Interested in finding out more?

What We Do

Our layered approach helps prevent data loss while enabling data access to support business operations and growth:

  • Understand where data resides, it’s relationships and how to define security and privacy policies
  • Detect database vulnerabilities and harden repositories
  • Manage privileges and authenticate users to limit data access
  • Monitor transactions to enforce policies and capture a detailed audit trail
  • Prevent unauthorised database activities
  • Block, quarantine or mask transactions that violate policy
  • Protect sensitive data
  • Mask or redact sensitive data in documents and forms for software testing and commercial use to mitigate risk
  • Protect databases with a variety of protection functions, including database masking and database encryption.

You may also be aware that the EU has passed new data protection laws. This applies to any business that offers goods or services to any citizen of a member state. These changes are due to come into effect from May 2018 so it’s important that your business meets the general data protection regulations. Take action now and avoid heavy financial fines in the future!

Who are we doing this for?

black and white people icon

Patient data is often shared by NHS Trusts for research purposes. It is critical that all personal information is removed from these records to ensure that patients cannot be recognised from this information. This is usually a manual process which clearly takes time.

Using a solution developed for the NHS, an NHS Trust deployed a data pseudonymisation application to ensure all personal data is removed automatically as part of the export process. This means that a task that required one or two full time resources is now managed by the solution to ensure both automation and compliance with NHS regulation.

Northdoor plc_IT consultancy for Insurance Sector

Whilst external access was well documented for a Japanese Bank, internal user access to privileged information, especially being monitored in real time, was a concern. Some business audits now assess this as part of their annual reports. To overcome this, Northdoor implemented a solution that tracks and provides audit logs for all users across all data access, with real time alerts configured for certain critical applications

Technologies We Use

As an IBM Premier Business Partner Northdoor hold multiple IBM Guardium and Optim specialist accreditations and have implementation and consultancy experience in all areas of the product portfolio.

  • Guardium Database Activity Monitoring
  • Guardium Vulnerability Assessment
  • Guardium Enhanced Enforcement Actions
  • Guardium Compliance Automation
  • Guardium File Activity Monitoring
  • Optim Archive
  • Optim Test Data Management