SlideShare a Scribd company logo
1 of 2
Download to read offline
SOLIX EDMS DATA MASKING
                                                                       John Huges
                                                                       #440, Ridge Dr
                                                                       A/C # 0012380
                                                                       SSN 550-55-5500




                                                                                                                   John Doe
 Secure Non-Production Database with Solix EDMS Data Masking:                                                      #XXX, *%#@e
                                                                                                                   A/C %XX*XX%
 Obfuscate Sensitive Data for Application Testing                                                                  SSN XXX-XX-XXXX

Privacy Needs Active Protection
                                                                                                  Features
Ensuring data privacy is the law in many regulated industries; however protecting sensitive
                                                                                                  Pre-Configured Masking
data is good business practice. Breach of confidential customer, financial and employee
data can lead to significant financial, legal and reputational losses. While data protection      Ships with pre-configured algorithms
is strongly enforced in production systems, the same rigor is often not applied to non-           to ensure data privacy for popular
production test and development environments. The approach to build in-house a limited            pre-package application modules like
set of masking algorithms and have it executed by teams who have limited understanding            PeopleSoft HCM that contain highly
of the application have led to serious vulnerability and occassional breach of sensitive data.    sensitive data.

                            Information Lifecycle Management                                      Obfuscates actual data
                                                                                                  Data obfuscation ensures test and
                                Database                 Application
                                Archiving                Retirement                               development users are unable to
                                                                                                  determine the actual or original values
                                                                                                  through one-way data scrambling,
                                               Data                                               masking     and/or    random       data
                                            Governance                                            generation.

                                                                                                  Supports Encryption & Decryption
                                Test Data                   Data                                  The ability to support encryption/
                               Management                  Masking                                decryption is important when the
                                                                                                  application requires dynamic data
                                      Application Testing                                         masking.

Solix EDMS Data Masking                                                                           Maintains Transaction Relational
                                                                                                  Integrity
Solix EDMS Data Masking, a key module of the Solix Enterprise Data Management Suite
                                                                                                  When sensitive data is a Primary/Foreign
(EDMS), combined with Solix EDMS knowledgebase for the specific application, effectively
                                                                                                  Key or maintains a columnar reference,
scrambles, encrypts, or masks sensitive data in the test databases while ensuring data
                                                                                                  transactional relational integrity is
format remains valid for testing purposes. The Solix EDMS pre-packages specific algorithms
                                                                                                  required.
to handle the formats required for creating a valid environment for application testing while
ensuring obfuscation of personal identifiable information (PII).                                  Easy to use and set up policies
Enterprise System Testing Challenges                                                              Through a separate policy manager,
                                                                                                  those who define the policies are
A typical enterprise runs multiple applications sometimes on different databases. Sensitive
                                                                                                  different than those who execute them,
data, such as salaries, need to be masked in a consistent manner across all these applications.
                                                                                                  ensuring segregation of duties.
Furthermore, different sets of sensitive data (SSN versus credit card number versus salary)
require different treatments of obfuscation. Business users also demand rapid testing. These
different objectives have to satisfy the overarching criterion of integrity for application
testing and needs to be tied together with key elements of SDLC.




                                                                                                             © SOLIX TECHNOLOGIES, INC.
SOLIX EDMS DATA MASKING

                     Production Database                                                                           Test Database

                       Private Data                                                                                Private ###


             Customer       Credit Card                                       Mary 23456           Customer           Credit Card
             Jane Moore     4145 1230 0000 6012               Shuffling
                                                                                                   #$%^               4531 0000 %$#! 6012

             Name           Phone                                                                  Customer           Phone
                                                               Masking       xxx999999999
             Joe            555 2320                                                               XXX                999-999-9999

             Name           Address                                         Mfdy64528798           Customer           Address
                                                           Substitution
             Davie          32 Elm St                                                              Mary               65 FrEds

             Name           SSN                                                                    Customer           SSN
                                                  Encryption/Decryption   @#%fah^&*AS%^345
             Sue            654599876                                                              Jane Moore         @#%-&*-1111

             Name           Zip Code                                       ################        Customer           Employer
                                                                Nulling
             Mary           26453                                                                  #####              #########

             Name           CCN                                                 Custom             Customer           CCN
                                                               Custom
             Mary           555526453…                                      Custom Algorithm       .............      ..................



