solidus Labs software that needs to run on the clients’ on-prem system. We limit it only to processes that are directly related to PII data, such as query schedulers and data-hashers, used as part of our data-anonymization process.

In this setup, we keep the elements of the system responsible for performing the heavy-lifting within our own Solidus Labs cloud — this refers to anything from training and servicing our machine learning models, to automatically pushing alerts when manipulation is detected.

Keeping the highly complex parts in-house is what allows us to provide our clients with all the benefits usually reserved for cloud-based SaaS solutions. In tandem, the reduced complexity on the clients’ side removes as much of the burden associated with on-prem deployments as possible and makes their tech teams’ lives much easier.

That’s a clear “win-win” — clients enjoy the benefit of keeping their PII data on-prem, while also enjoying the advantages of cloud-based machine learning and services. The key, of course, is ensuring PII data is not transmitted outside of our clients’ environments, unless it’s completely anonymized. And, that the anonymized data we as a vendor do store cannot be used to infer its original content — which leads me to a word about data privacy.

“Data is the oil of the 21st century” — Joe Kaeser, CEO, Siemens

As vendors of information systems, we understand and deeply respect the immense level of trust our clients demonstrate when entrusting us with their data. This recognition is one of the fundamental principles driving our technology, and it’s what pushed us to incorporate specially-developed data anonymization techniques to all of our products handling PII:

The first line of defense is, in fact, deployed on-prem. We use a simple remotely deployed application to handle data-obfuscation for all data leaving our clients’ environments, as well as the decryption mechanism for when it returns.

The encryption is done using a one-way hashing technique, meaning it is impossible to decrypt it without both the clients’ secret key and the hashing function that was used to perform it in the first place.

In simpler terms, for anyone outside the client (including us at Solidus Labs), sensitive information such as account numbers, names, etc. is reduced to strings of gibberish that will regain significance only after decryption has occurred. Which, as mentioned, is only possible for the client who owns the data.

Obfuscating PII is an important step, but it’s just one component of comprehensive protection against cyber-attacks aimed at retrieving personal information.

In the case of an effective attack that enables malicious actors to access the dataset, certain techniques can still be used to link a person to obfuscated data by inference. Essentially, this would include cross-matching sensitive information from areas of the data where data-diversity is not sufficient. This threat is prevalent, for example, in the field of medical research, where extremely sensitive information is, more often than not, an integral part of many datasets.

As a thought experiment, imagine getting your hands on a medical dataset, where you know a family friend’s data is stored. Querying your friend’s zip code, you can easily come up with anonymized pieces of the data which you know is likely related to your friend.

Try it out with the table below — knowing only basic information about this individual, would you be able to infer your friend’s ailment? Most likely — yes.

An exercise in inferring PII based on obfuscated data. Could you potentially infer the patients’ identity?

To address this, we’re taking a leaf out of the medical researchers’ book, applying solutions that are widely exercised in their domain, in order to maintain the integrity of the data our clients entrust with us.

Namely, these solutions include data-desensitization methods that block the ability to re-identify individuals in our data while preserving the data’s statistical-distribution.

Simply put, we actively manipulate the dataset — adding rows, and mixing values around, in a fully controlled and intentional way. As previously stated, the goal is to transform the data just enough to add sufficient data obfuscation while having a minimal effect of distributive characteristics.

Maintaining the data’s statistical-distribution is acute as it maintains the dataset’s representation of the original data. It allows us to use it for R&D purposes in the realms of machine-learning and general compliance while rendering it completely useless for cyber-attackers.

By applying these techniques to our data, we also enjoy some unexpected perks. For example, the level of obfuscation we achieve effectively turns this data non-identifiable, diminishing PII-related concerns, such as GDPR compliance.

With mounting security concerns and an alarming rate of cyber attacks plaguing our industry (and others), finding a secure solution for your data, that lets you sleep at night, is an ever-increasing challenge.

In view of this, Solidus Labs offers a unique hybrid-SaaS solution that can give our clients the best of both worlds — the security and ease of mind of on-prem data management on the one hand, and the seamlessly updatable, hassle-free user experience of a cloud solution powered by state-of-the-art machine-learning algorithms that can propel your organization’s compliance and growth, forward.

Add a comment

Related posts:

Tips for Determining How Much to Donate to Charity

Many charities survive because people donate money, supplies, and other necessities to them. They rely on the generosity of others so that they can help people in need. You may wonder how much money…

Cerita 1

Melihatmu diberanda facebookku rasanya masih serasa mimpi bagiku…Bagaimana tidak, kau adalah cinta pada pandangan pertamaku. lain halnya jika itu adalah cinta kedua, ketiga… Jari-jari ini rasanya…

ads.txt and ads.cert Can Help Change the Manner the Entire Programmatic Advertising Industry is Treating Publishers

ads.txt and ads.cert can help change the manner the entire programmatic advertising industry is treating publishers right now.