Best Data Masking Software for Microsoft 365

Find and compare the best Data Masking software for Microsoft 365 in 2024

Use the comparison tool below to compare the top Data Masking software for Microsoft 365 on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Cribl Stream Reviews

    Cribl Stream

    Cribl

    Free (1TB / Day)
    Cribl Stream allows you create an observability pipeline that helps you parse and restructure data in flight before you pay to analyze it. You can get the right data in the format you need, at the right place and in the format you want. Translate and format data into any tooling scheme you need to route data to the right tool for the job or all of the job tools. Different departments can choose different analytics environments without the need to deploy new forwarders or agents. Log and metric data can go unused up to 50%. This includes duplicate data, null fields, and fields with zero analytical value. Cribl Stream allows you to trim waste data streams and only analyze what you need. Cribl Stream is the best way for multiple data formats to be integrated into trusted tools that you use for IT and Security. Cribl Stream universal receiver can be used to collect data from any machine source - and to schedule batch collection from REST APIs (Kinesis Firehose), Raw HTTP and Microsoft Office 365 APIs.
  • 2
    IRI FieldShield Reviews

    IRI FieldShield

    IRI, The CoSort Company

    Varies by component/scope
    IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps.
  • 3
    IBM Guardium Data Encryption Reviews
    This suite of integrated encryption tools will help you protect your database and file data from misuse, and comply with government and industry regulations. IBM Guardium Data Encryption is an integrated suite of products based on a common architecture. These highly-scalable products provide encryption, tokenization and data masking capabilities, as well as key management, to help protect and manage access to databases, containers and files across the hybrid multicloud, securing assets in cloud, virtual, Big Data and on-premise environments. By encrypting database and file data using features such as data masking, tokenization and key rotation, organizations can ensure compliance with industry and government regulations, such as GDPR, CCPA and PCI DSS. Guardium Data Encryption features, such as data access audit logging and tokenization, data masking, and key management, help organizations meet regulations like HIPAA, CCPA, or GDPR.
  • 4
    Informatica Persistent Data Masking Reviews
    While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations.
  • 5
    TCS MasterCraft DataPlus Reviews

    TCS MasterCraft DataPlus

    Tata Consultancy Services

    Data management software is used mainly by enterprise business teams. Data management software must be intuitive, automated, and intelligent. Data management activities must also adhere to specific industry and data protection regulations. Data must be accurate, consistent, high quality, and easily accessible to enable business teams to make informed, data-driven strategic business decisions. Integrates data privacy, data quality management and test data management. Service engine-based architecture allows for efficient handling of growing data volumes. Uses a user-defined function framework with python adapter to handle niche data processing needs. This provides a minimal layer of governance for data quality and privacy management.
  • 6
    Assure Security Reviews
    Assure Compliance Monitoring is a bundle that includes Assure Security features. They can be used together to quickly identify security and compliance problems by producing alerts, reports, and reports on IBM system activity, database changes, and views of Db2 information. Two features are also included in the bundle, which can be purchased separately. Assure Monitoring & Reporting seamlessly extracts insights directly from IBM i journal data, and generates alerts and reports about security incidents and compliance deviations. You can use the system and database monitoring capabilities separately or together. You can also send data directly to your enterprise SIEM software, allowing IBM security to be monitored on all enterprise platforms. Assure Db2 Security Monitor is an innovative solution that monitors Db2 data views and blocks records. Assure Security offers market-leading IBM i security capabilities that will help you and your organization comply with cybersecurity regulations.
  • 7
    iScramble Reviews
    You have the freedom to choose the anonymization method that best suits your needs - including tokenization, encryption, and masking techniques. This will ensure that sensitive data is protected in a delicate balance between security and performance. You can choose from over 60 different anonymization methods to protect sensitive data. Anonymization methods that provide consistent results across datastores and applications will help you maintain referential integrity. Anonymization methods that provide both performance and protection. You can choose to encrypt, tokenize or mask data depending on the use case. There are many ways to anonymize sensitive data. Each method provides adequate security and data usability. Protect sensitive data across data storage and applications, and maintain referential integrity. You can choose from a range of NIST-approved encryption or tokenization algorithms.
  • 8
    Forcepoint SimShield Reviews
    Secure data transfer to training and testing environments. The U.S. NCDSMO Baseline is available for SABI environments since 2009. It supports native support for DIS and HLA, TENA and RTP, and conforms to NSA Raise the Bar guidelines and NIST guidelines. The High Performance Computing Modernization Program Office, (HPCMPO), evaluated the connection to Defense Research & Engineering Network and Secure Defense Research & Engineering Network. SimShield allows fully automated, predictable and controlled two-way communication. It also allows for the sanitization and control of events across segmentsed, air-gapped security areas. Always have the latest features without additional cost, vs. Government-Off-The-Shelf (GOTS) solutions. Multiple national agencies and coalition forces can be trained simultaneously in one, real-world environment. Sharing of sanitized information is a faster way to detect and correct errors during Research, Development, Test & Evaluation.
  • 9
    iMask Reviews
    iMask protects sensitive data at the Application Layer as well as the Database Layer. It offers flexible solutions that can be used for all types of use and all users, small, medium and large. Mask sensitive data at both the application and database levels to ensure your data's protection in production. You can set up rules in the product UI to allow role-based and user-based access controls that control who can access your sensitive information. You have the option to choose from more than 40 anonymization methods to maintain data consistency between production and nonproduction instances. You can set authorization rules to restrict who can see sensitive data based on geography, roles, departments, and other factors. Secure anonymization protocols can be enabled without affecting performance. Database embedded approach allows data to be deidentified without any changes in the application architecture or security protocols.
  • 10
    CipherTrust Data Security Platform Reviews
    Thales has been pushing the boundaries with the CipherTrust Data Security Platform. This platform removes complexity from data security, speeds up compliance time, and protects cloud migrations. This next-generation platform, built on a modern microservices architecture, was designed for cloud computing. It includes Data Discovery and Classification and fuses together the best features of the Vormetric Data Security Portal, KeySecure, and connector products. CipherTrust Data Security Platform combines data classification, data protection, unprecedented granular access control, and centralized key management all in one platform. This means that your business will have fewer resources for data security operations, fewer compliance controls, and a significantly lower risk. The CipherTrust Security Platform integrates a range of data-centric security products that combine data protection, discovery, and control into one platform.
  • Previous
  • You're on page 1
  • Next