Monitored Data Pseudonymisation
Ensure the privacy of your users while protecting recorded data from insider threats
Get in TouchWhy anonymize user data?
Any thorough user activity monitoring software records all actions taken by users, including actions involving identifiable data: logins, credentials, device information, etc.
This data is considered personally identifiable information (PII) and is protected by the same IT standards, laws, and regulations as other kinds of sensitive data. Pure anonymization of such data erases the link between the user and their activity logs, making it impossible to investigate security incidents.
Pseudonymization allows you to protect sensitive data from insider threats while having the option to de-anonymize data when needed.
Data pseudonymization is necessary to:
- Comply with IT standards, laws, and regulations
- Protect your users’ PII
- Remove identity markers from employee data
- Investigate security incidents without compromising other users’ privacy
- Prevent accidental access to PII
GDPR
Article 25, “Data protection by design and by default”
“[…] the controller shall, both at the time of the determination of the means for processing and at the time of the processing itself, implement appropriate technical and organisational measures, such as pseudonymisation, which are designed to implement data-protection principles, such as data minimisation, in an effective manner and to integrate the necessary safeguards into the processing in order to meet the requirements of this Regulation and protect the rights of data subjects.”
Key features of pseudonymisation with Syteca
FIPS 140-2 certified encryption of all usernames and aliases
No influence on user activity monitoring and recording
Data pseudonymisation for users with any privilege level
Possibility to de-anonymize data in case of a cybersecurity incident
Limited access to de-anonymization functionality
Protection of users’ personal data in activity monitoring results
Active Directory compatibility
Implementation of GDPR requirements for PII protection
Principles of data pseudonymisation in Syteca
Syteca substitutes user logins and device names with aliases to make it impossible to link this data to a specific user. For instance, if someone were looking for the user John-Smith that works on John-Smith-PC in the activity monitoring results and reports, they might see user USR-880B1A and CLN-E0CB5E.
Unique aliases are assigned randomly, making it impossible to discover a pattern and link an alias back to a user.
Syteca hides user data in:
- User activity monitoring results
- Reports on user activity
- Screenshots of user sessions
- The Syteca Management Tool
Securing private data
Here’s how this functionality works:
- Data pseudonymisation is turned off by default.
- It is turned on after you purchase a Syteca license.
- When enabled for the first time, the pseudonymisation algorithm randomizes all current user data.
- From then on, Syteca only shows user aliases in monitoring data and activity reports.
- When a new user is added, Syteca randomizes their data automatically.
De-anonymizing data
To de-anonymize a user, a security officer and a data protection officer (DPO) have to work together:
- A security officer requests de-anonymization of a specific user’s data and provides a reason for the request.
- A DPO reviews and approves or denies the request.
- If the request is approved, the security officer can review user sessions with identifiable data. For the DPO, user data remains hidden.
- After 24 hours from the request approval, Syteca automatically anonymizes user details again.
The de-anonymization process allows you to quickly identify a user in case of a security incident. At the same time, users’ private data is protected from anyone who has access to the Syteca Management Tool.
Need a quick discovery call to discuss your request?
Book a Time Slot HereGet the most value for your business with other Syteca’s capabilities
Supported platforms
Learn how Syteca assists our customers in continuously preventing threats coming from the inside.
What our clients say about Syteca’s insider threat prevention tools
Let’s get the conversation started
Contact our team to learn how our insider risk management software can safeguard your organization’s data from any risks caused by human factors. Book a call with us at a time that suits you best, and let’s explore how we can help you achieve your security goals.