Describe BigID Flashcards

1
Q

Privacy is about people, while existing tools can in most cases tell you what type of data it is but…

A

not whose data it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Many existing privacy tools rely on classification, which isn’t…

A

efficient in many cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compliance is a continuous requirements, so one-time scans or very infrequent scan

A

are not enough anymore.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

BigID provides another dimension in understanding data. It relies on data values and context to find primary and related or connected data. It goes beyond simplistic regex or metadata catalogs that …

A

lack detail and context awareness to paint the full picture you need for privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

At the high-level, BigID finds a mapping between different entities to different data sources. Entities could be

A

a list of customers, employees, part numbers, patents etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

At the high-level, BigID finds a mapping between different entities to different data sources. Data source could be

A

databases, file shares, cloud applications storing suspected personal data, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Extensible Platform To Deliver Value Across Privacy, Security and Governance

A
Petabyte Scale Without Copying 
Unmatched Data Coverage 
PI and PII Discovery 
Data and Doc ML Classification
Next Gen Cataloging 
DSAR Automation Across All Data 
Security Remediation Labeling and Access 
Discovery-in-Depth Data Intelligence
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BigID sits at the center of these three markets:

A

from data discovery to data intelligence to policy management, our core features are essential to each of these markets (and complementary tools) in order to get the most out of their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BigID is the first company to help organizations find

A

PI and not just PII.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Operationalize privacy requirements

A

like data subject rights (like right-to-be-forgotten), data processing record keeping, consent tracking, breach notification by state and country etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

apps: domain-specific value for privacy

A

DSAR Automation; Data Inventory; Data Processing;
3rd-party Sharing; Consent & Opt-In Governance;
Policy Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

apps: domain-specific value for protection

A

Risk Scoring; Breach Notification; Open Access
Intelligence; Labelling; Credential Discovery;
CyberArk; Hashicorp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

apps: domain-specific value for perspective

A

Searchable Data Registry; Data Retention; Stale Data;

Data Quality; Collibra Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

BigID 4 Cs

A

Correlation
Classification
Clustering
Catalog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data sources can be added via

A

CMDB, API script, DAM like IBM Guardium, or manually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The system uses this entity data as seed data or as a learning set to then scan other data sources, initially looking for

A

learned data and then other nearby data with high correlation back to the entities.

17
Q

Because we lead with correlation, we are able to first find relevant data before

A

we classify by type, category and context.

18
Q

Customer data is the basis to everything BigID does. This data is stored in many different systems. We scan it, and

A

run Discovery, Correlation, Classification, Data
Catalog, and Metadata analysis on it, using a large number of data intelligence capabilities natively built into our product

19
Q

BigID does… Discover and index personal data within the customer environment, without

A

an agent, with no data altering, and without creating extraneous copies

20
Q

BigID does… Correlate personal information across systems and

A

associate with individuals, to retrieve
personal information for an individual and
report on which system it resides.

21
Q

BigID does… Visualize the data landscape and

A

expedite locating personal information within it.

22
Q

BigID does… Help companies meet

A

certain data protection and privacy laws relevant to their countries

23
Q

BigID does not… Crawl the network

A

to discover or access systems it finds (it will only scan those systems explicitly configured).

24
Q

BigID does not… Uncover shadow IT or

A

flows of data to systems it is not connected to.

25
Q

BigID does not… Delete or

A

alter the data, as it only has read access.

26
Q

BigID does not… Analyze data while

A

it is in motion but we are working on a data-in-motion API and partnering with DLP vendors.

27
Q

BigID does not… Scan

A

End User devices for personal data.

28
Q

BigID does not… Provide

A

End Point security. BigID cannot discover data on endpoints (like someone’s laptop),

29
Q

BigID… Advanced scanning algorithms based on

A

machine learning, matching and classification

30
Q

BigID… Native handling of

A

structured, semi-

structured and unstructured data

31
Q

BigID… Massive scalability to handle

A

petabyte data sets

32
Q

BigID… Personal data is not

A

copied – more secure,

more scalable

33
Q

BigID… Business data flow is

A

accurately established

from actual scans of actual data sources

34
Q

BigID is designed to automatically

A

update data inventories and flows as new data sources come online or when the underlying data changes.

35
Q

Based on indexing and inventory of the discovery output, BigID automates

A

data mapping, generation of business data flow diagrams and entity attribute lineage.

36
Q

There are seven basic data protection principles under EU data protection law. The third principle is the principle of “data minimization” (GDPR Article 5 (1) (c)).

A

GDPR Article 5
“1. Personal data shall be:
(c) adequate, relevant and limited to what is necessary in relation to the purposes for which they are processed (data minimisation)”

37
Q

The platform is installed as a SaaS or within the customer’s environment - whether

A

an internal data center, cloud infrastructure, third-party co-location facility, or a hybrid deployment.