banner背景图 21
Dynamic Data Masking System
Application Scenarios
Data Sharing (Third-party Applications Directly Accessing Data)
Data Sharing (Third-party Applications Directly Accessing Data)
When it is necessary to share and grant access to important business data with external parties or third-party applications, the dynamic data masking system can meet the need for real-time data masking during third-party access, ensuring the security of business data.
Operations Masking
Operations Masking
During the operations process, different levels of data masking can be set for operational accounts based on their respective permissions. This includes support for flexible configurations such as full masking, partial masking, and no masking to ensure effective protection of sensitive data during operations.
Application Data Masking (Use in Business Data Access)
Application Data Masking (Use in Business Data Access)
During the real-time use of business systems, it is necessary to secure core business and sensitive data. Data dynamic masking can occur in real-time during application account access, ensuring the security of core business data.
Product Capabilities
Data Source Management
Data Source Management
Support for common relational databases, a variety of Chinese databases, big data components data source.
Data Masking Effect Preview and Auditing
Data Masking Effect Preview and Auditing
Supports visual preview of data masking effects to ensure successful data data masking and prevent leaks; supports auditing of the data masking results.
Data Masking Algorithms and Task Management
Data Masking Algorithms and Task Management
Supports a variety of built-in data masking algorithms including masking, distortion, substitution, randomization, etc.; data masking tasks are flexibly configurable and visually manageable.
Data Masking Access Control
Data Masking Access Control
Access to sensitive data is managed by setting different levels of data masking for users with varying permissions, supporting flexible configurations such as full data masking, partial data masking, and no data masking.
Automatic Sensitive Data Discovery
Automatic Sensitive Data Discovery
Sensitive data can be automatically identified during task execution by matching against a predefined sensitive data characteristic library, maximizing the automation of the data masking process.
Product Advantage
Extensive Data Source Support
Extensive Data Source Support
Support Mysql, SQL Server, Oracle and other conventional database, support Hbase, MongoDB and other big data architecture.
Support for Controlling the Number of Returned Rows
Support for Controlling the Number of Returned Rows
Support for Controlling the Number of Returned Rows. Even if the SQL query retrieves more data than requested, only the masking data for the specified number of rows will be returned.
Superior Performance (Low Latency, High Concurrency)
Superior Performance (Low Latency, High Concurrency)
Utilizing high-performance hardware platforms and kernel optimization technologies to meet performance requirements in high-load environments. Multiple engines work in collaboration to support high concurrency and low latency during real-time dynamic data masking.
Cluster Deployment to Ensure Real-Time Data Masking
Cluster Deployment to Ensure Real-Time Data Masking
Supports high-availability cluster deployment based on HA (High Availability) to prevent failures and ensure the real-time data masking needs of the business are met.
Experience security protection for free now