Solix EDMS has been architected to support multiple applications running on heterogeneous
                                                                                                 Supported Applications
databases from single server install. Solix EDMS Data Masking can be implemented to support
                                                                                                   •	 Oracle E-Business Suite
consistent masking rules across these multiple applications. Solix EDMS Data Masking also
                                                                                                   •	 PeopleSoft
provides a rich library of masking and encryption algorithms to satisfy the Chief Information
                                                                                                   •	 JD Edwards
Security Officer’s mandate to treat different data values with appropriate obfuscation rules.
                                                                                                   •	 Siebel
In combination with Solix EDMS Test Data Management, Solix EDMS Data Masking delivers
secure subsets in a rapid manner meeting business users’ demands for timely application            •	 BaaN
testing. The most important criterion of integrity for application testing is met through the      •	 DataWarehouse
meta-data repository with application specific knowledgebases that’s either pre-packaged for       •	 Custom Applications
defined ERP’s / CRM’s or can be built through an auto population tool for other ISV or custom
applications.                                                                                    Supported Databases
                                                                                                   •	 Oracle
Benefits                                                                                           •	 IBM DB2
 •	 Solix EDMS incorporates storage replication, application cloning, and other integral steps     •	 Microsoft SQL Server
    in the SDLC process into the masking solution.                                                 •	 MySQL
 •	 Solix EDMS builds policies based on business testing requirements and compliance               •	 Informix
    needs.                                                                                         •	 Other RDBMS with JDBC driver
 •	 Solix EDMS provides complete library of functions that meets all test use cases.                  support
 •	 Solix EDMS provides application awareness
 •	 Solix EDMS allows business to define obfuscation rules in their terms; execution is done     Supported Operating Systems
    by IT (removes “Fox/ Henhouse“ syndrome)                                                      •	   HP-UX
                                                                                                  •	   IBM AIX
About SOLIX Technologies
                                                                                                  •	   IBM z/OS
SOLIX Technologies, Inc., a leading provider of Enterprise Data Management solutions, helps       •	   IBM i5/OS (OS/400)
businesses to improve application performance, reduce storage costs, meet compliance and          •	   Oracle Solaris
data privacy requirements by achieving Information Lifecycle Management (ILM) goals and Data      •	   Linux
Governance strategies. Solix Enterprise Data Management Suite (Solix EDMS) software enables       •	   Microsoft Windows
organizations to implement Database Archiving, Test Data Management (Data Subsetting),
Data Masking and Application Retirement across all enterprise data. Solix ExAPPS Appliance
is an integrated set of Server, Storage and Software Components for Application Retirement
all bundled into a single device. SOLIX has an extensive global client base, including Fortune
500 companies, and is widely considered the standard for enterprise data management. SOLIX
Technologies is headquartered in Santa Clara, California and has an established worldwide
channel program of value added resellers (VARs) and systems integrators.

    SOLIX TECHNOLOGIES, 4500 GREAT AMERICA PKWY, STE.120, SANTA CLARA, CA 95054                        +1.888.GO.SOLIX | WWW.SOLIX.COM

More Related Content

What's hot

Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! EMC
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcarePeter de Bruijn
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataEMC
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data DiscoveryCarahsoft
 
Cloud Security Alliance Q2-2012 Atlanta Meeting
Cloud Security Alliance Q2-2012 Atlanta MeetingCloud Security Alliance Q2-2012 Atlanta Meeting
Cloud Security Alliance Q2-2012 Atlanta MeetingTaylor Banks
 
