Primary tab navigation

What are data security and data privacy?

Data security and privacy deliver data protection across enterprise. Together, they comprise the people, process and technology required to prevent destructive forces and unwanted actions. Data security and privacy aren't a nice-to-have. They are required by more than 50 international legal and industry mandates, as well as business leaders.

With 2.5 quintillion bytes of data created every day, and with the average cost of security-related incidents in the era of big data estimated to be over USD40 million, now is the time to keep customer, business, personally identifiable information (PII) and other types of sensitive data safe against internal and external threats.

Data should be protected no matter where it resides—in databases, applications or reports across production and non-production environments.

Organizations struggle to:

How Data Security and Privacy Help Your Enterprise

Customer Spotlight


Data Privacy in Telecommunications

A leading international telecommunications organization needed a cost effective means to protect the privacy of its customer data and comply with regulatory requirements.
Read the case study (592KB)


Data Security and Compliance in Healthcare

Finding a cost effective means of implementing controls to protect sensitive data and validating compliance with multiple mandates.
Read the case study (580KB)


Data masking in healthcare

Large Healthcare Insurer uses IBM Optim to help support HIPAA compliance and improve application testing
Read the case study (127KB)

Contact IBM

Considering a purchase?


Protecting against database attacks and insider threats
Examine the top 5 scenarios and the essential best practices for preventing database attacks and insider threats.
Get the ebook


Magic Quadrant for Data Masking Technology
Gartner reports that data masking should be mandatory for enterprises using copies of sensitive production data for application development, analytics or training.
Get the analyst report


Protect data in physical and virtual infrastructures
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy.
Get the ebook


Exposing the hidden costs of database security solutions
Research by Current Analysis identifies critical features and recommends a method for calculating their value—providing a means to expose the hidden costs of a database security solution.
Get the white paper


Four steps to a proactive big data security and privacy strategy
Elevate data security to the boardroom agenda
Get the ebook

Related links