Developers: | Informatica |
Technology: | MDM - Master Data Management - Management of the main master data, Information loss preventions are cybersecurity |
Content |
Informatica for depersonalization (masking) of data
2018: Informatica depersonalization methods
2017: The industrial platform for depersonalization of data
Informatica TDM - The industrial platform for depersonalization of data
Informatica methodology on depersonalization of data
- Informatica Dynamic Data Masking protects crucial information of users and applications which should not have access to it
- Provides for each user an information access according to data on identification, a role and area of responsibility without change of applications and databases
- Blocks data access in whole or in part by safety rules
dynamic masking
Data protection in production environments
What data need to be masked in real time?
- Data of VIP clients
- Contact information
- Financial information
- Trade secret
- Any other sensitive information
- Information to which different user groups have accesses
- Any client data for the foreign companies
depersonalization of data
Protection of industrial and test data
Masking and creation of copies of test environments
Two products enter a packet of Informatica Test Data Management: Data Subset and Persistent Data Masking.
Informatica Data Subset is a flexible and scalable solution for creation, updating and protection of copies of environments, for example, of the reduced target bases from big and complex. Use of Data Subset allows IT department to reduce time, efforts and disk space which are required for support of these systems.
Solution:
- Reduces development/testing cycles, optimizes development processes and testings and also the software for training.
- Facilitates management of test data and increases quality of all unproductive systems
- Reduces influence of the unproductive systems by reduction of the amount of data demanded by him and cutting of costs for their maintenance.
Main Features:
- Scalable solution on creation of copies of environments for diverse applications
- Supports creation of copies of environments and management by them for a broad spectrum of applications and DB, such as Oracle DB2 SQL Server Sybase, Teradata and platforms, including Windows UNIXLinux,/, and z/OS,
- Controls process of creation of copies of environments of the main using the multiline processor allowing to operate with large volumes of data.
- Creation of relevant copies
- Builds the exact copies saving everything communications in a DB regardless of that, the data model is how difficult.
- Manages process of creation of copies using the simple interface, creating copies on the basis of any time, geographical or any other functional parameters.
- Extensive set of connections to industrial solutions
- Provides the built-in mechanisms of connection for many industrial solutions, such as ERP, SFA, CRM or SCM, including Oracle E-Business Suite SAP PeopleSoft Siebel.
- Supports politicians who continue to function in the copy after use of changes, for example, when after application of patches changes are made to applications.
- Ample opportunities of connection to user applications
- Has connections to different DB, data warehouses, maynfreyma and business applications, including Oracle, IBM DB2, the MS SQL Server, Sybase, Teradata, IMS, VSAM, JD Edwards and Baan.
- Standardizes the policy of management of copies (a time or organizational cut) in all systems of the organization and adapts politicians according to individual business requirements.
Informatica Persistent Data Masking is the specialized solution for masking of confidential structured data when testing and developing aimed at data security provision.
Use of the solution will allow:
- Create the depersonalized data sets, the most similar on real with a high speed
- Carry out masking during creation of a test data set both "on the fly", and "on site", i.e. directly in the available table with data
- Carry out "simulation of a masking" — an opportunity to emulate how data without direct change of data will mask
- Carry out such procedures as automatic cascade masking of data for the connected tables
- Use the business glossary for the description of rules and the politician of masking of data
- Reuse rules and policy of masking.[1]
You See Also
- Regulation of personal data in the Russian Federation
- Law on personal data No. 152-FZ
- Personal data processing in Russia
- Personal data protection in Russia
- Personal data protection in the European Union
- Quotations of user data in the market of cybercriminals