NHIN Privacy & Security
NHIN Privacy & SecurityNHIN Privacy & Security
NHIN Privacy & SecurityBrian Ahier
 
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
ISACA Los Angeles  2010   Compliance - Ulf MattssonISACA Los Angeles  2010   Compliance - Ulf Mattsson
ISACA Los Angeles 2010 Compliance - Ulf MattssonUlf Mattsson
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...DFLABS SRL
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityAccenture
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFLABS SRL
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution DatasheetMicrosoft Private Cloud
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)Peter Tutty
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsThe Lorenzi Group
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introductionerry wardhana
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Datacard
 

What's hot (20)

Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore! Your Data Center Boundaries Don’t Exist Anymore!
Your Data Center Boundaries Don’t Exist Anymore!
 
Stealth solution for healthcare
Stealth solution for healthcareStealth solution for healthcare
Stealth solution for healthcare
 
Regulatory Compliance Financial Institution
Regulatory Compliance Financial InstitutionRegulatory Compliance Financial Institution
Regulatory Compliance Financial Institution
 
New Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud DataNew Approaches to Security and Availability for Cloud Data
New Approaches to Security and Availability for Cloud Data
 
Electronic Data Discovery
Electronic Data DiscoveryElectronic Data Discovery
Electronic Data Discovery
 
Oracle a TBIZ2011
Oracle a TBIZ2011Oracle a TBIZ2011
Oracle a TBIZ2011
 
Cloud Security Alliance Q2-2012 Atlanta Meeting
Cloud Security Alliance Q2-2012 Atlanta MeetingCloud Security Alliance Q2-2012 Atlanta Meeting
Cloud Security Alliance Q2-2012 Atlanta Meeting
 
NHIN Privacy & Security
NHIN Privacy & SecurityNHIN Privacy & Security
NHIN Privacy & Security
 
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
ISACA Los Angeles  2010   Compliance - Ulf MattssonISACA Los Angeles  2010   Compliance - Ulf Mattsson
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
Using the IncMan Suite to Manage the Reporting of Cyber Security Risks and In...
 
Perspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_securityPerspec sys knowledge_series__solving_privacy_residency_and_security
Perspec sys knowledge_series__solving_privacy_residency_and_security
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013DFlabs corporate profile 01-2013
DFlabs corporate profile 01-2013
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
ROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital EnviromentsROAR Provides Peace of Mind in Digital Enviroments
ROAR Provides Peace of Mind in Digital Enviroments
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introduction
 
Entrust Physical & Logical Access Solutions
Entrust Physical & Logical Access SolutionsEntrust Physical & Logical Access Solutions
Entrust Physical & Logical Access Solutions
 

Similar to Solix EDMS Data Masking

Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive OverviewKim Jensen
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
DMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewDMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewAxis Technology, LLC
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...Ulf Mattsson
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rulesVormetric Inc
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and complianceFITSFSd
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1Khazret Sapenov
 
Article data-centric security key to cloud and digital business
Article   data-centric security key to cloud and digital businessArticle   data-centric security key to cloud and digital business
Article data-centric security key to cloud and digital businessUlf Mattsson
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital businessUlf Mattsson
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft SolutionHarriet Schneider
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf MattssonUlf Mattsson
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operationsCisco Public Relations
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data securityUlf Mattsson
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerJerome J. Penna
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 

Similar to Solix EDMS Data Masking (20)

Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS2015 AUG 24-Oracle EBS
2015 AUG 24-Oracle EBS
 
DLP Executive Overview
DLP Executive OverviewDLP Executive Overview
DLP Executive Overview
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
DMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewDMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking Overview
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rules
 
Oracle database 12c security and compliance
Oracle database 12c security and complianceOracle database 12c security and compliance
Oracle database 12c security and compliance
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Brave new world of encryption v1
Brave new world of encryption v1Brave new world of encryption v1
Brave new world of encryption v1
 
