Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Utilize Oracle Advanced Security to encrypt application tablespaces, thereby safeguarding sensitive data from unauthorized access. Implementing redaction policies helps curb the spread of sensitive information and enhances compliance with data protection laws. Transparent Data Encryption (TDE) acts as a barrier against potential attackers who might attempt to read sensitive data directly from storage by ensuring encryption of data at rest within the database. You can encrypt individual data columns, entire tablespaces, database exports, and backups for better control over access to sensitive information. Data Redaction works in conjunction with TDE to further mitigate the risk of unauthorized data exposure within applications by obscuring sensitive information before it exits the database. By allowing for partial or full redaction, it prevents extensive extraction of sensitive data into reports and spreadsheets. Additionally, encryption is carried out at the database kernel level, which removes the necessity for modifications to existing applications, thus streamlining the implementation process. Ultimately, these security measures work together to provide a robust framework for protecting sensitive data throughout its lifecycle.

Description

The increasing risks to security and the rise of stringent privacy laws have necessitated a more cautious approach to handling sensitive information. Oracle Data Masking and Subsetting offers database users a solution to enhance security, streamline compliance efforts, and lower IT expenses by sanitizing production data copies for use in testing, development, and various other functions, while also allowing for the removal of superfluous data. This tool allows for the extraction, obfuscation, and sharing of both full copies and subsets of application data with partners, whether they are within or outside the organization. By doing so, it ensures the database's integrity remains intact, thus supporting the ongoing functionality of applications. Additionally, Application Data Modeling automatically identifies columns within Oracle Database tables that contain sensitive data through established discovery patterns, including national IDs, credit card details, and other forms of personally identifiable information. Furthermore, it can recognize and map parent-child relationships that are defined within the database structure, enhancing the overall data management process.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Cisco Multicloud Defense
IBM Db2
IBM Informix
Kkonnect.io
MySQL
Oracle Data Guard
Oracle Database
Oracle E-Business Suite
Oracle Exadata
SQL Server
Sandfly Security
TSM

Integrations

Cisco Multicloud Defense
IBM Db2
IBM Informix
Kkonnect.io
MySQL
Oracle Data Guard
Oracle Database
Oracle E-Business Suite
Oracle Exadata
SQL Server
Sandfly Security
TSM

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$230 one-time payment
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Oracle

Founded

1977

Country

United States

Website

www.oracle.com/security/database-security/advanced-security/

Vendor Details

Company Name

Oracle

Founded

1977

Country

United States

Website

www.oracle.com/database/technologies/security/data-masking-subsetting.html

Product Features

Product Features

Alternatives

Alternatives

IRI FieldShield Reviews

IRI FieldShield

IRI, The CoSort Company
IRI Voracity Reviews

IRI Voracity

IRI, The CoSort Company
IRI Data Protector Suite Reviews

IRI Data Protector Suite

IRI, The CoSort Company