SlideShare a Scribd company logo
1 of 10
Clonetab ADS – Advanced Data Scrambling
Clonetab Appliance
Clonetab
Ctengine
Ctmon
Cloneengine
Masking Engine
Clonetab ADS
Data
Masking
Examples of Sensitive Data
Employee Data
• Social Security Number
• Salary Data
• Performance Review Information
• Address & Contact Information
• Bank Account Info for Direct Deposit
Customer Data
• Credit Card Number
• Bank Account Number
Vendor Data
• Bank Account Info for Direct Deposit
Company Data
• Credit Card and Bank Account Info
Supported Algorithms
• Substitution
• Number
• Date
• Phone Number
• Email
• SSN-TIN-ZIP
• Creditcard-BankAccount
• Nulling Out or Deletion
Clonetab ADS – Advanced Data Scrambling
Data Scrambling in Non-Prod Cloned Environments
Production Development
Same sensitive data as
production after clone
• Non-Production environments have meager or low level
of Access Control
• Redact sensitive data to prevent fraud/theft
• Meet statutory & compliance obligations – HIPPA, PCI,
SOX etc.
• Non-Production data may be shared with outside
persons such as non-employees
• Production environments have higher security and
hence non-production environments are vulnerable to
attacks.
Modules for Data Scrambling
Clonetab Data
Scrambling Base
Module
Data Scrambling for HANA,
MS SQL, MYSQL
Clonetab Advanced
Data Scrambling
Module + Referential
Integrity Checks
In-Memory Advanced
Data Scrambling Module
(not available yet)
Clonetab Data Security Modules
Pre-Seeded Algorithms
Replaces the existing data with random values from a pre-prepared
dataset
Pre-Seeded
Algorithms
Substitution
Varies the existing values in a specified range in order to obfuscate them.
Example, birth date values could be changed within a range of +/- n days
Date
Replaces the numeric data with same length
Number
Simply removes the sensitive data by deleting it.
Nulling or
Deletion
Replaces the existing data with same length and type of data
Credit Card or
Bank Account
Replaces the existing data with same length and type of data
SSN-TIN
Replaces the existing email with same length and type of data while
leaving the special character @ unchanged.
eMail
Replaces the existing phone numbers with same length and type of data
while leaving special characters such as (, ), -, . and so, on
Phone
Replaces the existing data with some static text irrespective of the
algorithms selected
Static Text
Scrambles the subset of the data depending on the where clause provided by
the user. Will be effective for the EIT concepts of Oracle e-Business Suite
Subset
* The algorithm list may change with new developments in Clonetab
Approach
Define sensitive column along with
integrity constraints (master/child
relationships).
Attach one of the pre-seeded
scrambling Algorithm.
Schedule or Run the scrambling job.
Subject to licensing terms, may run
as standalone or as part of Clone job
Steps to setup scrambling
Advantages
One-time Simple definition
by appropriate
privilege/role holder
Consistently scrambles
sensitive data after every
clone.
Register your Non-Prod instance to be scrambled in the Clonetab’s UI as
a target instance with the required information
Select Data Column to be scrambled (Schema, Table )
select the pre-seeded algorithm to be used for scrambling.
Create the scrambling task as a stand-alone task
Optionally monitor the task within Clonetab UI
An alert is sent out after completion (or failure) of the task via email
The Process
When you have license for CTClone & CTSnap, using the appropriate
privilege, you may optionally revert the scrambled values to Pre-
Scramble snapshot in case you see issues with scrambled data
Target
Registration
Define
Scrambling
Attributes
Create the Task
Monitor
Scrambling Task
Receive Alert
CTSnap Option
The process followed for Data Scrambling
Clonetab
Software
Multi-Cloud
Multi-Database
Multi-Tasks
• OCI
• SAP
• AWS
• GCP
• Oracle
• HANA
• MySQL
• MS-SQL
• Scrambling
• CTS3
• Virtualization
• Automation
Clonetab – One Software
https://clonetab.com or
Email to info@clonetab.com

More Related Content

Similar to CloneTab Advanced DataScrambling.pptx

Defense Against the Dark Arts: Protecting Your Data from ORMs
Defense Against the Dark Arts: Protecting Your Data from ORMsDefense Against the Dark Arts: Protecting Your Data from ORMs
Defense Against the Dark Arts: Protecting Your Data from ORMsVanessa Hurst
 
Database@Home : The Future is Data Driven
Database@Home : The Future is Data DrivenDatabase@Home : The Future is Data Driven
Database@Home : The Future is Data DrivenTammy Bednar
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001Miguel Ibarra
 
Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Jeremiah Grossman
 
FileNet Datacap Implementation Guideline
FileNet Datacap Implementation GuidelineFileNet Datacap Implementation Guideline
FileNet Datacap Implementation Guidelinekodipakodi1
 
Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016George Walters
 
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...Amazon Web Services
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery ToolsAntonio Rolle
 
