Compare NextLabs Externalized Authorization Management vs. iMask

iMask is ranked 17th in Data Masking while NextLabs Externalized Authorization Management is ranked 7th in Data Masking. iMask is rated 0, while NextLabs Externalized Authorization Management is rated 0. On the other hand, iMask is most compared with , whereas NextLabs Externalized Authorization Management is most compared with Axiomatics Policy Server, Tools4ever ERAM and Oracle Entitlements Server.
Cancel
You must select at least 2 products to compare!
Ranking
17th
out of 25 in Data Masking
Views
63
Comparisons
8
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
7th
out of 25 in Data Masking
Views
742
Comparisons
536
Reviews
0
Average Words per Review
0
Avg. Rating
N/A
Find out what your peers are saying about IBM, Broadcom, Delphix and others in Data Masking. Updated: May 2020.
420,062 professionals have used our research since 2012.
Top Comparisons
Learn
Mentis
Video Not Available
NextLabs
Overview

iMask is the first commercially available product to include dynamic data masking. It supports encryption, tokenization, and masking. It helps you, by allowing you to make templates containing the rules of masking and associated data and metadata. It can be deployed in a variety of ways.

NextLabs Authorization Management separates policy management from the application lifecycle. It externalizes access control decisions to a decision point (decision is based on the data they want to access and the action they want to perform) that is decoupled from the application. The system interrogates an information point to determine a user's access rights based on a centrally managed policy. Authorization and access rights to an organization's network or assets are granted dynamically in real-time based on user, data and environmental attributes. Externalized authorization allows for the management of permissions to multiple systems from a single platform, streamlining the access process and reducing administrative burden. Access control to file shares, network subnets, document repositories and applications can now be made in real time by a centrally-managed decision point, using attributes in a user's directory entry.

Offer
Learn more about iMask
Learn more about NextLabs Externalized Authorization Management
Sample Customers
Static and Dynamic Masking in a Canadian Aviation Company, Discovery and masking for a large credit rating agencyFortune 1000 manufacturer
Find out what your peers are saying about IBM, Broadcom, Delphix and others in Data Masking. Updated: May 2020.
420,062 professionals have used our research since 2012.
We monitor all Data Masking reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.