Informatica Dynamic Data Masking vs Vormetric Application Crypto Suite comparison

Cancel
You must select at least 2 products to compare!
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Informatica Dynamic Data Masking and Vormetric Application Crypto Suite based on real PeerSpot user reviews.

Find out what your peers are saying about Delphix, Broadcom, DATPROF and others in Data Masking.
To learn more, read our detailed Data Masking Report (Updated: April 2024).
768,578 professionals have used our research since 2012.
Featured Review
Use Informatica Dynamic Data Masking?
Ravi Chandarana
report
Use our free recommendation engine to learn which Data Masking solutions are best for your needs.
768,578 professionals have used our research since 2012.
Questions from the Community
Ask a question

Earn 20 points

Top Answer:Transfer encryption is a great feature of Crypto Suite.
Top Answer:The solution is affordable, including for smaller companies. The cost is approximately $3,000 per license, which is quite reasonable. It's a one-off unlimited license.
Top Answer:We're getting to the end of support for Vormetric and on the implementation side it's already going through CipherTrust. This solution could be more agent-led with options for simplifying… more »
Ranking
12th
out of 31 in Data Masking
Views
282
Comparisons
119
Reviews
0
Average Words per Review
0
Rating
N/A
7th
out of 31 in Data Masking
Views
182
Comparisons
156
Reviews
1
Average Words per Review
382
Rating
8.0
Comparisons
Learn More
Overview

Informatica Dynamic Data Masking de-identifies data and controls unauthorized access to
production environments, such as customer service, billing, order management, and customer engagement. Dynamic Data Masking masks or blocks sensitive information to users based on their role, location, and privileges, can alert on unauthorized access attempts, and provides logs for compliance and audit.

At the core of the Vormetric Application Crypto Suite from Thales is a set of products that streamline development efforts to add encryption, tokenization, masking and other cryptographic functions to applications. The job of the developer is made easy and fast by leveraging sample code and APIs that are best for their environment, while key management functions are kept separate and secure in a FIPS 140-2 hardware or virtual appliance that is operated by IT or SecOps. Securing data at the application, with separation of duties for key management, provides the highest levels of protection and compliance.

The Vormetric Application Crypto Suite also includes applications and utilities that leverage the core components to add security layers to databases and other structured data stores.

Sample Customers
Hastings, AARP, ACE Hardware, ACH, Addivant
BD, Delta Dental, CMI
Top Industries
VISITORS READING REVIEWS
Educational Organization48%
Financial Services Firm16%
Energy/Utilities Company6%
Government4%
VISITORS READING REVIEWS
Financial Services Firm27%
Computer Software Company23%
Real Estate/Law Firm7%
Insurance Company6%
Company Size
VISITORS READING REVIEWS
Small Business7%
Midsize Enterprise55%
Large Enterprise38%
VISITORS READING REVIEWS
Small Business18%
Midsize Enterprise7%
Large Enterprise74%
Buyer's Guide
Data Masking
April 2024
Find out what your peers are saying about Delphix, Broadcom, DATPROF and others in Data Masking. Updated: April 2024.
768,578 professionals have used our research since 2012.

Informatica Dynamic Data Masking is ranked 12th in Data Masking while Vormetric Application Crypto Suite is ranked 7th in Data Masking with 1 review. Informatica Dynamic Data Masking is rated 0.0, while Vormetric Application Crypto Suite is rated 8.0. On the other hand, the top reviewer of Vormetric Application Crypto Suite writes "Very user friendly with good security features including transfer encryption". Informatica Dynamic Data Masking is most compared with IBM Security Guardium Data Protection, Privitar Publisher and Protegrity Data Security, whereas Vormetric Application Crypto Suite is most compared with IBM Security Guardium Data Protection, Voltage SecureData Enterprise and Protegrity Data Security.

See our list of best Data Masking vendors.

We monitor all Data Masking reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.