We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
De-identify, de-sensitize, and anonymize sensitive data from unauthorized access for application users, business intelligence, application testing, and outsourcing.
Organizations leveraging networked applications and services benefit from the flexibility and convenience of being able to create and access data across multiple devices and users. At the same time, sensitive data, including health and personally identifiable information, may need to be protected or de-identified to satisfy regulations or internal privacy policies.
Protegrity Data Security Gateway addresses these security, privacy, and compliance risks with advanced encryption and tokenization to transparently protect sensitive data as it moves across the network. By securing data in real-time as it is transmitted, enterprises are assured that data automatically adhere to rules governing sensitive data at all times.
Transparently protect sensitive data across the network without modifying applications or database calls. Protect applications and API’s quickly without impacting your business.
Informatica Persistent Data Masking is ranked 4th in Data Masking with 2 reviews while Protegrity Data Security is ranked 8th in Data Masking. Informatica Persistent Data Masking is rated 8.0, while Protegrity Data Security is rated 0.0. The top reviewer of Informatica Persistent Data Masking writes "Data transformation and test management features allow us to work with unstructured data". On the other hand, Informatica Persistent Data Masking is most compared with Delphix, IBM Guardium Data Protection, TCS MasterCraft DataPlus, Oracle GoldenGate and IBM InfoSphere Optim, whereas Protegrity Data Security is most compared with Micro Focus Voltage SecureData Enterprise, Vormetric Application Crypto Suite, IBM Guardium Data Protection, Informatica Dynamic Data Masking and Oracle Advanced Security.
See our list of best Data Masking vendors.
We monitor all Data Masking reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.