Data Masking reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.
Data masking software protects an organization’s important data by disguising it with random characters or other data so that it is still usable by the organization but not outside forces.
To qualify for inclusion in the Data Masking category, a product must:
Lenses.io delivers a developer workspace for building & operating real-time applications on any Apache Kafka. By enabling teams to monitor, investigate, secure and deploy on their data platform, organizations can shift their focus to data-driven business outcomes and help engineers get their weekends back.
Oracle Advanced Security provides two important preventive controls to protect sensitive data at the source: encryption and redaction. Together, these two controls form the foundation of Oracle's defense-in-depth, multi-layered database security solution.
"I strongly recommend Cloud Compliance to anyone who needs a comprehensive framework to manage and maintain GDPR related documents & information." Natalia K "An Excellent tool for CCPA." Sachin K "Valuable GDPR Compliance Tool." Lucia T We make it easy to automate data privacy in Salesforce for regulations such as GDPR, CCPA, HIPAA, LGPD or CASL. Customers typically use the following capabilities in our 100% native managed package: Consent Management Improve consent adoption by easily
The Protegrity Database Protector is a comprehensive security solution for most major databases utilized in the market today. It enables column level encryption, tokenization, masking, and monitoring in databases, storage, and backup systems, with policy-based access controls and auditing.
Data Secure is a comprehensive protection solution that comes with pre-defined masking rules. With these rules you can scramble any non-key field in any client-dependent SAP table in a number of different ways (such as mapping table look-up, constant value, clear a field). You can also extend these rules to cover your own particular security needs.
Vormetric Tokenization and related solutions dramatically reduce the cost and effort of meeting compliance mandates such as GDPR and PCI DSS. Vormetric Tokenization with Dynamic Data Masking protects data at the application level with simple RESTful API calls to replace sensitive data with a comprehensive range of data transformation mechanisms.
De-identify sensitive data in your organization quickly and easily with HushHush Data Masking components. Use a variety of algorithms to satisfy multiple scenarios and compliance requirements, including HIPAA, GDPR, GLBA, and PCI. Simultaneously mask sensitive data in databases and files thanks to SSIS native integration that complements SQL Server SDLC capabilities, providing enterprise-wide referential integrity. Key features Mask sensitive data retained for testing and research purposes Co
Find and de-identify sensitive information within your data sets. Simplify data protection compliance for your entire organization, including your technical teams and auditors. Satisfy the requirements of all statutes applicable to healthcare, finance, science, e-commerce, government, and education.
IBM Security Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data m
Enterprise sensitive data masking is complicated. It's not just the diversity of data sources, or differing user requirements, or the need to maintain data consistency; it's also performance requirements, effective multi-stakeholder participation, and agility in deployment that make masking so complex.
Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments.
SecureData provides a flexible range of native interfaces, REST and Simple APIs, to enable easy integration across applications and systems, from legacy databases to mobile, web, and IoT.
Okera is the first software provider to enable the management of data access and governance at scale for today’s modern heterogeneous data environments. Okera’s Active Data Access Platform allows agility and governance to co-exist and gives data producers, consumers and stewards the confidence to unlock the power of their data for innovation and growth. This unique, enterprise-wide platform facilitates the provisioning, accessing, governing and auditing of data in today’s multi-cloud, multi-da
PHEMI Systems provides an NSA-grade privacy, security, governance, and data management system for Microsoft Azure. Healthcare organizations use PHEMI Data Privacy Manager to address their urgent need to secure, govern, curate, and control access to privacy-sensitive information. Optimized for Microsoft Azure, PHEMI’s software is easy to deploy and manage, connects to hundreds of data sources, and integrates with most popular data science and business analysis tools. Built on a privacy-by-desig