Best Data Masking Software for Tableau

Find and compare the best Data Masking software for Tableau in 2024

Use the comparison tool below to compare the top Data Masking software for Tableau on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Satori Reviews
    See Software
    Learn More
    Satori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements.
  • 2
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 3
    Querona Reviews
    We make BI and Big Data analytics easier and more efficient. Our goal is to empower business users, make BI specialists and always-busy business more independent when solving data-driven business problems. Querona is a solution for those who have ever been frustrated by a lack in data, slow or tedious report generation, or a long queue to their BI specialist. Querona has a built-in Big Data engine that can handle increasing data volumes. Repeatable queries can be stored and calculated in advance. Querona automatically suggests improvements to queries, making optimization easier. Querona empowers data scientists and business analysts by giving them self-service. They can quickly create and prototype data models, add data sources, optimize queries, and dig into raw data. It is possible to use less IT. Users can now access live data regardless of where it is stored. Querona can cache data if databases are too busy to query live.
  • 4
    PHEMI Health DataLab Reviews
    Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more
  • 5
    Informatica Persistent Data Masking Reviews
    While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations.
  • 6
    Okera Reviews
    Complexity is the enemy of security. Simplify and scale fine-grained data access control. Dynamically authorize and audit every query to comply with data security and privacy regulations. Okera integrates seamlessly into your infrastructure – in the cloud, on premise, and with cloud-native and legacy tools. With Okera, data users can use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives.
  • 7
    Assure Security Reviews
    Assure Compliance Monitoring is a bundle that includes Assure Security features. They can be used together to quickly identify security and compliance problems by producing alerts, reports, and reports on IBM system activity, database changes, and views of Db2 information. Two features are also included in the bundle, which can be purchased separately. Assure Monitoring & Reporting seamlessly extracts insights directly from IBM i journal data, and generates alerts and reports about security incidents and compliance deviations. You can use the system and database monitoring capabilities separately or together. You can also send data directly to your enterprise SIEM software, allowing IBM security to be monitored on all enterprise platforms. Assure Db2 Security Monitor is an innovative solution that monitors Db2 data views and blocks records. Assure Security offers market-leading IBM i security capabilities that will help you and your organization comply with cybersecurity regulations.
  • 8
    Adaptive Reviews
    Adaptive is a platform for data security that prevents sensitive data from being exposed to all entities, human and nonhuman. It features an agentless architecture with zero network reconfiguration, and can be deployed on-premises or in the cloud. The platform allows organizations to share privileged data access without sharing credentials, improving security posture. It allows for just-in time access to a variety of data sources including databases, cloud infrastructure, data warehouses and web services. Adaptive facilitates non-human access to data by connecting third-party ETL pipelines or tools through a central interface, without exposing credentials for data sources. The platform offers data masking and tokenization for nonprivileged users, without changing access workflows. The platform provides a comprehensive audibility by integrating identity-based audit trails into all resources.
  • Previous
  • You're on page 1
  • Next