banner背景图 21
Static Data Masking System
Product Advantage
Cluster Deployment for High Traffic Data Desensitization
Cluster Deployment for High Traffic Data Desensitization
The system supports high-availability (HA)-based cluster deployment to meet the performance demands of data environments with high traffic. This ensures that the data desensitization process can handle high-volume data securely and efficiently.
Extensive Data Source Support with Data Masking
Extensive Data Source Support with Data Masking
The system offers comprehensive support for data masking across various data sources, including traditional databases such as MySQL, SQL Server, and Oracle, as well as big data architectures like HBase and MongoDB. Additionally, it facilitates the masking of file formats such as TXT, EXCEL, and CSV to ensure data is desensitized effectively.
Desensitizing Data Linkages and Maintaining Business Relationships with Data Masking
Desensitizing Data Linkages and Maintaining Business Relationships with Data Masking
For business-related data, the desensitization system supports automatic identification and allows for customized policy configuration. This ensures that the data remains in a business context after it has been masked, preserving the relationships necessary for conducting business while maintaining high data availability post-desensitization.
Efficient and Rich Data Masking Algorithms
Efficient and Rich Data Masking Algorithms
The data desensitization system is equipped with a variety of built-in masking rules, including synonym substitution, data obfuscation, random replacement, offset, encryption and decryption, randomization, and reversible desensitization. It features over a dozen types of localized bleaching rules and algorithms for Chinese private data, offering flexibility for practical application scenarios.
Product Capabilities
Comprehensive Data Masking Reporting
Comprehensive Data Masking Reporting
The data masking process and results are thoroughly logged, capturing details such as the tables, fields, and amount of data that have been masked. A data masking report is produced to enable users to easily understand the status of the data masking tasks at any given time.
Reversible Reduction of Sensitive Data
Reversible Reduction of Sensitive Data
The system supports reversible restoration of sensitive data, data in the process of network transmission, easy to be attacked, the use of desensitized data in the offline transmission process, to solve the problem of sensitive data leakage in the process of sensitive data transmission.
Breakpoints, Incremental Data Masking
Breakpoints, Incremental Data Masking
The system supports breakpoint desensitization functionality to ensure that in special circumstances, desensitization can resume from the last place where it was accidentally terminated. This feature saves system resources and provides an incremental desensitization function. Once there are incremental changes in the source database data, it achieves quasi-real-time synchronization.
Visualization of Masking Task
Visualization of Masking Task
It supports flexible establishment of masking tasks, selection of data sources, masking algorithms, and masking data destination; it supports setting up timed automatic tasks, temporary tasks, task scheduling, and visualization of task management.
Black and White List Support
Black and White List Support
Data masking system built-in black and white list management, specify the display of some information in the table or not, the more sensitive data, such as the Ministry of Public Security red list and other information can choose the black list configuration; purposely choose to view the data or other can choose the white list configuration.
Database and Document Heterogeneous Masking
Database and Document Heterogeneous Masking
The data masking system supports a wide range of databases, including MySQL, SQL Server, Oracle, MongoDB, Teradata, etc. It also supports file masking for TXT, EXCEL, CSV, etc. The system supports various types of masking, such as database-to-database, database-to-file, file-to-database, and file-to-file masking.
Automatic Recognition of Sensitive Data
Automatic Recognition of Sensitive Data
The data masking system is capable of identifying sensitive data through predefined sensitive data feature libraries and intelligent matching during task execution. This maximizes the automation of the masking process and reduces the need for manually defining sensitive data by field name, simplifying the otherwise tedious work.
Experience security protection for free now
Service Channel