Database Protection

Database Protection

Government Regulations like HIPAA and PCI, Corporate Espionage, Identity Theft, the list goes on and on. There are many reasons to utilize database protection and your individual requirements guide us to architect a solution that meets your needs while respecting best practices. We utilize several database protection concepts to help you keep your data safe and private.

Versioning: Keeping multiple copies of your data so that you can go back to different point in time. Versioning comes in handy if a user accidently deleted a few pages of a word document or if your systems get hit with ransomware.  

Data Masking: creating a structurally similar but inauthentic version of your data to protect the actual data while having a functional substitute for occasions when the real data is not required. This is often used in Big Data where you need proper representation and distribution for statistical analysis, but you don’t need to know someone’s actual social security number.  

Physical Data Masking: changes the actual data stored in the database and is usually used in non-production environments 

Dynamic Data Masking: stores the original data but presents an altered version to the user based on policy is usually used in production environments. 

Tokenization: is the process of replacing sensitive data with unique values that represent the original data and can be reversed by using lookup tables which are stored separately. Tokenization is often used in financial transactions and credit card processing.  

Some of the products we utilize for Database Protection are: 

Oracle Data Redaction: Part of Oracle Advanced Security Option for the Enterprise Edition Database.  

Imperva Camouflage: The Imperva Camouflage Data Masking solution will reduce your risk profile by replacing sensitive data with realistic fictional data. 

Delphix Data Masking and Data Virtualization: End to end masking, realistic data, masking integrated with virtualization to provide protected datasets very quickly while ensuring referential integrity.  

Contact Us