[an error occurred while processing the directive]
RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Software AG Data Masking

Product
The name of the base system (platform): Adabas&Natural
Developers: Software AG
Last Release Date: April, 2012
Technology: DBMS

On May 7, 2012 the Software AG company presented Data Masking for Adabas, the solution allowing users of a DB of Adabas to develop and test applications using real production data without risk of violation of confidentiality.

To be convinced of operability of the solutions, software developers for Adabas need to have an opportunity to test them in the environment as close as possible to reality. In other words, they need the "real" data reflecting specifics of activity of the company. However business data often contain any confidential information: names and surnames of clients, credit card numbers, medical data and so forth. Certainly, it is possible to take manually data from a DB of Adabas and to replace "confidential fragments" with the subsitutive text, however it will take away too much time and efforts. Besides, the employee can accidentally "pass" this or that fragment of confidential information and by that to threaten data security.

The solution Data Masking for Adabas is designed to automate this process and to protect confidential information in the Adabas DB different environments. It provides integrity of the production environment and — that the most important — developers make available data which can serve as a full substitute of real information in the environment of testing.

"Thanks to Data Masking for Adabas software developers can test applications using real working data of firm and at the same time provide absolute confidentiality of business information — Dr. Wolfram Jost, the director of technologies, Software AG says. — Data Masking for Adabas helps to provide compliance to requirements of the law and also to accelerate and reduce the price of development of software tools".

This solution will suit the companies which are obliged to respect strictly the rules in the field of data protection (for example, the Law on the reporting and safety of health insurance of the USA, the Standard of security in the industries of payment cards, Graham Leitch Blili's Law of the USA, the Directive of the European Union on data protection, etc.). It will allow to exclude risk of "leak" of confidential information from a development environment and testing and, as a result, to protect reputation of the company.