SlideShare a Scribd company logo
1 of 2
Download to read offline
MENTIS Solution Overview
www.mentisoftware.com sales@mentisoftware.com 800.267.0858
INTEGRATED MODULES
• Static & Dynamic Data Masking
• User Access Monitoring
• Audit Workbench
• Continuous Monitoring
• Sensitive Data RetirementTM
DEFENSE IN DEPTH
• Support for both Production &
Non-Production Databases
• Pre-built intelligence and version
support for Oracle EBS and
PeopleSoft Enterprise
• Support for custom applications on
Oracle, SQL Server and DB2
• Support for Servers
Sensitive Data is Everywhere
Databases and application environments are dynamic and complex. The data itself brings business
to life, becoming tangible, usable, shareable -- and open to abuse. Managing sensitive data
privacy and compliance requires pro-active controls to keep up with application changes and the
dynamic regulatory compliance landscape.
The MENTIS Platform™
A single, integrated platform that forms the base for all MENTIS products. The MENTIS Platform™
is licensed for a set of production instance/database environments. The Platform includes the
metadata repository, template building capability, audit history, intelligence reporting and role
based security. This powerful, fully integrated platform provides core functionality for the entire
MENTIS enterprise solution set.
MENTIS iDiscover™
Do you know where all of your sensitive data resides? MENTIS iDiscover-Locations™ provides deep
scanning of your enterprise databases to automate the search for all locations of sensitive data.
iDiscover’s proprietary classification engine uses Sensitive Data Discovery™ to build a business
language taxonomy so all stakeholders can communicate and work toward the same goals,
providing out-of-the-box metadata and security rules to enable rapid compliance with
ever-changing regulations. MENTIS iDiscover-Locations™ is automated and repeatable so you can
run on an ad hoc or a regular schedule to keep up with application and database changes.
Sensitive Data Lifecycle ManagementTM
“Our data masking project has
been a complete success. The
MENTIS software has met our
requirements and their people
are highly qualified and a
pleasure to work with. I highly
recommend MENTIS for data
masking or any other enterprise
needs related to protecting
sensitive data.”
Rajesh Kolluri
Director
Primatics Financial
www.mentisoftware.com
A valuable compliance and pre-production step, iDiscover-Code™: determines if a piece of code
could inappropriately expose users to sensitive data; classifies all data affected by the code so it
can be compared to both the legislative and the compliance requirements; reviews source code
automatically in all application access objects; provides templates that compliance can
customize to any law applicable to your organization; and works with both old and new code,
creating a comprehensive digital library of your source code.
Equally powerful, iDiscover-User™ includes user discovery capabilities that report who, what and
how users have access to sensitive data at the database and application levels. This includes the
ability to develop complex rules for real time detection and analysis of user conflicts to ensure
Segregation of Duties (SOD) is maintained.
MENTIS iMask™
What are the appropriate levels of access to sensitive data for each user in your organization,
according to their job role and responsibilities? MENTIS provides data masking for both
production and non-production database environments to prevent accidental or malicious data
breach events. In production environments MENTIS iMask™ prevents authorized users from seeing
sensitive data by dynamically masking data elements that fall outside of their roles and
privileges.
MENTIS iScramble™
MENTIS iScramble™ provides static data masking capabilities for non-production databases that fit
directly into your database cloning operations. Best of all, MENTIS data masking maintains
application integrity, preserving functionality for end users, testers and developers alike so they
can get their jobs while eliminating risk of sensitive data exposures.
MENTIS iMonitor™
Monitoring authorized and unauthorized access to databases is an important part of your security
and compliance strategy. MENTIS iMonitor™ allows privileged user access to sensitive data so you
can establish baseline behaviors for users and respond to actionable alerts such as intrusion
detection. In real-time, iMonitor™ logs accesses to sensitive data without putting unnecessary
overhead on your environments. With MENTIS monitoring and intrusion prevention you can
detect, prevent and manage unauthorized user access across production and non-production
environments. MENTIS iMonitor™ can help you authorize users, programs and devices and assign
authorized levels of access all from a single administrative console.
MENTIS iProtect™
MENTIS iProtect™ provides powerful, easy to use and complete access control for your production
environment. Unauthorized users are prevented from accessing sensitive data. This capability
allows you to be in full compliance with regulatory requirements and - equally important -
prevent fraudulent activity.
MENTIS iSubset™
MENTIS iSubset™ allows you to rapidly create database extracts and intelligent data subsets to
support application testing, developement, and QA. With iSubset™, IT can create fully
functional, intelligent database extracts of the production database in a fast and simple manner,
keeping infrastructure costs down, improving data integrity, and reducing the risk of data breach.
MENTIS iRetire™
The industry’s first data retirement software, MENTIS iRetire™ allows IT organizations to
de-identify and tokenize aged, inactive data with a production environment to ensure compliance
and reduce risk. With data retirement policies based on the specific parameters and retention
policies of the organization. MENTIS iRetire™ allows for sensitive data to be retired while the
valuable market, demographic and operational data associated with the retired data remains
intact and usable by the system of origin. Additionally, the retired data can be reinstated or
permanently removed as deemed necessary.
About MENTIS
MENTIS provides comprehensive Sensitive Information Management™ to discover, protect and
manage sensitive data in enterprise databases and applications.
MENTIS Sensitive Data Discovery™ and classification engine provides an automated and repeatable
approach to locate sensitive data and reduce the risk of unintended exposures across production
and non-production databases. MENTIS lowers the cost of compliance, protects against data
breaches with integrated monitoring, masking and auditing capabilities.
BY THE NUMBERS
INSIDER THREAT
% of all breaches that are attributed to
those already inside your network
SENSITIVE DATA
% of Sensitive Data locations that are
typically in undocu mented places
BREACH COST
$$ cost of breach per record
in the United States
Sources: Ponemon Institute True Cost of Compliance Study
(2013),Cost of a Data Breach Report (2013)
ACCOLADES & AWARDS
• “Challenger” in the data masking magic
quadrant (2014)
• “Challenger” in the data masking magic
quadrant (2013)
• “Visionary” in the data masking magic
quadrant (2012)
• “Top 10 Security Company ” (2011)
– Silicon India
• “Cool Vendor in Risk & Compliance” –
Leading Analyst Firm
• “Security Industry Leader”
– Standard & Poor’s
• “Rising Star in Corporate Governance” –
Yale University, Millstein Center
sales@mentisoftware.com3 Columbus Circle, 15th Floor
New York , NY 10019
800.267.0858
INSIDER THREAT

