banner背景图 21
Static Data Masking System
Application Scenarios
Real-Time Data Migration
Real-Time Data Migration
To meet demand scenarios that require the real-time migration of business data, the system offers an incremental desensitization feature. This enables quasi-real-time synchronization to be achieved once incremental data changes occur in the source database.
Alternative to Manual Masking
Alternative to Manual Masking
In response to the frequent need for fragmented manual masking of crucial file data, export data, and during data distribution and sharing, a static masking system can serve as an alternative to manual masking. This system efficiently fulfills user masking requirements.
Protection of Data Transmission
Protection of Data Transmission
Data is vulnerable to attacks during network transmission. By employing data masking followed by offline transmission, and with the support to complete transmission, the system utilizes a masking restoration algorithm to reinstate the data. This approach addresses the issue of sensitive data leakage that may occur during the transmission of sensitive information.
Data Analysis
Data Analysis
After desensitization is performed using masking techniques within the desensitization system, data analysis proceeds, ensuring the security of core and business-related data, while effectively carrying out the tasks associated with data analysis.
Development, Test Data Sharing
Development, Test Data Sharing
Business data and core data are desensitized using the desensitization system before being shared with development and testing teams. This prevents data leakage and ensures the safety of important data during the development and testing processes.
Product Capabilities
Comprehensive Data Masking Reporting
Comprehensive Data Masking Reporting
The data masking process and results are thoroughly logged, capturing details such as the tables, fields, and amount of data that have been masked. A data masking report is produced to enable users to easily understand the status of the data masking tasks at any given time.
Reversible Reduction of Sensitive Data
Reversible Reduction of Sensitive Data
The system supports reversible restoration of sensitive data, data in the process of network transmission, easy to be attacked, the use of desensitized data in the offline transmission process, to solve the problem of sensitive data leakage in the process of sensitive data transmission.
Breakpoints, Incremental Data Masking
Breakpoints, Incremental Data Masking
The system supports breakpoint desensitization functionality to ensure that in special circumstances, desensitization can resume from the last place where it was accidentally terminated. This feature saves system resources and provides an incremental desensitization function. Once there are incremental changes in the source database data, it achieves quasi-real-time synchronization.
Visualization of Masking Task
Visualization of Masking Task
It supports flexible establishment of masking tasks, selection of data sources, masking algorithms, and masking data destination; it supports setting up timed automatic tasks, temporary tasks, task scheduling, and visualization of task management.
Black and White List Support
Black and White List Support
Data masking system built-in black and white list management, specify the display of some information in the table or not, the more sensitive data, such as the Ministry of Public Security red list and other information can choose the black list configuration; purposely choose to view the data or other can choose the white list configuration.
Database and Document Heterogeneous Masking
Database and Document Heterogeneous Masking
The data masking system supports a wide range of databases, including MySQL, SQL Server, Oracle, MongoDB, Teradata, etc. It also supports file masking for TXT, EXCEL, CSV, etc. The system supports various types of masking, such as database-to-database, database-to-file, file-to-database, and file-to-file masking.
Automatic Recognition of Sensitive Data
Automatic Recognition of Sensitive Data
The data masking system is capable of identifying sensitive data through predefined sensitive data feature libraries and intelligent matching during task execution. This maximizes the automation of the masking process and reduces the need for manually defining sensitive data by field name, simplifying the otherwise tedious work.
Product Advantage
Cluster Deployment for High Traffic Data Desensitization
Cluster Deployment for High Traffic Data Desensitization
The system supports high-availability (HA)-based cluster deployment to meet the performance demands of data environments with high traffic. This ensures that the data desensitization process can handle high-volume data securely and efficiently.
Extensive Data Source Support with Data Masking
Extensive Data Source Support with Data Masking
The system offers comprehensive support for data masking across various data sources, including traditional databases such as MySQL, SQL Server, and Oracle, as well as big data architectures like HBase and MongoDB. Additionally, it facilitates the masking of file formats such as TXT, EXCEL, and CSV to ensure data is desensitized effectively.
Desensitizing Data Linkages and Maintaining Business Relationships with Data Masking
Desensitizing Data Linkages and Maintaining Business Relationships with Data Masking
For business-related data, the desensitization system supports automatic identification and allows for customized policy configuration. This ensures that the data remains in a business context after it has been masked, preserving the relationships necessary for conducting business while maintaining high data availability post-desensitization.
Efficient and Rich Data Masking Algorithms
Efficient and Rich Data Masking Algorithms
The data desensitization system is equipped with a variety of built-in masking rules, including synonym substitution, data obfuscation, random replacement, offset, encryption and decryption, randomization, and reversible desensitization. It features over a dozen types of localized bleaching rules and algorithms for Chinese private data, offering flexibility for practical application scenarios.
Experience security protection for free now