Oh no! Some styles failed to load. 😵 Please try reloading this page

Data Masking Software

Integrations Integrations

    Apply

Compare the Top Data Masking Software of 2021

Data Masking Software Guide

Data masking software enables organizations to safeguard sensitive data by obfuscating the data in order to hide it from potential breaches or threats. Compare the best Data Masking software currently available using the table below.

  • 1
    Objective Redact

    Objective Redact

    Objective

    Redaction software for security conscious organizations. Protect yourself and your organization from accidental disclosure. Know that you’ve redacted any confidential word, phrase or number. It’s an awful feeling when, after manually redacting a document, you can’t help but wonder if you’ve got every word. Yes, “find and replace�? works, but only to a certain point. Hidden metadata may still be lurking in your document. Protect yourself and your organization from accidental disclosure. Objective Redact is powerful, automated redaction software that makes redaction much faster, internal review much easier, and keeps your most sensitive information safe. It is ideal for compliance and disclosure processes, redaction is easier and faster; and can handle large volumes of and long, complex documents. Permanently remove all text content marked for redaction, including hidden metadata such as authors, creation dates and other attributes that can be stored in a file.

    Starting Price: $76.49 per month
  • 2
    Rectify

    Rectify

    Rectify

    Automating privacy with secure redaction for document distribution. Rectify leverages privacy-enabled artificial intelligence to automate the removal of private information when data sharing occurs. We help organizations decrease the human involvement required to identify and remove consumer identities, trade secrets, IP and other private data in data sets that are being sent to third parties. Our experts have protected tens of millions of pages, and counting. Automating data protection with "privacy-enabled AI" deidentification. Break free from manual redaction with Rectify's secure AI redaction. The consequences of sharing sensitive information without using a secure redaction tool can be daunting. Rectify provides a complete end-to-end solution for your redaction needs. Choosing the right redaction service is crucial to the security and privacy of your business. Automate privacy with Rectify's secure redaction.

    Starting Price: $49.99 per user per month
  • 3
    TestBench

    TestBench

    Original Software

    Testing and test data management for IBM i, IBM iSeries, AS/400. Complex IBM i applications must be checked from top to bottom, right into the data, wherever it is. TestBench IBM i is a comprehensive, proven test data management, verification and unit testing solution that integrates with other solutions for total application quality. Stop copying the entire live database and hone in on the data you really need. Select or sample data with full referential integrity preserved. Simply decide which fields need to be protected and use a variety of obfuscation methods to protect your data. Track every insert, update and delete including intervening data states. Create rules so that data failures are flagged to you automatically. Avoid the painful save/restores and stop attempting to explain bad test results based on poor initial data. Comparing outputs is a well proven method to verify your test results but it can be laborious and prone to error. This unique solution can save hours.

    Starting Price: $1,200 per user per year
  • 4
    Lenses

    Lenses

    Lenses.io

    Enable everyone to discover and observe streaming data. Sharing, documenting and cataloging your data can increase productivity by up to 95%. Then from data, build apps for production use cases. Apply a data-centric security model to cover all the gaps of open source technology, and address data privacy. Provide secure and low-code data pipeline capabilities. Eliminate all darkness and offer unparalleled observability in data and apps. Unify your data mesh and data technologies and be confident with open source in production. Lenses is the highest rated product for real-time stream analytics according to independent third party reviews. With feedback from our community and thousands of engineering hours invested, we've built features that ensure you can focus on what drives value from your real time data. Deploy and run SQL-based real time applications over any Kafka Connect or Kubernetes infrastructure including AWS EKS.

    Starting Price: $49 per month
  • 5
    Dataguise

    Dataguise

    Dataguise

    Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses,

  • 6
    Oracle Data Masking and Subsetting

    Oracle Data Masking and Subsetting

    Oracle

    The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.

    Starting Price: $230 one-time payment
  • 7
    IRI FieldShield

    IRI FieldShield

    IRI

    Classify PII centrally, find it globally, and mask it automatically. Preserve realism and referential integrity using encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to CIPSEA, DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones. IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. FieldShield utilities in Eclipse are used for profiling and de-identifying data at rest (static data masking), and the FieldShield SDK is used for securing data in motion (dynamic data masking).

