Data Masking Tools
Data Masking Tools Overview
What are Data Masking Tools?
Data Masking Tools are security software that prevents abuse of sensitive data. This may include personal, identifiable data like social security numbers, bank account information, or commercially sensitive data.
The software achieves this by substituting sensitive data with fictitious data, usually housed in non-production databases, and placing data where it is needed. Data masking tools may be used during application development or testing where apps require data input from an end-user. It may also be used, for instance, in a call center where personal data is masked from the call center operative.
Data masking is sometimes described as data obfuscation and is related to data encryption, and tokenization. An important distinction is that data masking is sometimes a non-reversible process where sensitive data is cloned and transformed into something credible but, once created, wholly different than the source. Its importance is that it is available for testing or demonstration where required but that it, as a transformed object, does not risk exposing the original identifying data.
Data Masking Tools Features
Data masking tools generally provide the following features and capabilities:
A range of masking techniques available on-demand
Centralized management of masking policy, audit trail
Track compliance with data privacy law
Apply masking rules code-free
Apply different rules for subsets of data
Multi-factor subsetting, sophisticated subsetting techniques
Share subsets of masked data on-demand
Can access data stored in a variety of databases or apps
Realistic but fictional data available for testing, “sandboxing”
Format-preserving encryption (FPE) transformation
Data masking tools are generally available only at cost. However many popular vendors provide a free trial. Data masking tools are priced according to volume of data processed, or alternately according to named users via a recurring subscription.
Data Masking Products
Listings (1-17 of 17)
Compuware’s Test Data Privacy solution leverages Topaz for Enterprise Data for a consistent, familiar and secure method to easily understand, mask and manage both test and production data across all environments.
Informatica Persistent Data Masking is a scalable data masking software product that creates safe and secure copies of data by anonymizing and encrypting information that could threaten the privacy, security, or compliance of personal and sensitive data. Copies can be used for analytics, test, devel…
Imperva Data Masking is, as the name would suggest, a data masking solution, formerly available under the name Imperva Camouflage.
Test Data Manager from Broadcom (formerly CA Test Data Manager) is a data masking solution based on CA Technologies acquisition of Grid Tools.
DataSunrise Database & Data Security is a cross-platform, high-performance software. DataSunrise delivers Real-Time Database Security and Compliance, in Clouds solutions such as Microsoft Azure, Amazon AWS, Google Cloud. It is also available on-premise.DataSunrise secures databases such as MS SQ…
Vormetric Data Security Platform includes multiple data security products that deliver advanced encryption, tokenization and centralized key management, as well as data masking.
BizDataX is a tool specifically designed to mask sensitive user data. It allows IT departments to create databases for non-production purposes, such as testing, product development, marketing, training, and other secondary environments. Thanks to the functions within the tool, users can create secon…
With DATPROF Privacy users can mask, scramble or anonymize production data so that customer data is protected, but software teams can still use representative test data.
Qlik Gold Client is a test data management solution designed to improve the availability, security and quality of data in non-production SAP environments, thereby increasing developer productivity while maintaining referential data integrity and reducing storage requirements.
Informatica Dynamic Data Masking de-identifies data and controls unauthorized access to production environments, such as customer service, billing, order management, and customer engagement. Dynamic Data Masking masks or blocks sensitive information to users based on their role, location, and privil…
IRI FieldShield® classifies, finds, and shields sensitive column (field) values in DBs (and flat files) with a choice of data masking and anonymization functions in 15 categories, including format-preserving AES encryption, pseudonymization, and reaction. The vendor states that FieldShield has been …
Very Good Security (VGS) lets companies use and exchange any kind of sensitive data without ever needing to see or hold the data itself. Built on the premise that “you can’t hack what isn’t there”, VGS is on a mission to protect the world’s information by transforming security and privacy from a bus…
Single Connect™ is a privileged access management platform from Kron which is offered to bring privileged accounts under control. With a range of products, Single Connect™ unifies privileged session management, password management, two-factor authentication, database access management and logging, d…