Data Masking Tools

Best Data Masking Tools include:

Oracle Data Masking and Subsetting, Accutive Security - Data Discovery and Masking (ADM), Mage™ Dynamic Data Masking, DATPROF Privacy and Statice.

All Products

(1-25 of 48)

1
Delphix

Delphix, headquartered in Redwood City, provides test data management for DevOps. Businesses need to transform application delivery but struggle to balance speed with data security and compliance. The Delphix DevOps Data Platform automates data security, while rapidly deploying test…

2
AutoRABIT

AutoRABIT is a DevSecOps provider that allows working off the Salesforce platform, protecting users from outages and vulnerabilities experienced by those working directly within Salesforce.

3
VGS platform

Very Good Security (VGS) lets companies use and exchange any kind of sensitive data without ever needing to see or hold the data itself. Built on the premise that “you can’t hack what isn’t there”, VGS is on a mission to protect the world’s information by transforming security and…

4
IBM InfoSphere Optim

IBM InfoSphere® Optim™ solutions manage data from requirements to retirement, to improve governance across applications, databases and platforms by managing data properly, enabling organizations to support business goals with less risk.

5
Solix Enterprise Data Management Suite (Solix EDMS)

Solix Enterprise Data Management Suite (Solix EDMS) is an information lifecycle management solution, from Solix Technologies in Santa Clara. Solix helps infrastructure and operations leaders implement the right policies, processes, and technology for application decommissioning and…

6
Oracle Data Masking and Subsetting

Oracle Data Masking and Subsetting is designed to help database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by discarding unnecessary data.

7
Experian Aperture Data Studio

Experian offers the Aperture Data Studio, a data quality management platform based on technology acquired by Experian with QAS, ltd.

8
DataLark
0 reviews

DataLark is an SAP-centric zero-coding data management platform that helps businesses streamline data migration and integration processes. Using its extensible plugins and analytical tools, users can automate all ETL operations and orchestrate across systems to drive better business…

9
Syntheticus
0 reviews

Syntheticus® offers technologies and privacy-preserving solutions to empower responsible business growth. Founded in 2021 and based in Zürich, Switzerland, they offer innovation and research in Privacy-Enhancing Technologies, collaborating with Swiss academic institutions and backed…

10
Conduktor UI
0 reviews

Conduktor UI is a solution suite for managing Apache Kafka, boasting a simple UI for managing operations, observability tools for streamed data, and Kafka data governance tools.

11
Mage Data Platform

The Mage Data Platform (formerly MENTIS) aims to enable data security while equipping users with the tools to respond to compliance-related requests like the Right to Know and Right to Erasure in a swift and efficient manner. Users can Discover, Protect, and Monitor enterprise sensitive…

12
CipherTrust Data Security Platform

Thales' CipherTrust Data Security Platform (replacing the former Vormetric Data Security Platform) aims to remove complexity from data security, accelerate time to compliance, and secure cloud migrations. The platform is built on a modern micro-services architecture, is designed…

13
BizDataX
0 reviews

BizDataX is a tool specifically designed to mask sensitive user data. It allows IT departments to create databases for non-production purposes, such as testing, product development, marketing, training, and other secondary environments. Thanks to the functions within the tool, users…

14
ShieldConex by Bluefin
0 reviews

ShieldConex® utilizes both hardware-based encryption and vaultless tokenization to secure Personally Identifiable Information (PII), Protected Health Information (PHI), cardholder data (CHD) and ACH account data entered online. ShieldConex masks sensitive data upon entry through…

15
Krontech Single Connect

Single Connect from Krontech, headquartered in Istanbul, is a product family that strengthens, simplifies and secures the management of privileged accounts, for enterprises and network operators who serve them. Single Connect unifies multivendor environments with pre-integrated modules…

16
DataFleets, from LiveRamp

DataFleets is a cloud platform for unified and privacy-preserving enterprise data analytics powered by Federated Learning, aimed at making it easy to securely bridge data silos and create new data-driven products with strong network effects.DataFleets' tech boasts support for a full…

17
IRI FieldShield

IRI FieldShield® classifies, finds, and shields sensitive column (field) values in DBs (and flat files) with a choice of data masking and anonymization functions in 15 categories, including format-preserving AES encryption, pseudonymization, and reaction. The vendor states that…

18
HushHush Data Masking Components

The vendor states users can de-identify sensitive data in an organization quickly and easily with HushHush Data Masking components, with its variety of algorithms to satisfy multiple scenarios and compliance requirements, including HIPAA, GDPR, GLBA, and PCI. Users can simultaneously…

19
Single Connect

Single Connect™ is a privileged access management platform from Kron which is offered to bring privileged accounts under control. With a range of products, Single Connect™ unifies privileged session management, password management, two-factor authentication, database access management…

20
Enquero PowerMe from Genpact

PowerMe, from Genpact company Enquero, creates discoverable pool of Analytics and BI assets enabling business users to search, discover, and collaborate with data. PowerMe is an Integrated Analytics Catalog with built-in Data Quality and Data Lineage that aims to provide high-quality…

21
Informatica Cloud Data Masking

A solution to help organizations meet compliance goals for safe data handling and allow trusted use through data security governance.