Article data-centric security key to cloud and digital business
Article   data-centric security key to cloud and digital businessArticle   data-centric security key to cloud and digital business
Article data-centric security key to cloud and digital business
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
 
2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Atlanta ISSA  2010 Enterprise Data Protection   Ulf MattssonAtlanta ISSA  2010 Enterprise Data Protection   Ulf Mattsson
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
 
Cisco tec chris young - security intelligence operations
Cisco tec   chris young - security intelligence operationsCisco tec   chris young - security intelligence operations
Cisco tec chris young - security intelligence operations
 
ISSA: Cloud data security
ISSA: Cloud data securityISSA: Cloud data security
ISSA: Cloud data security
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
Choosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL ServerChoosing Encryption for Microsoft SQL Server
Choosing Encryption for Microsoft SQL Server
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 

More from Solix Technologies, Inc.

More from Solix Technologies, Inc. (7)

Solix collaborate 11
Solix collaborate 11Solix collaborate 11
Solix collaborate 11
 
Solix technologies unveils solix enterprise data management suite 5.0
Solix technologies unveils solix enterprise data management suite 5.0Solix technologies unveils solix enterprise data management suite 5.0
Solix technologies unveils solix enterprise data management suite 5.0
 
Application retirement a ci os perspective
Application retirement   a ci os perspectiveApplication retirement   a ci os perspective
Application retirement a ci os perspective
 
Upcoming Webinar: Data Management Challenges for Govt Applications
Upcoming Webinar: Data Management Challenges for Govt ApplicationsUpcoming Webinar: Data Management Challenges for Govt Applications
Upcoming Webinar: Data Management Challenges for Govt Applications
 
Solix ExAPPS
Solix ExAPPSSolix ExAPPS
Solix ExAPPS
 
Solix EDMS Data Masking
Solix EDMS Data MaskingSolix EDMS Data Masking
Solix EDMS Data Masking
 
Solix edms application retirement
Solix edms application retirementSolix edms application retirement
Solix edms application retirement
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Solix EDMS Data Masking