  • 8
    IBM Security Guardium Data Encryption

    IBM Security Guardium Data Encryption

    IBM

    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Security Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.

  • 9
    Informatica Persistent Data Masking

    Informatica Persistent Data Masking

    Informatica

    Retain context, form, and integrity while preserving privacy. Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments. As a highly scalable, high-performance data masking solution, Informatica Persistent Data Masking shields confidential data—such as credit card numbers, addresses, and phone numbers—from unintended exposure by creating realistic, de-identified data that can be shared safely internally or externally. It also allows you to reduce the risk of data breaches in nonproduction environments, produce higher-quality test data and streamline development projects, and ensure compliance with data-privacy mandates and regulations.

  • 10
    Imperva Data Masking

    Imperva Data Masking

    Imperva

    Data masking is a way to create a fake, but a realistic version of your organizational data. The goal is to protect sensitive data, while providing a functional alternative when real data is not needed—for example, in user training, sales demos, or software testing. Data masking processes change the values of the data while using the same format. The goal is to create a version that cannot be deciphered or reverse engineered. There are several ways to alter the data, including character shuffling, word or character substitution, and encryption. Data masking solves several critical threats – data loss, data exfiltration, insider threats or account compromise, and insecure interfaces with third party systems. Reduces data risks associated with cloud adoption. Makes data useless to an attacker, while maintaining many of its inherent functional properties. Allows sharing data with authorized users, such as testers and developers, without exposing production data.

  • 11
    Oracle Advanced Security

    Oracle Advanced Security

    Oracle

    Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications.

  • 12
    Randtronics DPM easyData

    Randtronics DPM easyData

    Randtronics

    DPM easyData is a high-performance data spoofing or de-identification engine. Data spoofing examples include masking, tokenization, anonymization, pseudonymization and encryption. DPM data spoofing processes replace whole or parts of sensitive data with a non-sensitive equivalent (creates fake data) and is a very powerful data protection tool. DPM easyData is a software data security solution that allows web and app server applications and databases to tokenize and anonymize data and apply masking policies for unauthorized users when retrieving sensitive data. The software allows a high level of granularity, defining which authorized users have access to which protection policies, and what operations they may perform with those protection policies. DPM easyData is extremely customizable and is able to protect and tokenize many different types of data. The software has been designed to be flexible and users are free to define any format of input data and token format.

  • 13
    TrueVault

    TrueVault

    TrueVault

    TrueVault is the first data security company entirely focused on protecting Personally Identifiable Information (PII). TrueVault decouples consumer identity from consumer behavior to eliminate data security risks and compliance liabilities, giving companies only the data they need. As organizations collect and store more data to drive their businesses forward, they are simultaneously increasing their risk and liability. Our attorney-designed software will guide you step-by-step to CCPA compliance. Whether your business is an online store or a SaaS, TrueVault Polaris will get your business to full compliance for a flat rate. If we can’t, we’ll give you a full refund. No questions asked. From getting compliant for the first time to processing consumer requests, TrueVault Polaris will walk you through everything you need to do one step at a time. If you can file your taxes online, you can get your business to full compliance.

  • 14
    HushHush Data Masking

    HushHush Data Masking

    HushHush

    Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms.

  • 15
    Apache Atlas

    Apache Atlas

    Apache Software Foundation

    Atlas is a scalable and extensible set of core foundational governance services – enabling enterprises to effectively and efficiently meet their compliance requirements within Hadoop and allows integration with the whole enterprise data ecosystem. Apache Atlas provides open metadata management and governance capabilities for organizations to build a catalog of their data assets, classify and govern these assets and provide collaboration capabilities around these data assets for data scientists, analysts and the data governance team. Pre-defined types for various Hadoop and non-Hadoop metadata. Ability to define new types for the metadata to be managed. Types can have primitive attributes, complex attributes, object references; can inherit from other types. Instances of types, called entities, capture metadata object details and their relationships. REST APIs to work with types and instances allow easier integration.

