Overall Satisfaction with Informatica Data Privacy (secure@source)
Due to the fact that our client's real-time critical information cannot be shared with the business user, development, and testing teams, we were seeking a technology that could ensure data security. As a result, we made use of Informatica to hide the sensitive data fields. Eventually, I can state that this application contributed to the provision of data security and protection.
- automated sensitive field detection
- replace critical data with dummy but real-looking data
- threat detection
- role based access
- documentation not available
- technical knowledge required
- predefined rules - saved a lot of time
- built-in templates
- several way of data masking
- risk mitigation
- data loss prevention
- role based data access
Do you think Informatica Data Privacy (secure@source) delivers good value for the price?
Yes
Are you happy with Informatica Data Privacy (secure@source)'s feature set?
Yes
Did Informatica Data Privacy (secure@source) live up to sales and marketing promises?
Yes
Did implementation of Informatica Data Privacy (secure@source) go as expected?
Yes
Would you buy Informatica Data Privacy (secure@source) again?
Yes
Using Informatica Data Privacy (secure@source)
- data masking
- cloud based solution
- data availability for rightful person
Evaluating Informatica Data Privacy (secure@source) and Competitors
- Product Features
- Prior Experience with the Product
If I have to start again, still I would continue with Informatica only also, I would utilize the other product and services provided by the same service provider.