Use BigID for Data Perspective Flashcards
Audit, Risk and Compliance are shifting their focus to
data
Analytics and ML/AI are the biggest initiatives that highlight the importance
of
data quality and data inventory
Data Governance Program Deliverables Part I
▪ Data Policy ▪ Data Quality Metrics ▪ Data Governing Structure ▪ Change Management Process ▪ Data Operations Program ▪ Business Process FlowS
Data Governance Program Deliverables Part II
▪ Data Lineage ▪ RACI for each data domain ▪ Business Glossary of definitions ▪ Inventory of Systems ▪ Logical Data Models ▪ Data Foundation - MDM, RF
Data Governance Life Cycle. The main steps to a project include:
scope identification, assessment, monitoring, risk and business impact and recalibration. The steps are repeated until the scope covers the entire domain.
BigID provides automation and manual oversight for
sensitive data governance to help you stay in compliance.
BigID Supports Data Governance Capabilities helps answer the questions
“what data do I have?” and “where is it?”
BigID identify systems with
duplicate copies across the firm and eliminate silos of data
Intelligent Privacy-Aware Data Discovery - Correlation
find PI and correlating data back to a person or entity for privacy data rights automation
Intelligent Privacy-Aware Data Discovery - Cluster Analysis
Find duplicate and similar data for easy labelling, governance and data consolidation across files and databases
Intelligent Privacy-Aware Data Discovery - Classification
Pattern and ML based classification for data elements, metadata and docs across any data source or data pipeline
Intelligent Privacy-Aware Data Discovery - Catalog
Capture and manage technical, business and security metadata across structured, unstructured, big data, nosql, pipe and cloud
BigID’s secret sauce is
its unique and unmatched data discovery platform
CDO’s can get complete visibility into their data through the
data catalog.
CDO’s can share information with the other applications in their data management ecosystem through
the metadata exchange
CDO’s can use the data policy enforcement to
manage privacy, security and other policies
CDO’s can have fully automated DSARs and
deletion validation, as well as consent governance
The combination of privacy automation, security insight and data perspective gives data
professionals the
ability to activate all their data while managing risks.
BigID tracks 3rd party data sharing agreements and can monitor data in motion to
alert when data outside of those agreements is passed
Using our discovery to accurately
identify, classify and label data with business meaning
Business flows document the data and
show the flow of information around the organization