  • 16
    Assure Security

    Assure Security

    Precisely

    Assure Compliance Monitoring is a bundle of Assure Security features. Together, they can quickly identify security and compliance issues by producing alerts and reports on IBM i system activity, database changes and views of Db2 data. The bundle includes two features which are also available separately. Assure Monitoring and Reporting seamlessly extracts insights from IBM i journal data and delivers alerts and reports on security incidents and compliance deviations. System and database monitoring capabilities are available separately or together. Or, choose to send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. Assure Db2 Data Monitor is a unique, innovative solution that monitors views of highly confidential Db2 data and optionally blocks records from view. Assure Security delivers market-leading IBM i security capabilities that help your organization successfully comply with cybersecurity regulations.

  • 17
    Voltage SecureData

    Voltage SecureData

    CyberRes

    Secure sensitive data wherever it flows—on premises, in the cloud, and in big data analytic platforms. Voltage encryption delivers data privacy protection, neutralizes data breach, and drives business value through secure data use. Data protection builds customer trust and enables compliance to global regulations, including GDPR, CCPA, and HIPAA. Privacy regulations recommend encryption, pseudonymization, and anonymization to protect personal data. Voltage SecureData enables enterprises to de-identify sensitive structured data and support the use of data in its protect state to safely drive business value. Ensure that applications operate on secure data flowing through the enterprise with no gaps, no decryption, and no performance overhead. SecureData supports the broadest range of platforms and encrypts data in any language. Structured Data Manager integrates SecureData so that businesses can easily and continuously protect data throughout the lifecycle, from discovery to encryption.

  • 18
    PHEMI Health DataLab

    PHEMI Health DataLab

    PHEMI Systems

    A cloud-based system for privacy, security & governance. PHEMI has one central system to manage data stored in many locations (cloud or hybrid cloud), process data in many locations (cloud or hybrid cloud) while controlling access and governing data all in one place. Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up. Data access is driven by PHEMI’s Attribute-Based Access Control policy engine. Metadata attributes of the data, in combination with attributes of the user and their environment, are processed by the policy to dynamically determine access to data, providing contextual, scalable, and simpler access controls over traditional role-based access. Metadata curation begins on ingest to immediately control data access, with data tagged with 42 out of the box attributes such as public, confidential, secret, and top secret.

  • 19
    Satori

    Satori

    Satori Cyber

    A data access service to monitor, classify and control access to sensitive data. Stop wasting time on ad-hoc security and privacy projects; decouple controls from your architecture. Prevent unauthorized access, mask sensitive data or trigger a workflow in real-time. Monitor and control access to PII and sensitive data. Configure granular policies based on users, groups, data types, schema and more. Manage policies-as-code via APIs or Satori’s UI. Monitor and prevent internal and external threats to cloud data stores. Enjoy out-of-the-box policies for GDPR, CCPA, HIPAA and more. Generate granular data maps and data access audits. Analyze data usage by users, groups, volume, tags, locations and more. Track data in real time, no matter where it’s located. Flag over privileged roles and unused permissions, tables and users. Select between SaaS or on-prem deployment. Keep your queries and query tools as they are. No need to change your data store configuration.

  • 20
    iScramble

    iScramble

    MENTIS

    Get the flexibility to choose the anonymization method as per your requirements – including encryption, tokenization, and masking techniques – to protect your sensitive data in a delicate balance of performance and security. Choose from 60+ different anonymization methods that protect your sensitive data effectively. Maintain referential integrity between applications through anonymization methods that give you consistent results across applications and datastores. Anonymization methods that offer you the best of both worlds in terms of protection and performance. Choose to encrypt, tokenize, or mask the data as per the use case that suits you. Anonymize your sensitive data using a range of methods that provide adequate security while maintaining data usability. Protect sensitive data across data stores and applications and maintain referential integrity between them. Choose from a variety of NIST-approved encryption and tokenization algorithms.

