CipherTrust Data Masking solutions help protect your compliance, reputation and budget by enabling updates to ciphers, keys and parameters in less than a minute instead of requiring two-months.

What is Data Masking?
Data masking protects sensitive data by keeping some data in the clear and replacing the remaining data with symbols.
Benefits of CipherTrust Data Masking
CipherTrust Data Masking solutions can be used in conjunction with tokenization or encryption.

Limit access to data
Protect sensitive data from being accessed by unauthorized parties

Faster, cheaper audits
Remove sensitive data from the audit scope with minimal effort -- save on costs associated with compliance

Remove data completely
Redaction is the ultimate form of data protection
Avoid becoming front-page news
Mandatory security regulations are multiplying, and non-compliance penalties range from $5,000 to $100,000 USD per month. Moving Developers from revenue-generating projects to support new regulations costs business opportunities and jobs. Our proven solutions enable you to achieve compliance with less work and fewer resources. Stop the penalties and generate more revenue.
Static and Dynamic Data Masking are recommended for development, testing, training and production environments. Use to obscure sensitive information, keep some data in the clear and replace some data with symbols. Static Data Masking increases performance when the same set of characters is repeatedly needed in the clear. Dynamic data masking can vary which set of characters will be in the clear.
Dynamic Data Masking and Redaction permanently remove or obscure sensitive information – they are not reversible.
Centrally-managed Connectors have an additional layer of security provided by an access policy specific to the Connector. REVEAL provides data to a specific user based on the method assigned to the user. If the specific user is not listed, they receive data as defined for a DEFAULT user.
Forrester Total Economic Impact of Thales CipherTrust Data Security Platform
Cost savings and business benefits enabled by the CipherTrust Data Security Platform

Prior to implementing CipherTrust Platform, we struggled with encrypting and tokenizing data spread across such a complex IT landscape, but CipherTrust Platform has made it possible to centralize all encryption and key management across all platforms.”
Encryption, Data Generalization, Pseudonymization
Just as you use different keys for different columns in your database, use different ciphers for different types of data.