Data Masking - Further Information
This page shows up to 100 pieces of content (newest at the top):
IRI Voracity
Powered by CoSort (or Hadoop), and built on Eclipse, IRI Voracity is a multi-purpose data management platform.
Discovering Sensitive Data
This Market Update discusses, reviews and compares products specialising in the discovery of sensitive data.
Ab Initio Semantic Discovery
Ab Initio Semantic Discovery is a data discovery solution offered as part of Ab Initio’s broader data management platform.
Lumada Data Catalog
The Lumada Data Catalog from Hitachi Vantara is a data catalogue targeted at both the enterprise data lake and traditional data environments.
Seeker DLP
Seeker DLP finds sensitive data within files on Windows and Macs, across SMB-based file servers and web servers.
STEALTHbits Sensitive Data Discovery
STEALTHbits supports discovery against a comprehensive list of file systems, SharePoint and OneDrive, Exchange, Dropbox, Oracle and Microsoft SQL Server.
DataSunrise Sensitive Data Discovery
DataSunrise supports the discovery of sensitive data across a wide range of both relational and NoSQL data sources.
Solix Technologies Sensitive Data Discovery
Solix Common Data Platform acts as a one stop shop for the management and governance of all enterprise data.
Dataguise DgSecure
Dataguise started by offering sensitive data discovery and masking but now includes, additionally, encryption/decryption and extensive reporting.
MENTIS iDiscover
MENTIS iDiscover offers a range of modules that cover all necessary functions for discovering, protecting and monitoring sensitive data.
BigID
BigID specialises in (sensitive) data discovery and classification and unlike other vendors has been built from the ground up to concentrate in this area.
Ground Labs Enterprise Recon
Enterprise Recon offers enterprise-wide discovery of personal, PII and PCI data in accordance with a wide range of compliance regulations.
Informatica Data Privacy Management
Informatica Data Privacy Management is a datacentric privacy, governance and security solution that is focused on discovering and classifying sensitive data.
Global IDs Sensitive Data Discovery
Global IDs offers data discovery and classification as part of its EDA platform, thereby providing sensitive data discovery and compliance with regulations.
GDPR and the MENTIS Data and Application Security Platform
This paper considers the requirements of GDPR and then discusses how MENTIS meets those requirements.
The Sensitive Data Lifecycle: IBM vs Informatica vs MENTIS
This paper compares the capabilities of IBM, Informatica and MENTIS for the discovery and governance of sensitive data.
The MENTIS Data and Application Security Platform
This paper is a discussion and technical evaluation of the MENTIS Data and Application Security Platform.
What’s Hot in Data
In this paper, we have identified the potential significance of a wide range of data-based technologies that impact on the move to a data-driven environment.
Data Masking 2017
This Market Update compares the capabilities of different data masking vendors that provide anonymisation capabilities.
Managing Data Lakes
This paper discusses why data lakes need to be managed and the sorts of capabilities that are required to manage them.
The data management implications of GDPR
This paper discusses the EU's forthcoming General Data Protection Regulation (GDPR) not from a legal perspective but from the point of view of data management.
Delphix data masking
This paper argues that using manual methods for data masking are typically inadequate, time-consuming, and costly and offers solutions from data masking tools.
Data Masking 2015
Data masking is now recognised as being increasingly important, not least because of concerns over privacy and security.
Data Masking 2013
Data masking, although it has been around for a number of years, is now recognised as being increasingly important.
Data Masking
In this paper we shall discuss why it is important, why you should consider using a tool, and what features you should look for.
Grid-Tools Data Masking
This paper argues that using manual methods for data masking will typically be inadequate, is time consuming and costly.