geolocation-mobile.jpg

Data Location Awareness

 

Technical Details -

  • DataLenz runs on IBM Z mainframes with supported releases of z/OS. 

  • Installation of the DataLenz z/OS agent is simple and straight-forward, along with limited network configuration.

  • DataLenz supports all z/OS data types.

  • Data access start and end events are recorded for specified datasets, and kept in mainframe-based logs, accessible for reporting and real-time monitoring and alerting through the graphical interface.

  • The administrative and reporting interface runs as a workstation client, with secure access to your IBM Z mainframes running the DataLenz agent.

The patent pending DataLenz technology tracks the location of your employees, partners, contractors, and rogue actors, with the actual IP address of the device they are using, even if they are going through VPN or using NAT.

Rules, regulations, and requirements about geographical access bounds

rules_and_reg.png

Protecting sensitive data and functionality from geopolitically-untrusted actors is one of the earliest reasons for securing and encrypting sensitive data. Indeed, military history is replete with stories of more and more advanced ways of securely transporting data so it didn’t fall into the wrong hands.

While we live in a much more sophisticated world today, that has only meant that the requirements have also become more complex than employing one-time encryption schemes and otherwise not trusting people. Often, important international partners have interests that run directly counter to the legislated requirements of our home geography.

Beginning with rules and regulations about the treatment of personal data such as HIPAA, PIPEDA, and GDPR, there is a growing body of law in every geography that requires geographical limitations on where citizen data is accessible from.

There are also trade restrictions at national levels that can treat a given exchange of information as a criminal act if it violates sanctions of any kind.

And, if you belong to a government agency – such as an intelligence organization – or even a non-governmental organization (NGO) that deals with sensitive data and connections – there are likely many different policies you are required to respect about how and where specific sensitive data are accessed and used.

Normally, it is the laws that are slow to catch up with technology, but in this case, it’s the reverse, as such rules establish requirements that are initially not fillable. But that merely is the necessity that engenders the innovation.

Would you like to know more about DataLenz? Send us a message.