Cribl puts your IT and Security data at the center of your data management strategy and provides a one-stop shop for analyzing, collecting, processing, and routing it all at any scale. Try the Cribl suite of products and start building your data engine today!
Learn more ›Evolving demands placed on IT and Security teams are driving a new architecture for how observability data is captured, curated, and queried. This new architecture provides flexibility and control while managing the costs of increasing data volumes.
Read white paper ›Cribl Stream is a vendor-agnostic observability pipeline that gives you the flexibility to collect, reduce, enrich, normalize, and route data from any source to any destination within your existing data infrastructure.
Learn more ›Cribl Edge provides an intelligent, highly scalable edge-based data collection system for logs, metrics, and application data.
Learn more ›Cribl Search turns the traditional search process on its head, allowing users to search data in place without having to collect/store first.
Learn more ›Cribl Lake is a turnkey data lake solution that takes just minutes to get up and running — no data expertise needed. Leverage open formats, unified security with rich access controls, and central access to all IT and security data.
Learn more ›The Cribl.Cloud platform gets you up and running fast without the hassle of running infrastructure.
Learn more ›Cribl.Cloud Solution Brief
The fastest and easiest way to realize the value of an observability ecosystem.
Read Solution Brief ›Cribl Copilot gets your deployments up and running in minutes, not weeks or months.
Learn more ›AppScope gives operators the visibility they need into application behavior, metrics and events with no configuration and no agent required.
Learn more ›Explore Cribl’s Solutions by Use Cases:
Explore Cribl’s Solutions by Integrations:
Explore Cribl’s Solutions by Industry:
Try Your Own Cribl Sandbox
Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Get inspired by how our customers are innovating IT, security and observability. They inspire us daily!
Read Customer Stories ›Sally Beauty Holdings
Sally Beauty Swaps LogStash and Syslog-ng with Cribl.Cloud for a Resilient Security and Observability Pipeline
Read Case Study ›Experience a full version of Cribl Stream and Cribl Edge in the cloud.
Launch Now ›Transform data management with Cribl, the Data Engine for IT and Security
Learn More ›Cribl Corporate Overview
Cribl makes open observability a reality, giving you the freedom and flexibility to make choices instead of compromises.
Get the Guide ›Stay up to date on all things Cribl and observability.
Visit the Newsroom ›Cribl’s leadership team has built and launched category-defining products for some of the most innovative companies in the technology sector, and is supported by the world’s most elite investors.
Meet our Leaders ›Join the Cribl herd! The smartest, funniest, most passionate goats you’ll ever meet.
Learn More ›Whether you’re just getting started or scaling up, the Cribl for Startups program gives you the tools and resources your company needs to be successful at every stage.
Learn More ›Want to learn more about Cribl from our sales experts? Send us your contact information and we’ll be in touch.
Talk to an Expert ›Our Criblpedia glossary pages provide explanations to technical and industry-specific terms, offering valuable high-level introduction to these concepts.
Personally Identifiable Information (PII) refers to data that, either independently or when combined with other relevant information, can identify an individual. Various data elements are universally recognized as PII. Additionally, PII is categorized into two types: sensitive and non-sensitive.
Sensitive PII is information that can lead to harm or fraud if revealed. Non-sensitive PII, on the other hand, poses less risk even if it becomes exposed.
Some of the most common forms of Personally Identifiable Information (PII) include:
Sensitive PII
This includes details such as your full name, Social Security Number, driver’s license information, financial data, credit card numbers, passport details, medical records, and more.
Non-sensitive PII
Includes publicly accessible information like your zip code, race, gender, birthplace, date of birth, and religion.
It’s important to note that social media profiles are generally classified as non-sensitive PII. However, this classification depends on the nature of the information shared on these platforms.
According to the General Data Protection Regulation (GDPR), ‘Personal data’ is defined as “any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural, or social identity of that natural person.”
In the past, securing PII data wasn’t a significant priority. However, the landscape changed dramatically when multiple companies faced multi-million dollar fines due to their mishandling of customer data. Beyond financial penalties, organizations also confront reputational risks that can lead to severe repercussions. Picture your company making headlines for not protecting customer data, with ongoing news coverage as your executives get dragged through all kinds of legal proceedings.
This shift led to a transformation in data protection protocols, posing a significant challenge for companies striving to comply with the evolving rules for properly storing and processing PII.
Given that the GDPR is considered the gold standard for PII protection, it offers comprehensive guidelines on how PII should be managed.
And to help ensure appropriate actions are taken to secure the data, GDPR adds the following: Violating the EU’s GDPR means maximum fines of $23 million (20 million Euros) or 4% of the company’s annual global turnover – whichever is higher.
While the EU’s GDPR is frequently cited in PII security discussions, there are many state, federal, and international laws and regulations governing security and privacy that define permissible practices.
CSO-Online has a guide that summarizes and provides additional resources on security or privacy law and regulation.
PII security tips and best practices
Learn more about how Cribl is committed to keeping customer data safe and secure.
Classic choice. Sadly, our website is designed for all modern supported browsers like Edge, Chrome, Firefox, and Safari
Got one of those handy?