Finally you can fully enforce your data leakage prevention policies by including even the trickiest and most technical data leaks in IT dump files.

Prevent confidential data leakage via dump file anonymization

N

Eliminate all confidential data from your dump files

N

Ensure that all dump files remain technically fully usable

N

Rely on a comprehensive, efficient and transparent anonymization procedure

Did you know that your company‘s IT staff sends dump files with highly confidential information to external third parties every day and thus violates elementary security policies without even knowing it?

 

What, in fact, is a dump file?

When more complex technical problems need to be solved, as in the case of an abnormally terminating (“abending”) program, application or system, software vendors will ask for a so-called “dump”, which captures every detail surrounding the error or problem. Such a dump file is a snapshot of the current status at the time of error, including all the required debug data, e.g. memory content, processor registers, any currently executed SQL statement, etc. While system programmers deal with system, memory, core or kernel dumps, application developers prefer to work with “user mode process dumps” or SQL dumps. Additional types result from other sources. Dump files easily become huge and may include a gigabyte or more of data. When browsing through a dump file you may easily feel overwhelmed by an almost infinite amount of purely technical information.

What is the security-related problem regarding dump files?

For non-specialists these files look boring, or even worse, harmless, since most of the information seems to be binary or even cryptic, i.e. in a format unreadable to humans. No one will assume that these “ugly” dump files might include highly sensitive company secrets, such as confidential client information or the security-related details of your systems.

How do secrets get into dump files?

Dump files will include confidential and revealing information when the application and system memories are captured – for debugging purposes only, of course. Such a memory dump may include client names, account or credit card numbers, and many other kinds of critical data stored for processing the moment it was made.

Solution:

SF-SafeDump – z/OS dump and log anonymization

How can you solve this high-risk security problem?

Our SF-SafeDump solution finally prevents your dump files from including confidential or security-critical data, allows them to remain completely technically usable for their actual purpose – that of solving your software problems. Our expert knowledge based on more than 15 years of experience in this field guarantees the ultimate solution to this quite tricky and hidden problem.

Your IT staff will definitely support this kind of data leakage prevention ensured by our SF-SafeDump technology!

Since fully transparent integration is ensured, SF-SafeDump always matches all current dump file handling and operational procedures established with your service partners. This means there is simply no impact on how your specialists currently transfer, compress, manage and analyze their dump files. These files simply become safe and compliant by no longer unveiling any secrets!

Finally you can fully enforce your data leakage prevention policies by including even the trickiest and most technical data leaks in IT: dump files. SF-SafeDump is the only measure preventing any information any leakage of information that may result from frequently performed dump file exchanges between software users and their vendors. SF-SafeDump lets you enforce a modern and safe information provisioning policy to provide information on a need-to-know basis. Without dump file anonymization, your information leakage prevention policy will definitely not be up-to-date.

Dump file anonymization to effectively prevent confidential data leakage and theft

Automate your IT Security and Compliance to the max today!

Solutions to the max.

Cross-Platform Security Solutions

Constant monitoring and auditing of all computer systems is state of the art. For large enterprises it also requires a real-time integration of the mainframe platforms governing event monitoring, vulnerability assessment and compliance checking. With SF-Sherlock and SF-NoEvasion, your security monitoring solution is powerful and can be implemented across your enterprise through the easy integration of the mainframe.

Compliance

Over the past several years, compliance has become more and more an important issue, but also a tedious task. Our SF solutions assist you in automating the resulting workload to the max by also covering the entire mainframe platform - thanks to a 360-degree approach.

Protection

With SF-Sherlock, you can also protect your mainframe platform against attacks and combat high-level risks. Thanks to our max approach this also includes malicious code and exploits. Yes, both of these are real risks on the mainframe platform!

SF Solutions

All SF solutions are invented and developed in-house. Therefore, you can count on both our unique expertise and our high level of motivation in providing you with solutions and services with maximum performance, effectiveness, and productivity.

Are you expecting a governmental audit of your mainframe platform soon, as by the BaFin or ECB?

Let us help you prepare your mainframe security and compliance.

++800 - 37 333 853 or simply dial: ++800 - DRFEDTKE

Call our world-wide toll-free number now!

(++ represents the prefix for international calls; in most countries it is 00; in the U.S. it corresponds to 011)

News & IT Security Forum

Join our newsletter list

Worldwide toll-free phone number

++800 - 37 333 853
or simply dial:
++800 - DRFEDTKE

Alternatively:
+41 41 710 4005

(++ represents the prefix for international calls; in most countries it is 00; in the U.S. it corresponds to 011)

Find Us

Headquarters

Seestrasse 3a, 6300 Zug, Switzerland

 

Visitors & Training

Dammstrasse 19, 6301 Zug, Switzerland

 

Social Media

Xing → Linkedin →

Write Us

Marketing
marketing@enterprise-it-security.com

copy the address

Technical support and hotline: hotline@enterprise-it-security.com

copy the address