The Accutive Enterprise Data Masking (EDM) solution provides the ability to locate, mask, and move your critical sensitive data, while ensuring the data properties and fields remain intact across any number of sources. After being processed through the masking operation, the data will still look real, but in fact, it will have become fictitious. The masked data will also remain consistent throughout all source
The Business Challenge – Why Mask Your Data?
Enterprises today are faced with the regulatory challenge of ensuring the privacy and security of their customers’ information, while still successfully conducting their daily business activities. Organizations often copy and move sensitive data containing Personally Identifiable Information (PII) and Payment Card Industry (PCI) information from the security of their production environments to less secure testing environments, or for third-party use. Prior to being copied to these environments, it is important for this sensitive data to be identified and masked, to ensure individual privacy and meet regulatory compliance standards (PCI-DSS, GLBA, OSFI/PIPEDA, HIPAA, FERPA, GDPR). Data Masking is different from Data Encryption; encrypted data is unrecognizable and unusable, and the formatting is not always preserved. Data Masking is also referred to as obfuscation, anonymizing, or anonymization.
The Business Value – Benefits of Data Masking
- Reduce potential data breaches by reducing the risk of disclosing sensitive data that resides in testing, training, development, or third-party environments
- Comply with data security and regulatory compliance standards for storing sensitive data, such as PCI-DSS, GLBA, OSFI, HIPAA and FERPA, GDPR
- Create fictitious data that retains data field properties and is fully-functional across multiple systems
- Refresh and maintain masked data across different environments for the purposes of testing, outsourcing, and analytics
How Data Masking Works
Accutive Technologies’ Enterprise Data Masking is a robust software platform designed to perform automated discovery of sensitive data. All source tables and field names are searched and mapped during the discovery operations, and the solution will maintain all field properties of the source data. The output data will remain fully functional, yet the information will no longer be sensitive. For example, a 16-digit credit card in the source data, will remain a 16-digit credit card after being masked. Furthermore, that credit card number will be the same every time you mask it, should you need it to be.
The Accutive Technologies Enterprise Data Masking solution (EDM) provides the ability to locate and mask your critical sensitive data, while ensuring the data properties and fields remain intact across any number of sources. After being processed through the masking operation the data will still look real, but in fact, it will have become fictitious. The masked data will also remain consistent throughout all sources. For example, Joe Smith masked as John Doe will always be John Doe in System A, System B, etc. Masking production data for non-production environment uses will reduce the risk of data compromise, while meeting regulatory requirements.
Product Features and Functionality
Accutive Technologies’ Enterprise Data Masking (EDM) solution is built upon the reliable and scalable Java platform, which is optimized for high performance. It is a web-based, drag-and-drop user interface for rapid and simplified configuration and field mapping. The platform enables consistent, flexible and repeatable enterprise data discovery and masking capabilities; providing the key functions for your data masking needs.
- Connect to multiple sources and database engines such as Oracle, DB2, MySQL and SQLServer
- Automatically read and report database metadata information
- Configure how each sensitive data field is masked using the drag and drop interface
- Cloud capable in a variety of virtual environments
- Automated discovery of sensitive data
- Track and report on all data masking operations
- Save and reuse multiple masking requirements and configurations
- Multiple user authentication options for enhanced security
- Send automatic alerts via email or text when a masking job is complete or if an error occurs
- Allow for scripting of any field to add masking operators on the fly
Due to the complexities and challenges surrounding data virtualization, there is a growing demand for data masking. In response to our Fortune 500 customers’ needs, Accutive Technologies continues to evolve its EDM solution. Organizations that implement an Enterprise Data Masking solution demonstrate to their clients, business partners, and regulatory authorities that they take data protection seriously by proactively reducing the risk of a data breach or violation of security policies and regulatory requirements.
We are industry experts in data management and security. Accutive Technologies’ team consists of highly specialized software development and project implementation professionals with decades of experience. Our goal is to help guide and automate Enterprise Data Masking within your organization, and to support your business processes while maintaining client privacy and regulatory compliance standards.