Best Data Masking Software for Microsoft Azure

Find and compare the best Data Masking software for Microsoft Azure in 2024

Use the comparison tool below to compare the top Data Masking software for Microsoft Azure on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Satori Reviews
    See Software
    Learn More
    Satori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements.
  • 2
    IRI FieldShield Reviews

    IRI FieldShield

    IRI, The CoSort Company

    Varies by component/scope
    IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps.
  • 3
    IRI DarkShield Reviews

    IRI DarkShield

    IRI, The CoSort Company

    5000
    IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS.
  • 4
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 5
    DATPROF Reviews
    Mask, generate, subset, virtualize, and automate your test data with the DATPROF Test Data Management Suite. Our solution helps managing Personally Identifiable Information and/or too large databases. Long waiting times for test data refreshes are a thing of the past.
  • 6
    PHEMI Health DataLab Reviews
    Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more
  • 7
    IRI Voracity Reviews

    IRI Voracity

    IRI, The CoSort Company

    IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.
  • 8
    IRI Data Protector Suite Reviews
    Renowned startpoint security software products in the IRI Data Protector suite and IRI Voracity data management platform will: classify, find, and mask personally identifiable information (PII) and other "data at risk" in almost every enterprise data source and sillo today, on-premise or in the cloud. Each IRI data masking tool in the suite -- FieldShield, DarkShield or CellShield EE -- can help you comply (and prove compliance) with the CCPA, CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, and SOC2 in the US, and international data privacy laws like the GDPR, KVKK, LGPD, LOPD, PDPA, PIPEDA and POPI. Co-located and compatible IRI tooling in Voracity, including IRI RowGen, can also synthesize test data from scratch, and produce referentially correct (and optionally masked) database subsets. IRI and its authorized partners around the world can help you implement fit-for-purpose compliance and breach mitigation solutions using these technologies if you need help. ​
  • 9
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 10
    Dataguise Reviews
    Data privacy and security should not be a hindrance to your analytics-driven innovation efforts. Dataguise offers flexible encryption and masking options to protect sensitive data. This will ensure that your business is protected. Fast-track delivery of data sets can be achieved for analysis in real time, allowing for better insights and better decisions. Customers of Dataguise have many and changing needs. We know that our customers need more than just the solutions and services we offer. This is why we have built a strong network with carefully selected partners. This executive guide will show you how to maximize data value while protecting data privacy. Dataguise is more reliable than other data discovery tools, has a longer history, supports a wider range of data types, repositories, delivers lower false positive results, and scans data at a larger scale more reliably. Dataguise gives businesses the confidence to act in the best interest of their data.
  • 11
    Informatica Persistent Data Masking Reviews
    While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations.
  • 12
    Okera Reviews
    Complexity is the enemy of security. Simplify and scale fine-grained data access control. Dynamically authorize and audit every query to comply with data security and privacy regulations. Okera integrates seamlessly into your infrastructure – in the cloud, on premise, and with cloud-native and legacy tools. With Okera, data users can use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives.
  • 13
    TrueVault Reviews
    TrueVault is the only data security company that is solely focused on protecting Personally Identifiable Information. TrueVault separates consumer identity and consumer behavior to eliminate compliance risks and liability. This allows companies to only access the data they need. Organizations are increasing their risk and liability as they collect and store more data in order to propel their businesses forward. Our software, designed by an attorney, will guide you step by step to CCPA compliance. TrueVault Polaris can help your business comply with CCPA regulations, no matter if it's an online store or SaaS. We'll refund your entire payment if we can't. No questions asked. TrueVault Polaris will guide you through every step, from getting compliant the first time to processing consumer inquiries. You can file your taxes online to bring your business into compliance.
  • 14
    Pathlock Reviews
    Pathlock has transformed the market through a series strategic mergers and acquisitions. Pathlock is changing the way enterprises protect their customer and financial data. Pathlock's access orchestration software supports companies in their quest to Zero Trust by alerting them to violations and taking steps to prevent loss. Pathlock allows enterprises to manage all aspects related to access governance from one platform. This includes user provisioning and temporary elevation, ongoing User Access Review, internal control testing, continuous monitoring, audit preparation and reporting, as well as user testing and continuous controls monitoring. Pathlock monitors and synthesizes real user activity across all enterprise apps where sensitive activities or data are concentrated, unlike traditional security, risk, and audit systems. It identifies actual violations and not theoretical possibilities. All lines of defense work together to make informed decision with Pathlock as their hub.
  • 15
    OpenText Voltage SecureData Reviews
    Secure sensitive data wherever it flows - on premises, in the cloud and in big data analytics platforms. Voltage encryption provides data privacy protection and neutralizes data breaches. It also drives business value through secure data usage. Data protection builds customer trust, and enables compliance with global regulations such as GDPR, CCPA and HIPAA. Privacy regulations recommend anonymization, pseudonymization and encryption to protect personal data. Voltage SecureData allows enterprises to de-identify structured data and supports the use of data within its protected state to safely drive business value. Secure data flows through your enterprise without gaps, encryption, or overhead. SecureData supports a wide range of platforms and encrypts data using any language. Structured Data Manager integrates SecureData to allow businesses to easily and continuously protect data all through its lifecycle, from discovery through encryption.
  • Previous
  • You're on page 1
  • Next