07 Advanced RTF Template Techniques.doc
07 Advanced RTF Template Techniques.doc07 Advanced RTF Template Techniques.doc
07 Advanced RTF Template Techniques.docMaqsood Joyo
 
How to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with SplunkHow to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with SplunkPrecisely
 
VSSML18. Data Transformations
VSSML18. Data TransformationsVSSML18. Data Transformations
VSSML18. Data TransformationsBigML, Inc
 
BSSML17 - Basic Data Transformations
BSSML17 - Basic Data TransformationsBSSML17 - Basic Data Transformations
BSSML17 - Basic Data TransformationsBigML, Inc
 
Common Data Service – A Business Database!
Common Data Service – A Business Database!Common Data Service – A Business Database!
Common Data Service – A Business Database!Pedro Azevedo
 
Fire-fighting java big data problems
Fire-fighting java big data problemsFire-fighting java big data problems
Fire-fighting java big data problemsgrepalex
 
Azure Stream Analytics : Analyse Data in Motion
Azure Stream Analytics  : Analyse Data in MotionAzure Stream Analytics  : Analyse Data in Motion
Azure Stream Analytics : Analyse Data in MotionRuhani Arora
 
Building Custom Big Data Integrations
Building Custom Big Data IntegrationsBuilding Custom Big Data Integrations
Building Custom Big Data IntegrationsPat Patterson
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Precisely
 
Dynamic data masking sql server 2016
Dynamic data masking sql server 2016Dynamic data masking sql server 2016
Dynamic data masking sql server 2016Antonios Chatzipavlis
 
Data Transformation Patterns in AWS - AWS Online Tech Talks
Data Transformation Patterns in AWS - AWS Online Tech TalksData Transformation Patterns in AWS - AWS Online Tech Talks
Data Transformation Patterns in AWS - AWS Online Tech TalksAmazon Web Services
 
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...Amazon Web Services
 

Similar to CloneTab Advanced DataScrambling.pptx (20)

Defense Against the Dark Arts: Protecting Your Data from ORMs
Defense Against the Dark Arts: Protecting Your Data from ORMsDefense Against the Dark Arts: Protecting Your Data from ORMs
Defense Against the Dark Arts: Protecting Your Data from ORMs
 
Database@Home : The Future is Data Driven
Database@Home : The Future is Data DrivenDatabase@Home : The Future is Data Driven
Database@Home : The Future is Data Driven
 
Defcon9 Presentation2001
Defcon9 Presentation2001Defcon9 Presentation2001
Defcon9 Presentation2001
 
Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"Web Application Security - "In theory and practice"
Web Application Security - "In theory and practice"
 
FileNet Datacap Implementation Guideline
FileNet Datacap Implementation GuidelineFileNet Datacap Implementation Guideline
FileNet Datacap Implementation Guideline
 
Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016Organizational compliance and security in Microsoft SQL 2012-2016
Organizational compliance and security in Microsoft SQL 2012-2016
 
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
Using AWS to Build a Scalable Big Data Management & Processing Service (BDT40...
 
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
“Lights Out”Configuration using Tivoli Netcool AutoDiscovery Tools
 
07 Advanced RTF Template Techniques.doc
07 Advanced RTF Template Techniques.doc07 Advanced RTF Template Techniques.doc
07 Advanced RTF Template Techniques.doc
 
How to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with SplunkHow to Get IBM i Security and Operational Insights with Splunk
How to Get IBM i Security and Operational Insights with Splunk
 
VSSML18. Data Transformations
VSSML18. Data TransformationsVSSML18. Data Transformations
VSSML18. Data Transformations
 
BSSML17 - Basic Data Transformations
BSSML17 - Basic Data TransformationsBSSML17 - Basic Data Transformations
BSSML17 - Basic Data Transformations
 
Common Data Service – A Business Database!
Common Data Service – A Business Database!Common Data Service – A Business Database!
Common Data Service – A Business Database!
 
Fire-fighting java big data problems
Fire-fighting java big data problemsFire-fighting java big data problems
Fire-fighting java big data problems
 
Azure Stream Analytics : Analyse Data in Motion
Azure Stream Analytics  : Analyse Data in MotionAzure Stream Analytics  : Analyse Data in Motion
Azure Stream Analytics : Analyse Data in Motion
 
Building Custom Big Data Integrations
Building Custom Big Data IntegrationsBuilding Custom Big Data Integrations
Building Custom Big Data Integrations
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?
 
Dynamic data masking sql server 2016
Dynamic data masking sql server 2016Dynamic data masking sql server 2016
Dynamic data masking sql server 2016
 
Data Transformation Patterns in AWS - AWS Online Tech Talks
Data Transformation Patterns in AWS - AWS Online Tech TalksData Transformation Patterns in AWS - AWS Online Tech Talks
Data Transformation Patterns in AWS - AWS Online Tech Talks
 
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...
 