  • 1. SOLIX EDMS DATA MASKING John Huges #440, Ridge Dr A/C # 0012380 SSN 550-55-5500 John Doe Secure Non-Production Database with Solix EDMS Data Masking: #XXX, *%#@e A/C %XX*XX% Obfuscate Sensitive Data for Application Testing SSN XXX-XX-XXXX Privacy Needs Active Protection Features Ensuring data privacy is the law in many regulated industries; however protecting sensitive Pre-Configured Masking data is good business practice. Breach of confidential customer, financial and employee data can lead to significant financial, legal and reputational losses. While data protection Ships with pre-configured algorithms is strongly enforced in production systems, the same rigor is often not applied to non- to ensure data privacy for popular production test and development environments. The approach to build in-house a limited pre-package application modules like set of masking algorithms and have it executed by teams who have limited understanding PeopleSoft HCM that contain highly of the application have led to serious vulnerability and occassional breach of sensitive data. sensitive data. Information Lifecycle Management Obfuscates actual data Data obfuscation ensures test and Database Application Archiving Retirement development users are unable to determine the actual or original values through one-way data scrambling, Data masking and/or random data Governance generation. Supports Encryption & Decryption Test Data Data The ability to support encryption/ Management Masking decryption is important when the application requires dynamic data Application Testing masking. Solix EDMS Data Masking Maintains Transaction Relational Integrity Solix EDMS Data Masking, a key module of the Solix Enterprise Data Management Suite When sensitive data is a Primary/Foreign (EDMS), combined with Solix EDMS knowledgebase for the specific application, effectively Key or maintains a columnar reference, scrambles, encrypts, or masks sensitive data in the test databases while ensuring data transactional relational integrity is format remains valid for testing purposes. The Solix EDMS pre-packages specific algorithms required. to handle the formats required for creating a valid environment for application testing while ensuring obfuscation of personal identifiable information (PII). Easy to use and set up policies Enterprise System Testing Challenges Through a separate policy manager, those who define the policies are A typical enterprise runs multiple applications sometimes on different databases. Sensitive different than those who execute them, data, such as salaries, need to be masked in a consistent manner across all these applications. ensuring segregation of duties. Furthermore, different sets of sensitive data (SSN versus credit card number versus salary) require different treatments of obfuscation. Business users also demand rapid testing. These different objectives have to satisfy the overarching criterion of integrity for application testing and needs to be tied together with key elements of SDLC. © SOLIX TECHNOLOGIES, INC.
  • 2. SOLIX EDMS DATA MASKING Production Database Test Database Private Data Private ### Customer Credit Card Mary 23456 Customer Credit Card Jane Moore 4145 1230 0000 6012 Shuffling #$%^ 4531 0000 %$#! 6012 Name Phone Customer Phone Masking xxx999999999 Joe 555 2320 XXX 999-999-9999 Name Address Mfdy64528798 Customer Address Substitution Davie 32 Elm St Mary 65 FrEds Name SSN Customer SSN Encryption/Decryption @#%fah^&*AS%^345 Sue 654599876 Jane Moore @#%-&*-1111 Name Zip Code ################ Customer Employer Nulling Mary 26453 ##### ######### Name CCN Custom Customer CCN Custom Mary 555526453… Custom Algorithm ............. .................. Solix EDMS has been architected to support multiple applications running on heterogeneous Supported Applications databases from single server install. Solix EDMS Data Masking can be implemented to support • Oracle E-Business Suite consistent masking rules across these multiple applications. Solix EDMS Data Masking also • PeopleSoft provides a rich library of masking and encryption algorithms to satisfy the Chief Information • JD Edwards Security Officer’s mandate to treat different data values with appropriate obfuscation rules. • Siebel In combination with Solix EDMS Test Data Management, Solix EDMS Data Masking delivers secure subsets in a rapid manner meeting business users’ demands for timely application • BaaN testing. The most important criterion of integrity for application testing is met through the • DataWarehouse meta-data repository with application specific knowledgebases that’s either pre-packaged for • Custom Applications defined ERP’s / CRM’s or can be built through an auto population tool for other ISV or custom applications. Supported Databases • Oracle Benefits • IBM DB2 • Solix EDMS incorporates storage replication, application cloning, and other integral steps • Microsoft SQL Server in the SDLC process into the masking solution. • MySQL • Solix EDMS builds policies based on business testing requirements and compliance • Informix needs. • Other RDBMS with JDBC driver • Solix EDMS provides complete library of functions that meets all test use cases. support • Solix EDMS provides application awareness • Solix EDMS allows business to define obfuscation rules in their terms; execution is done Supported Operating Systems by IT (removes “Fox/ Henhouse“ syndrome) • HP-UX • IBM AIX About SOLIX Technologies • IBM z/OS SOLIX Technologies, Inc., a leading provider of Enterprise Data Management solutions, helps • IBM i5/OS (OS/400) businesses to improve application performance, reduce storage costs, meet compliance and • Oracle Solaris data privacy requirements by achieving Information Lifecycle Management (ILM) goals and Data • Linux Governance strategies. Solix Enterprise Data Management Suite (Solix EDMS) software enables • Microsoft Windows organizations to implement Database Archiving, Test Data Management (Data Subsetting), Data Masking and Application Retirement across all enterprise data. Solix ExAPPS Appliance is an integrated set of Server, Storage and Software Components for Application Retirement all bundled into a single device. SOLIX has an extensive global client base, including Fortune 500 companies, and is widely considered the standard for enterprise data management. SOLIX Technologies is headquartered in Santa Clara, California and has an established worldwide channel program of value added resellers (VARs) and systems integrators. SOLIX TECHNOLOGIES, 4500 GREAT AMERICA PKWY, STE.120, SANTA CLARA, CA 95054 +1.888.GO.SOLIX | WWW.SOLIX.COM