Nitromia
Fully homomorphic encryption is a powerful tool for financial institutions. Imagine a world where your data can be used to extract insights and perform advanced analytics without worrying over data leakage, attacks, or compliance. Companies can perform advanced data science and computations with Nitromia's fully heteromorphic cryptography at minimal risk. There is no exposure to data in transit or at rest. The Platform. The platform, which is based on cutting-edge fully homomorphic technology. It allows data scientists to run machine learning and artificial intelligence directly on encrypted data. Nitromia allows business insights to be extracted and sensitive data to be analyzed. All of this while keeping your data secure and hidden. The revolutionary platform is built on the principles of security, privacy, and compliance. It enables complex calculations as well as predictive analytics in real-time. Financial institutions can finally use their data with zero risk using Nitromia.
Learn more
IRI FieldShield
IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking).
The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments.
Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps.
Learn more
Benerator
Describe your data model at an abstract level using XML. It is not necessary to have developer skills. Use a variety of function libraries to create realistic data. Write your own extensions using Javascript or Java. Integrate your data processing into Gitlab CI, Jenkins or Jenkins. Benerator's model driven data toolkit allows you to generate, anonymize and migrate data. Define processes for anonymizing or pseudonymizing data in plain XML without needing developer skills. Protect your customers' privacy and stay GDPR compliant. Mask and obfuscate data sensitive for BI, testing, development or training. Subsetting allows you to combine data from different sources while maintaining data integrity. Transform and migrate your data in multisystem landscapes. Reuse your test data models for migration to production environments. In a microsystems architecture, keep your data consistent and reliable.
Learn more
HushHush Data Masking
Businesses today face severe punishment if they fail to meet the ever-increasing privacy standards of regulators and the general public. Vendors must keep up with the latest algorithms to protect sensitive data like PII or PHI. HushHush is at the forefront in privacy protection (Patents US9886593, US20150324607A1, US10339341) thanks to its PII data discovery tool workbench (also known data de-identification software, data masking software, and obfuscation program). It allows you to find sensitive data about your customers and classify it. You can also anonymize it and comply with GDPR and GLBA requirements. To create comprehensive and secure data anonymization solutions, you can use a variety of rule-based atomic addition anonymization components. HushHush components can be used to anonymize both direct identifiers (SSNs, credit cards names, addresses, telephone numbers, etc.). Both fixed and variable algorithms are available for indirect identifiers.
Learn more