Data Masking Software

1

Oracle Advanced Security

Oracle Advanced Security offers robust encryption for application tablespaces, safeguarding sensitive data against unauthorized access. With Transparent Data Encryption (TDE),...

By: Oracle From United States
2

Oracle Data Masking and Subsetting

Oracle Data Masking and Subsetting enhances data security by sanitizing production data copies for testing and development, while also enabling...

By: Oracle From United States
3

IBM Guardium Data Encryption

IBM Guardium Data Encryption offers a robust suite of data encryption and key management tools designed for hybrid multicloud environments....

By: IBM From United States
4

OpenText Voltage SecureData

Voltage SecureData secures sensitive data across various environments—on-premises, cloud, and big data platforms. Its advanced encryption ensures data privacy, mitigates...

By: OpenText From Canada
5

Forcepoint SimShield

Forcepoint SimShield is an advanced data masking software that ensures secure, automated communication across air-gapped security domains. It enables organizations...

By: Forcepoint From United States
6

Assure Security

This advanced data masking software significantly enhances IBM i security by automating access controls, managing privileged accounts, and enforcing robust...

By: Precisely From United States
7

TrueVault

Designed by legal experts, this privacy platform simplifies compliance with data privacy laws, guiding businesses through every stage of the...

By: TrueVault From United States
8

IRI DarkShield

IRI DarkShield effectively locates and anonymizes Personally Identifiable Information (PII) across various data formats, including structured, semi-structured, and unstructured sources....

By: IRI, The CoSort Company From United States
9

IRI DMaaS

IRI Data Masking as a Service (DMaaS) offers expert solutions for identifying and protecting sensitive data across various formats and...

By: IRI, The CoSort Company From United States
10

IRI FieldShield

IRI FieldShield provides robust data discovery and masking solutions for personally identifiable information (PII) across structured and semi-structured sources. It...

By: IRI, The CoSort Company From United States
11

IRI Data Protector Suite

The IRI Data Protector Suite offers advanced tools for classifying, discovering, and masking personally identifiable information (PII) across various data...

By: IRI, The CoSort Company From United States
12

AnalyticDiD

AnalyticDiD is an advanced solution that enables organizations to de-identify sensitive data, including PII, through effective anonymization and pseudonymization techniques....

By: Fasoo From United States
13

Cloud Compliance

Cloud Compliance empowers organizations to meet GDPR, CCPA, and HIPAA requirements effortlessly. With automated data retention and privacy rights management,...

By: Cloud Compliance From United States
14

Data Secure

Data Secure™ enhances SAP data security by effectively scrambling sensitive information within non-production environments. By utilizing pre-defined masking rules, it...

By: EPI-USE From United States
15

Adaptive

Designed to prevent sensitive data exposure, this innovative platform secures privileges, protects data, and manages access across all entities. Its...

By: Adaptive From United States
16

Randtronics DPM easyData

DPM easyData serves as a robust data spoofing engine that expertly handles sensitive information through techniques such as masking, tokenization,...

By: Randtronics From Australia
17

Mage Dynamic Data Masking

Mage Dynamic Data Masking offers a no-code solution for real-time masking of sensitive data, allowing users without technical expertise to...

By: Mage Data From United States
18

Mage Static Data Masking

Mage Static Data Masking (SDM) provides an essential solution for Test Data Management by permanently obfuscating sensitive production data. It...

By: Mage Data From United States
19

Nymiz

Nymiz empowers organizations to safeguard sensitive information through advanced anonymization techniques, including reversible and irreversible methods like tokenization and synthetic...

By: Nymiz From Spain
20

Rectify

With Rectify, organizations can seamlessly automate the removal of sensitive information from documents through advanced privacy-enabled AI technology. This innovative...

By: Rectify From United States