Mage™ Dynamic Data Masking vs. Oracle Data Masking and Subsetting

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Mage™ Dynamic Data Masking
Score 9.3 out of 10
N/A
Mage™ Dynamic Data Masking (formerly Mentis' iMask) module helps users secure a production environment from unauthorized access. It secures sensitive data at the Application Layer and the Database layer by offering flexible approaches that cater to various use cases and types of users – small, medium, and large enterprises.N/A
Oracle Data Masking and Subsetting
Score 8.0 out of 10
N/A
Oracle Data Masking and Subsetting is designed to help database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by discarding unnecessary data.N/A
Pricing
Mage™ Dynamic Data MaskingOracle Data Masking and Subsetting
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Mage™ Dynamic Data MaskingOracle Data Masking and Subsetting
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Mage™ Dynamic Data MaskingOracle Data Masking and Subsetting
Top Pros

No answers on this topic

Top Cons

No answers on this topic

Best Alternatives
Mage™ Dynamic Data MaskingOracle Data Masking and Subsetting
Small Businesses

No answers on this topic

No answers on this topic

Medium-sized Companies

No answers on this topic

No answers on this topic

Enterprises
Delphix
Delphix
Score 9.2 out of 10
Delphix
Delphix
Score 9.2 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Mage™ Dynamic Data MaskingOracle Data Masking and Subsetting
Likelihood to Recommend
-
(0 ratings)
9.0
(1 ratings)
User Testimonials
Mage™ Dynamic Data MaskingOracle Data Masking and Subsetting
Likelihood to Recommend
Mage Data
No answers on this topic
Oracle
The tool is excellent when you need to provide all the details about your clients, yet hide their identity - all while maintaining the referential integrity of the data (so child-records of the masked parent record and maintain the same fake ID of the parent).
Read full review
Pros
Mage Data
No answers on this topic
Oracle
  • It offers several ways in which you can mask your data; for example, you can choose to replace all names with "real fake names", or choose to replace all SSNs with existing SSNs, but randomly assigned. You control the algorithm.
  • It works on non-Oracle databases as well (in our case, we use it for both Oracle and SQL/Server).
  • The overhead is minimal (it doesn't take long to run, and it doesn't consume too many system resources.
Read full review
Cons
Mage Data
No answers on this topic
Oracle
  • The learning curve was not trivial - but we got through it.
  • Cost - this product is not cheap.
Read full review
Alternatives Considered
Mage Data
No answers on this topic
Oracle
We also looked at Delphix: the tool was quite powerful, easy to use, and competitive from a cost standpoint. However, since our entire data warehouse environment is built on the Oracle technology stack, it made sense to us to use the Oracle product here, as it integrates very well with other Oracle database and ETL products.
Read full review
Return on Investment
Mage Data
No answers on this topic
Oracle
  • We have many compliance regulations we need to adhere to. Without this tool, we were always taking a risk of exposing client information, and get penalized by the State of the Feds (the financial consequences are significant).
  • So while the tool doesn't save us money directly, it greatly reduces the risk we had been taking all these years. To some degree, this is much like an insurance policy.
  • Given the above, it also allows us to share information with other departments/agencies, in situations where before we simply couldn't take the risk of exposing client information.
Read full review
ScreenShots

Mage™ Dynamic Data Masking Screenshots

Screenshot of Ensure your data’s complete protection in production instances by masking sensitive data at both application and database layers. Configure rules within the product UI to enable role-based, user-based, program-based, and location-based access controls on who can access your sensitive data. Maintain data consistency between production and non-production instances by having the flexibility to choose from over 40 anonymization methods (same as those used in the Static Data Masking Module).Screenshot of iMask offers you the ability to control who accesses your sensitive data through the application of authorization rules. Rules can be configured based on user, location, role, and even programs. Ensure complete control over your sensitive data access, and combined with real-time monitoring, enabling a full 360-degree data protection coverage