Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Safeguard your confidential SAP information by addressing security issues and adhering to data protection laws like the EU's General Data Protection Regulation (GDPR), South Africa's POPI Act, and California's Consumer Privacy Act of 2018 (CCPA) through the use of Data Secure™. In the current business landscape, ensuring data security has become paramount. Data Secure™, which is integrated within EPI-USE Labs' Data Sync Manager™ (DSM) suite, effectively tackles your data security concerns. This comprehensive solution features pre-set masking rules, allowing you to obfuscate any non-key field across various client-dependent SAP tables through diverse methods, including table look-up mappings, constant values, or even clearing a field entirely. Additionally, you can tailor these rules to suit your specific security requirements. By implementing Data Secure, your organization can comply with widely recognized data privacy standards and regulations, ensuring the protection of sensitive information in line with GDPR, Sarbanes Oxley, and the BDSG (Bundesdatenschutzgesetz). Ultimately, adopting such robust security measures not only enhances compliance but also fosters trust among your clients and stakeholders.

Description

Safeguard your file and database information from potential abuse while ensuring compliance with both industry standards and governmental regulations by utilizing this comprehensive suite of integrated encryption solutions. IBM Guardium Data Encryption offers a cohesive set of products that share a unified infrastructure. These scalable solutions incorporate encryption, tokenization, data masking, and key management features, essential for protecting and regulating access to databases, files, and containers across hybrid multicloud environments, thereby securing assets located in cloud, virtual, big data, and on-premises settings. By effectively encrypting file and database data through functionalities like tokenization, data masking, and key rotation, organizations can successfully navigate compliance with various regulations, including GDPR, CCPA, PCI DSS, and HIPAA. Moreover, the extensive capabilities of Guardium Data Encryption—including data access audit logging and comprehensive key management—further assist organizations in meeting critical compliance requirements, ensuring that sensitive data remains protected at all times. Ultimately, implementing such robust encryption measures not only enhances security but also builds trust among stakeholders.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

IBM Guardium
Microsoft 365
SAP Access Control
SAP Agile Data Preparation
SAP Ariba Contract Management
SAP Ariba Spend Analysis
SAP Ariba Strategic Sourcing
SAP Ariba Supply Chain Collaboration
SAP BusinessObjects Business Intelligence
SAP Cloud Platform
SAP Commerce Cloud
SAP Concur
SAP Customer Consent
SAP ERP
SAP Financials
SAP Fiori
SAP Store
SAP SuccessFactors Incentive Management
Sogeti SMART Workspace
Soterion

Integrations

IBM Guardium
Microsoft 365
SAP Access Control
SAP Agile Data Preparation
SAP Ariba Contract Management
SAP Ariba Spend Analysis
SAP Ariba Strategic Sourcing
SAP Ariba Supply Chain Collaboration
SAP BusinessObjects Business Intelligence
SAP Cloud Platform
SAP Commerce Cloud
SAP Concur
SAP Customer Consent
SAP ERP
SAP Financials
SAP Fiori
SAP Store
SAP SuccessFactors Incentive Management
Sogeti SMART Workspace
Soterion

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

EPI-USE

Founded

1983

Country

United States

Website

www.epiuselabs.com/data-secure

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/products/guardium-data-encryption

Product Features

Product Features

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Alternatives

CLEAR Reviews

CLEAR

Quantum Knight
iSecurity Field Encryption Reviews

iSecurity Field Encryption

Raz-Lee Security