- Data Protection
- Data Discovery & Classification
- Data at Rest Encryption
- Key Management
- Data Protection On Demand
- Hardware Security Modules
- Network Encryption
- Secure File Sharing
The surprising number of static data masking use cases requires bullets to present them. These first three use cases begin with “masking sensitive data”:
And here are more:
These are just a few. You will find many uses for static data masking.
CipherTrust Batch Data Transformation is a powerful tool that gives you high-performance static data masking as part of the CipherTrust Data Security Platform. It leverages the power of CipherTrust Application Data Protection and CipherTrust Tokenization to protect vast quantities of data quickly.
Secure, cost-effective static data masking
Not every static data masking solution is secure. With Batch Data Transformation, you can depend on the security of centralized key management provided by CipherTrust Manager, which can provide up to FIPS 140-2 Level 3 key security. Meanwhile, every investment in the Data Security Platform makes it more valuable to you.
Accelerate Transformation of Existing Sensitive Data
Protect sensitive information in database columns quickly and efficiently using encryption or tokenization with minimal disruption, effort and cost.
Enable database sharing with reduced risk
Static data masking enables you to remove the sensitive information before sharing with third-party developers and big data environments while maintaining your data integrity and still supporting mission-critical testing and analytical activities.
Static Data Masking where you need it
Batch Data Transformation and its data protection tools are all software and completely cloud friendly. You can mask data on premises and use it in the cloud, mask data in the cloud and use it there, or secure data in one cloud and use it in another.
Large volumes of data are encrypted quickly with Batch Data Transformation in conjunction with CipherTrust Application Data Protection. Policy files define encryption options including standard AES encryption or format preserving encryption, while identifying the database columns to be protected and the number of records in each batch.
An encryption alternative in static data masking is tokenization. Batch Data Transformation can utilize the CipherTrust Tokenization Server to tokenize select database columns. Detokenization is supported so that applications can access the clear data again when required, or, irreversible tokenization can ensure that third parties never gain access to original sensitive data.
Flexible Conversion Between Data Stores
CipherTrust Batch Data Transformation can protect data while it is moving, for example, from a database to various flat file formats or in reverse.
Data Transformation Options
Source and Destination Transformation Options
Hardware and Operating System Requirements