Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The technology can obscure data that should not be seen by unauthorised users. That is, users can see only what they are permitted to see on-screen -- the rest is dynamically masked.The software, a research prototype called MAGEN (Masking Gateway for Enterprises), grabs information before it is displayed, reads it, and then masks details that the person logged in is not allowed to view.“MAGEN intercepts a bitmap-formatted snapshot of the screen on its way to the end-user,” IBM spokesman Ari Fishkind told SCMagazineUS.com. “MAGEN finds and shields sensitive data on the fly, and [screen information] is reconstructed into a new bitmap-format image with the appropriate masking.”The innovation could mean that companies would not have to create modified copies of electronic records in which information is masked, scrambled or eliminated."MAGEN's screen-masking approach eliminates the need to painstakingly tailor 'data masking' solutions to specific environments," Haim Nelken, IBM's manager of Integration Technologies at the Israel Research Lab in Haifa, said in a statement.The technology doesn't change underlying software programs or the data itself – it simply filters the information before it ever reaches the screen, according to the statement.“A MAGEN server provides a console where the administrator can configure the rules about which screen information should be filtered, how it should be filtered (i.e., fully blanked out, partially masked, or substituted with asterisks or fake numbers), and for whom,” Fishkind said.IBM is unsure when it will market the technology.“The fact that we have a proof-of-concept for MAGEN, and not just a theoretical breakthrough, would suggest that it might find its way into a product within a few short years,” Fishkind said.See original article on scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.