And you have Camouflage (datamasking.com) , 1st on Gartner and forrester. ITschak
On Tue, Jun 15, 2010 at 8:28 PM, Phil Smith <[email protected]> wrote: > Alan Brown wrote: > >IBM Optim can privatize production data for a test environment while > >maintaining your application referential integrity. It works natively on > >z/OS to create privatized complete clones or subsets of production data. > >There is also a version for the distributed world. > > Voltage SecureData Format-Preserving Encryption also provides data masking > and encryption functionality: with Format-Preserving Encryption, encrypted > data can be used for test, since it's in the same format (that's, like, why > it's called Format-Preserving Encryption). This means that if your product > data is encrypted, you can copy and use it directly for test, or you can > encrypt (mask) production data when you copy it to test. > > More info: http://www.voltage.com/products/data_protection.htm > > And some more info: > > Voltage offers unique encryption technology that prevents data leakage, > targeting data protection requirements like PCI-DSS, GLBA, Identity Red > Flag, SB1386, et al. The Voltage SecureData product takes advantage of the > US Government standard AES Encryption algorithm in an advanced mode known as > "Format-Preserving Encryption" (FPE). FPE allows you to encrypt things like > credit card numbers or addresses, and the encrypted versions match the > format of the originals (n decimal digits, etc.), thus avoiding the need to > redo database schema, screens, and the like. > > Multiple levels of encryption enable role-based access: Customer Service > representatives might see only the last four digits of an account or Social > Security number, whereas applications that need the full number can decrypt > it. > > With FPE, since the data format is unaltered, only "trusted" applications > need changes -- typically one or two lines of code -- as most components can > just use the encrypted value. > > And since it's a multi-platform solution, data can reside encrypted in the > database, traverse the network, and be decrypted only once it reaches its > final destination. > > Combined with our simplified key management, Voltage SecureData adds > controlled encryption technology to existing applications very easily for > regulatory compliance, and without the key management headaches that > accompany most such solutions. > -- > ...phsiii > > Phil Smith III > [email protected] > Voltage Security, Inc. > www.voltage.com > (703) 476-4511 (home office) > (703) 568-6662 (cell) > > ---------------------------------------------------------------------- > For IBM-MAIN subscribe / signoff / archive access instructions, > send email to [email protected] with the message: GET IBM-MAIN INFO > Search the archives at http://bama.ua.edu/archives/ibm-main.html > ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

