CipherTrust Data Masking Solutions

Specialized solutions that increase security in an end-to-end Data Security Platform

CipherTrust Data Masking solutions help protect your compliance, reputation and budget by enabling updates to ciphers, keys and parameters in less than a minute instead of requiring two-months.

CDM

What is Data Masking?

Data masking protects sensitive data by keeping some data in the clear and replacing the remaining data with symbols.

Benefits of CipherTrust Data Masking

CipherTrust Data Masking solutions can be used in conjunction with tokenization or encryption.

Limit access to data

Limit access to data

Protect sensitive data from being accessed by unauthorized parties

Faster, cheaper audits

Faster, cheaper audits

Remove sensitive data from the audit scope with minimal effort -- save on costs associated with compliance

Remove data completely

Remove data completely

Redaction is the ultimate form of data protection

Avoid becoming front-page news

Mandatory security regulations are multiplying, and non-compliance penalties range from $5,000 to $100,000 USD per month. Moving Developers from revenue-generating projects to support new regulations costs business opportunities and jobs. Our proven solutions enable you to achieve compliance with less work and fewer resources. Stop the penalties and generate more revenue.

    Static and Dynamic Data Masking are recommended for development, testing, training and production environments. Use to obscure sensitive information, keep some data in the clear and replace some data with symbols. Static Data Masking increases performance when the same set of characters is repeatedly needed in the clear. Dynamic data masking can vary which set of characters will be in the clear.

    Dynamic Data Masking and Redaction permanently remove or obscure sensitive information – they are not reversible.

    Centrally-managed Connectors have an additional layer of security provided by an access policy specific to the Connector. REVEAL provides data to a specific user based on the method assigned to the user. If the specific user is not listed, they receive data as defined for a DEFAULT user.

    Forrester Total Economic Impact of Thales CipherTrust Data Security Platform

    Cost savings and business benefits enabled by the CipherTrust Data Security Platform

    Forrester

    Prior to implementing CipherTrust Platform, we struggled with encrypting and tokenizing data spread across such a complex IT landscape, but CipherTrust Platform has made it possible to centralize all encryption and key management across all platforms.”

    Encryption, Data Generalization, Pseudonymization

    Just as you use different keys for different columns in your database, use different ciphers for different types of data.

    Batch Data Transformation

    CipherTrust Batch Data Transformation (BDT) performs high-speed bulk Tokenization/Encryption from source to destination—eliminating the need for Developers (Devs) to create a transformation tool for data migration.

    Learn More

    Application Data Protection

    CipherTrust Application Data Protection (CADP) protects data in applications/services as a performant SDK and eliminates the need for Developers (Devs) to manage security details and regularly update data protection.

    Learn More

    Database Protection

    CipherTrust Database Protection (CDP) provides high-performance, column-level database encryption with an architecture that can provide high-availability to ensure that every database write and read happens at almost the speed of an unprotected database.

    Learn More

    RESTful Data Protection

    CipherTrust RESTful Data Protection (CRDP) protects application data and eliminates the need for Developers (Devs) to manage security details and regularly update data protection.

    Learn More

    Data Protection Gateway

    Data Protection Gateway (DPG) protects RESTful web services and microservices with no change to code, ever.

    Learn More

    Related resources