Secure Sensitive Data in Non-Production Environments
Today, most organizations utilize copies of their production data for research, analysis, testing and development purposes. Often these copies contain sensitive information, yet companies seldom set the same security measures and access controls that govern production environments. Such data being accessed by testers, developers, analysts, external consultants and offshore teams who do not have the necessary clearances can leave organizations vulnerable to attacks, data leaks and non-compliance with regulations, such as, GDPR, HIPAA, PCI, FISMA etc.
Solix Data Masking is the perfect solution for securing sensitive data in non-production environments. It helps you discover sensitive data at scale and mask them using one of the twenty-five predefined security rules or a custom built rule. The Solix Data Masking rules preserve the format and the referential integrity across the datasets ensuring data continues to be fit for research, analysis and software development without risking compliance and data security.
Features & Benefits
Pre-Configured Masking Rules
Ships with pre-configured algorithms to ensure data privacy for popular pre-packaged application modules like PeopleSoft HCM that contain highly sensitive data. As well as, let you build your own data masking rules.
Discover and Secure PII data
Quickly identifies otherwise difficult to find PII, PCI, PHI and other sensitive data across the heterogeneous data sources and secures it using the format-preserving data masking. This enables rapid sharing of production data that meet the compliance and data privacy regulations.
Accelerators for ERP applications
Solix Data Masking features accelerators for many of the popular pre-packaged applications including Oracle E-Business Suite, Oracle Transportation Management, PeopleSoft, JD Edwards, Siebel, BaaN, DataWarehouse. Additionally, you can implement data masking even on custom applications.
Obfuscates actual data
Solix data obfuscation ensures test and development users are unable to determine the actual, or original values through one-way data scrambling, masking and/or random data generation.
Maintains Transaction Relational Integrity
When sensitive data is a Primary/Foreign Key or maintains a columnar reference, transactional relational integrity is required to be maintained for masked data to be usable. Solix Data Masking ensures this at all times.
Comprehensive Support for Databases
Solix Data Masking features support for all popular databases such as Oracle, DB2, MySQL, Mongo DB, SQL Server, Sybase, Teradata & Flat Files
Case Study: Data Subsetting for Arqiva
Arqiva is the leading transmitter and broadcasting company in the UK, and has helped pioneer technologies of the digital age. Twenty two million homes receive ITV Channel 4 and 5 through Arqiva's national transmitter networks
Solix EDMS Data Masking
Solix EDMS Data Masking, a key module of the Solix Enterprise Data Management Suite (EDMS), combined with Solix EDMS knowledgebase...
Solix EDMS Test Data Management
Solix EDMS Test Data Management eliminates unnecessary security risk and significantly reduces your infrastructure costs. Instead of recreating entire copies...
Solix Common Data Platform
The Solix Common Data Platform (CDP) is a uniform data collection, retention management and data access system for structured and...
GDPR essentials and how a common data platform approach can help accelerate compliance
On 25 May 2018, the European Union (EU) will bring into force the General Data Protection Regulation (GDPR).
Customer & Partner Speak
Sensitive data (such as credit card numbers), personally identifiable information (such as U.S. Social Security numbers), medical diagnoses, and even non-personal sensitive data (such as corporate financial information and intellectual property) are exposed to abuse or negligence from enterprise employees and outsiders. Adopting data masking will help enterprises raise the level of security and privacy assurance against insider and outsider abuses. At the same time, data masking will make enterprises compliant with the security and privacy standards recommended by regulating/auditing organizations.
Ph.D. Research VP and Gartner Fellow Gartner
Reference: Hype Cycle for Application Security 2012, 20 July 2012 – Doc # is G00229119