And you have Camouflage (datamasking.com) , 1st on Gartner and forrester.

ITschak

On Tue, Jun 15, 2010 at 8:28 PM, Phil Smith <[email protected]> wrote:

> Alan Brown wrote:
> >IBM Optim can privatize production data for a test environment while
> >maintaining your application referential integrity.  It works natively on
> >z/OS to create privatized complete clones or subsets of production data.
> >There is also a version for the distributed world.
>
> Voltage SecureData Format-Preserving Encryption also provides data masking
> and encryption functionality: with Format-Preserving Encryption, encrypted
> data can be used for test, since it's in the same format (that's, like, why
> it's called Format-Preserving Encryption). This means that if your product
> data is encrypted, you can copy and use it directly for test, or you can
> encrypt (mask) production data when you copy it to test.
>
> More info: http://www.voltage.com/products/data_protection.htm
>
> And some more info:
>
> Voltage offers unique encryption technology that prevents data leakage,
> targeting data protection requirements like PCI-DSS, GLBA, Identity Red
> Flag, SB1386, et al. The Voltage SecureData product takes advantage of the
> US Government standard AES Encryption algorithm in an advanced mode known as
> "Format-Preserving Encryption" (FPE). FPE allows you to encrypt things like
> credit card numbers or addresses, and the encrypted versions match the
> format of the originals (n decimal digits, etc.), thus avoiding the need to
> redo database schema, screens, and the like.
>
> Multiple levels of encryption enable role-based access: Customer Service
> representatives might see only the last four digits of an account or Social
> Security number, whereas applications that need the full number can decrypt
> it.
>
> With FPE, since the data format is unaltered, only "trusted" applications
> need changes -- typically one or two lines of code -- as most components can
> just use the encrypted value.
>
> And since it's a multi-platform solution, data can reside encrypted in the
> database, traverse the network, and be decrypted only once it reaches its
> final destination.
>
> Combined with our simplified key management, Voltage SecureData adds
> controlled encryption technology to existing applications very easily for
> regulatory compliance, and without the key management headaches that
> accompany most such solutions.
> --
> ...phsiii
>
> Phil Smith III
> [email protected]
> Voltage Security, Inc.
> www.voltage.com
> (703) 476-4511 (home office)
> (703) 568-6662 (cell)
>
> ----------------------------------------------------------------------
> For IBM-MAIN subscribe / signoff / archive access instructions,
> send email to [email protected] with the message: GET IBM-MAIN INFO
> Search the archives at http://bama.ua.edu/archives/ibm-main.html
>

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to