Recently uploaded

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 

Recently uploaded (20)

call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 

CloneTab Advanced DataScrambling.pptx

  • 1.
  • 2. Clonetab ADS – Advanced Data Scrambling Clonetab Appliance Clonetab Ctengine Ctmon Cloneengine Masking Engine Clonetab ADS Data Masking Examples of Sensitive Data Employee Data • Social Security Number • Salary Data • Performance Review Information • Address & Contact Information • Bank Account Info for Direct Deposit Customer Data • Credit Card Number • Bank Account Number Vendor Data • Bank Account Info for Direct Deposit Company Data • Credit Card and Bank Account Info
  • 3. Supported Algorithms • Substitution • Number • Date • Phone Number • Email • SSN-TIN-ZIP • Creditcard-BankAccount • Nulling Out or Deletion Clonetab ADS – Advanced Data Scrambling
  • 4. Data Scrambling in Non-Prod Cloned Environments Production Development Same sensitive data as production after clone • Non-Production environments have meager or low level of Access Control • Redact sensitive data to prevent fraud/theft • Meet statutory & compliance obligations – HIPPA, PCI, SOX etc. • Non-Production data may be shared with outside persons such as non-employees • Production environments have higher security and hence non-production environments are vulnerable to attacks.
  • 5. Modules for Data Scrambling Clonetab Data Scrambling Base Module Data Scrambling for HANA, MS SQL, MYSQL Clonetab Advanced Data Scrambling Module + Referential Integrity Checks In-Memory Advanced Data Scrambling Module (not available yet) Clonetab Data Security Modules
  • 6. Pre-Seeded Algorithms Replaces the existing data with random values from a pre-prepared dataset Pre-Seeded Algorithms Substitution Varies the existing values in a specified range in order to obfuscate them. Example, birth date values could be changed within a range of +/- n days Date Replaces the numeric data with same length Number Simply removes the sensitive data by deleting it. Nulling or Deletion Replaces the existing data with same length and type of data Credit Card or Bank Account Replaces the existing data with same length and type of data SSN-TIN Replaces the existing email with same length and type of data while leaving the special character @ unchanged. eMail Replaces the existing phone numbers with same length and type of data while leaving special characters such as (, ), -, . and so, on Phone Replaces the existing data with some static text irrespective of the algorithms selected Static Text Scrambles the subset of the data depending on the where clause provided by the user. Will be effective for the EIT concepts of Oracle e-Business Suite Subset * The algorithm list may change with new developments in Clonetab
  • 7. Approach Define sensitive column along with integrity constraints (master/child relationships). Attach one of the pre-seeded scrambling Algorithm. Schedule or Run the scrambling job. Subject to licensing terms, may run as standalone or as part of Clone job Steps to setup scrambling Advantages One-time Simple definition by appropriate privilege/role holder Consistently scrambles sensitive data after every clone.
  • 8. Register your Non-Prod instance to be scrambled in the Clonetab’s UI as a target instance with the required information Select Data Column to be scrambled (Schema, Table ) select the pre-seeded algorithm to be used for scrambling. Create the scrambling task as a stand-alone task Optionally monitor the task within Clonetab UI An alert is sent out after completion (or failure) of the task via email The Process When you have license for CTClone & CTSnap, using the appropriate privilege, you may optionally revert the scrambled values to Pre- Scramble snapshot in case you see issues with scrambled data Target Registration Define Scrambling Attributes Create the Task Monitor Scrambling Task Receive Alert CTSnap Option The process followed for Data Scrambling
  • 9. Clonetab Software Multi-Cloud Multi-Database Multi-Tasks • OCI • SAP • AWS • GCP • Oracle • HANA • MySQL • MS-SQL • Scrambling • CTS3 • Virtualization • Automation Clonetab – One Software
  • 10. https://clonetab.com or Email to info@clonetab.com

Editor's Notes

  1. Pool sync frequency can be set as needed depending on RPO needs Application and Database volumes will be synced (with an assumption of CTSnap in use) Storage size provided on primary is what is needed on HA as well In-case of a failure, a complete switch to HA host is performed through UI. (Which includes all instances to be switched
  2. Pool sync frequency can be set as needed depending on RPO needs Application and Database volumes will be synced (with an assumption of CTSnap in use) Storage size provided on primary is what is needed on HA as well In-case of a failure, a complete switch to HA host is performed through UI. (Which includes all instances to be switched
  3. Pool sync frequency can be set as needed depending on RPO needs Application and Database volumes will be synced (with an assumption of CTSnap in use) Storage size provided on primary is what is needed on HA as well In-case of a failure, a complete switch to HA host is performed through UI. (Which includes all instances to be switched
  4. Pool sync frequency can be set as needed depending on RPO needs Application and Database volumes will be synced (with an assumption of CTSnap in use) Storage size provided on primary is what is needed on HA as well In-case of a failure, a complete switch to HA host is performed through UI. (Which includes all instances to be switched
  5. Pool sync frequency can be set as needed depending on RPO needs Application and Database volumes will be synced (with an assumption of CTSnap in use) Storage size provided on primary is what is needed on HA as well In-case of a failure, a complete switch to HA host is performed through UI. (Which includes all instances to be switched
  6. Many vendors do not maintain integrity constraints.