Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Clonetab has many options to meet the needs of each site. Although Clonetab's core features will suffice for most site requirements, Clonetab also offers infrastructure to allow you to add custom steps to make it more flexible to meet your specific needs. Clonetab base module for Oracle Databases, eBusiness Suite, and PeopleSoft is available. Normal shell scripts used to perform refreshes can leave sensitive passwords in flat file. They may not have an audit trail to track who does refreshes and for which purpose. This makes it difficult to support these scripts, especially if the person who created them leaves the organization. Clonetab can be used to automate refreshes. Clonetab's features, such as pre, post and random scripts, target instances retention options like dblinks, concurrent processes, and appltop binary copying, allow users to automate most of their refresh steps. These steps can be done once. The tasks can then be scheduled.

Description

The increasing risks to security and the rise of stringent privacy laws have necessitated a more cautious approach to handling sensitive information. Oracle Data Masking and Subsetting offers database users a solution to enhance security, streamline compliance efforts, and lower IT expenses by sanitizing production data copies for use in testing, development, and various other functions, while also allowing for the removal of superfluous data. This tool allows for the extraction, obfuscation, and sharing of both full copies and subsets of application data with partners, whether they are within or outside the organization. By doing so, it ensures the database's integrity remains intact, thus supporting the ongoing functionality of applications. Additionally, Application Data Modeling automatically identifies columns within Oracle Database tables that contain sensitive data through established discovery patterns, including national IDs, credit card details, and other forms of personally identifiable information. Furthermore, it can recognize and map parent-child relationships that are defined within the database structure, enhancing the overall data management process.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

MySQL
Oracle Database
Oracle E-Business Suite
SQL Server
AWS Cloud9
Delphix
IBM Db2
IBM Informix
Oracle Cloud Infrastructure
Oracle Exadata
Oracle PeopleSoft
Oracle Siebel CRM
SAP HANA

Integrations

MySQL
Oracle Database
Oracle E-Business Suite
SQL Server
AWS Cloud9
Delphix
IBM Db2
IBM Informix
Oracle Cloud Infrastructure
Oracle Exadata
Oracle PeopleSoft
Oracle Siebel CRM
SAP HANA

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$230 one-time payment
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Clonetab

Founded

2011

Country

United States

Website

www.clonetab.com

Vendor Details

Company Name

Oracle

Founded

1977

Country

United States

Website

www.oracle.com/database/technologies/security/data-masking-subsetting.html

Product Features

Database

Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Product Features

Alternatives

Actifio Reviews

Actifio

Google

Alternatives

IRI FieldShield Reviews

IRI FieldShield

IRI, The CoSort Company
Delphix Reviews

Delphix

Perforce
IRI Voracity Reviews

IRI Voracity

IRI, The CoSort Company
Oracle VM Reviews

Oracle VM

Oracle
IRI Data Protector Suite Reviews

IRI Data Protector Suite

IRI, The CoSort Company