22
Redgate SQL Provision

SQL Provision combines SQL Clone and Data Masker for SQL Server to enable software teams to deliver database environments at the speed required by modern development practices, while ensuring the security of sensitive data subject to GDPR, HIPAA, CCPA, and other regulations. The…

23
IRI CellShield

Innovative Routines International (IRI) helps users keep PII & PHI Safe with IRI CellShield, a data masking software solution designed to protect the sensitive information in Microsoft Excel® spreadsheets, allowing the user to comply with data privacy laws. It features point-and-…

24
Yash Solutions Data Masking

Yash Solutions is a systems integrator of DevOps automation headquartered in Cumming, Georgia. Yash provides a technology agnostic approach customized to the user's environment and deliverables. Yash provides Dynamic: “on the fly” real-time data masking of production data and Static:…

25
IRI Voracity
0 reviews

Innovative Routines International (IRI) offers the Voracity data lifecycle management platform, that enables users to profile enterprise data sources, as well as speed or leave legacy DBs and ETL tools, and cleanse and blend data for analytics. Voracity can also mask PII, create…

Learn More About Data Masking Tools

What is Data Masking Software?

Data Masking Software protects sensitive data by creating similar but inauthentic versions of the data, then concealing the important details. Data Masking Software encrypts the data by covering or replacing information with random characters (‘masks’). Data Masking Software desensitizes confidential information like social security numbers, bank accounts, personally identifiable information, or project details. Masks can be automated or manually applied and removed according to user preference.

Data Masking Software is vital because customer, vendor, partner, and employee information has never been more important, as a bad actor accessing sensitive data can be damaging. Data Masking Software can also be used to adhere to organizational and federal standards for data privacy, thus preventing steep fines for noncompliance. Additionally, Data Masking Software can be utilized to protect data not just from outside breaches, but from leaks or other internal threats, especially during the product testing phase where this information is most vulnerable. Masked data can also function as a stand-in where real data is not required, making it useful for test data management and security.

Data Masking Software Features

Data Masking Software typically include the following features:

  • Data concealment
  • Data redaction
  • Data copying and backup
  • Data encryption
  • Data search
  • Data profiling and classification
  • Data referencing
  • Data cleanup and management
  • Database replication
  • Synthetic data creation
  • Test data management
  • Dynamic data masking
  • Static data masking
  • Linked source data masking
  • Encryption key management
  • Privilege access control
  • Automated sensitive data identification
  • Customizable data sensitivity hierarchies
  • GDPR and regulation compliance management
  • Audit tracking
  • Tokenization
  • Data virtualization
  • Risk scoring

Data Masking Software Comparison

When choosing the best Data Masking Software product for you, consider the following:

Architecture support. The masking software you choose should support the architecture you use, otherwise you may not get the intended protection fromData Masking Software . For example, Broadcom Test Data Manager only supports Windows platforms, while Solix EDMS supports SQL, Oracle, and other databases.

Dynamic vs. static data masking. Whether you need static data masking or dynamic data masking will depend on the type of data you expect to handle. With static data masking, data is masked permanently through the creation of inauthentic dummy copies, which is helpful for personal detail redaction in human studies or financial transactions. In contrast, dynamic masking alters the data during query, or as the data is being processed. This means that dynamic masking can obscure customer service data in real time without actually replacing any information or duplicating any data files. If you want to utilize both static and dynamic masking, Imperva Data Security offers both options in one package.

Data volume. If you anticipate masking large volumes of data, or data across multiple databases, you’ll want a Data Masking Software that can support this. This is significant for tools that allow you to use customizable sensitive data identifiers, as you’ll want to make sure that masking is applied across all data instances without interruption or exception. DATPROF Privacy is designed specifically with this task in mind.

File type. You’ll want to ensure that your Data Masking Software can handle the data file types you need to mask. For example, if you are looking to mask content in images, the tool you need should be able to effectively extract and mask data in these file types. IRI DarkShield has the widest array of file type compatibility, including image and video files. Alternatively, If you only need to mask content in Microsoft Office suite, IRI CellShield may be an economical choice for you.

Pricing Information

Prices for Data Masking Software vary based on the amount of data processed and the scope of the masking. Vendors should be contacted directly for a quote. Most vendors offer free trials or demos.

Related Categories

Frequently Asked Questions

What does Data Masking Software do?

Data Masking Software protects sensitive data by hiding information. Data Masking Software also creates masks of random characters that cover data contents, while securely encrypting real data from users without access.

What are the benefits of using Data Masking Software?

Data Masking Software provides efficient security for confidential and complex data. This not only protects customer, business, and product information, but it also ensures compliance with data privacy mandates.



What are the best Data Masking Software products?

How much does Data Masking Software cost?

Data Masking Software vendors offer quotes based on company needs. Free trials and demos are available.