  • 21
    Data Secure

    Data Secure

    EPI-USE

    Protect your sensitive SAP data. Solve your SAP data security challenges and comply with data privacy legislation such as the EU's. General Data Protection Regulation (GDPR), South Africa's POPI Act and the California Consumer Privacy Act of 2018 (CCPA) with Data Secureâ„¢. Data security is critical in today's business environment. Data Secureâ„¢, part of EPI-USE Labs' Data Sync Managerâ„¢ (DSM) suite, solves your data security challenges. Data Secure is a comprehensive protection solution that comes with pre-defined masking rules. With these rules you can scramble any non-key field in any client-dependent SAP table in a number of different ways (such as mapping table look-up, constant value, clear a field). You can also extend these rules to cover your own particular security needs. Data Secure enables your company to meet all well-known data privacy and protection standards such as the General Data Protection Regulation (GDPR), Sarbanes Oxley and the BDSG (Bundesdatenschutzgesetz).

  • 22
    Forcepoint SimShield

    Forcepoint SimShield

    Forcepoint

    Secure data transfer for training and testing environments. Included on the U.S. NCDSMO Baseline for SABI environments (since 2009) with native support for DIS, HLA, TENA, RTP and MPEG2-TS, and meets NSA Raise the Bar and NIST guidelines. Evaluated by the High Performance Computing Modernization Program Office (HPCMPO) for connection to Defense Research & Engineering Network (DREN) and Secure Defense Research & Engineering Network (SDREN). SimShield enables fully automated, predictable, controlled, and audited two-way communication and sanitization of events across segmented, air-gapped security domains. Always have the latest features without additional cost, vs. Government-Off-The-Shelf (GOTS) solutions. Train multiple national agencies or coalition forces at the same time in a single, real-world environment. Sanitized information sharing for faster detection and correction of issues and errors during Research, Development, Test & Evaluation (RDT&E).

  • 23
    iMask

    iMask

    MENTIS

    iMask secures your sensitive data at the Application Layer and the Database layer by offering flexible approaches that cater to all use cases and all types of users – small, medium, and large enterprises. Ensure your data’s complete protection in production instances by masking sensitive data at both application and database layers. Configure rules within the product UI to enable role-based, user-based, program-based, and location-based access controls on who can access your sensitive data. Maintain data consistency between production and non-production instances by having the flexibility to choose from over 40 anonymization methods. Configure authorization rules to control who can view the sensitive data through conditions based on user, geography, roles, departments, etc. Enable secure anonymization protocols without any loss of performance. Deidentify data without any change in application architecture or existing security protocols through a database embedded approach.

  • 24
    InfoSum

    InfoSum

    InfoSum

    Deliver personalised messaging in the cookie-free world using first-party data. Maximise match rates to unlock omnichannel marketing in a privacy-first era. Grow privacy-safe relationships between brands and media owners. Create flexible first-data and identity alliances to achieve a network effect of collaboration. Data remains decentralised in secure Bunkers that facilitate analysis and activation without moving raw data. Aggregate level results and differential privacy concepts stop individuals from ever being identified through analysis. Streamlining privacy, security and legal reviews to start data onboarding faster, unlocking marketing that converts. Conduct seamless analysis across all data sources available to you, both your own and those second-party datasets you have permission to analyse. Use this insight to determine complementary data sources, and the activation partners with the greatest potential to reach your audience.

  • 25
    Clonetab

    Clonetab

    Clonetab

    Clonetab offers huge number of options to suit the site specific needs. Though standard features of Clonetab will be sufficient for most of the normal requirements, it also provides infrastructure to add custom steps to make it more flexible and suit site specific requirements. Clonetab base module is available for Oracle Databases, eBusiness Suite and PeopleSoft. Normal shell scripts created for performing refreshes may leave sensitive passwords in flat files. Also they may not have audit trail to track who is doing refreshes and for what purpose. The support of these scripts becomes difficult especially when person who created scripts leaves organization. Using Clonetab for refreshes eliminates these issues. The features like pre, post, random scripts, target instance retention options like db links, concurrent processes, appltop binary cloning and allow user to automate most of the refresh steps. All these steps are one time setups. So the tasks can be scheduled.

  • Previous
  • You're on page 1
  • 2
  • Next