More Related Content

What's hot

Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general attSHIVA101531
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introductionyuliana_mar
 
SecureWorks
SecureWorksSecureWorks
SecureWorksjduhaime
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentationtsteh
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)Peter Tutty
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...ashoksankar
 
Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Marketing Team
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full pptShahbaz Khan
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Kal BO
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recoverySameeu Imad
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Marketing Team
 

What's hot (20)

Brochure Imperva Vormetric
Brochure Imperva VormetricBrochure Imperva Vormetric
Brochure Imperva Vormetric
 
Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity Turtles, Trust and The Future of Cybersecurity
Turtles, Trust and The Future of Cybersecurity
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
SecureWorks
SecureWorksSecureWorks
SecureWorks
 
Data Security
Data SecurityData Security
Data Security
 
Axxera ci siem
Axxera ci siemAxxera ci siem
Axxera ci siem
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
Secure access to sensitive data on mobile devices - AFCEA Mobile Symposium 20...
 
Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365Een praktische aanpak naar GDPR met Microsoft 365
Een praktische aanpak naar GDPR met Microsoft 365
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12Risk based it auditing for non it auditors (basics of it auditing) final 12
Risk based it auditing for non it auditors (basics of it auditing) final 12
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
Data Security
Data SecurityData Security
Data Security
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018Awingu deck for eurosys gdpr march 2018
Awingu deck for eurosys gdpr march 2018
 

Viewers also liked

Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningAxis Technology, LLC
 
Data masking - addressing PII exposure risks in the cloud
Data masking - addressing PII exposure risks in the cloud Data masking - addressing PII exposure risks in the cloud
Data masking - addressing PII exposure risks in the cloud Virginia Mushkatblat
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Axis Technology, LLC
 
Dynamic Data Masking - Breakthrough Innovation in Application Security
Dynamic Data Masking - Breakthrough Innovation in Application SecurityDynamic Data Masking - Breakthrough Innovation in Application Security
Dynamic Data Masking - Breakthrough Innovation in Application SecurityDobler Consulting
 
DMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewDMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewAxis Technology, LLC
 

Viewers also liked (6)

Regulatory & Compliance Account Opening
Regulatory & Compliance Account OpeningRegulatory & Compliance Account Opening
Regulatory & Compliance Account Opening
 
Data masking - addressing PII exposure risks in the cloud
Data masking - addressing PII exposure risks in the cloud Data masking - addressing PII exposure risks in the cloud
Data masking - addressing PII exposure risks in the cloud
 
Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure Sensitive Data Assessment Brochure
Sensitive Data Assessment Brochure
 
Sensitive Data Assesment
Sensitive Data AssesmentSensitive Data Assesment
Sensitive Data Assesment
 
Dynamic Data Masking - Breakthrough Innovation in Application Security
Dynamic Data Masking - Breakthrough Innovation in Application SecurityDynamic Data Masking - Breakthrough Innovation in Application Security
Dynamic Data Masking - Breakthrough Innovation in Application Security
 
DMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewDMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking Overview
 

Similar to 2015 AUG 24-Overview Version #2

2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft SolutionHarriet Schneider
 
Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Jeff Hunter
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetDevaraj Sl
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqriteseo
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDMGreg Cranley
 
Sumo Logic IT Operations Solutions Brief
Sumo Logic IT Operations Solutions BriefSumo Logic IT Operations Solutions Brief
Sumo Logic IT Operations Solutions BriefManish Kalra
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile securityJ Hartig
 
Real callenges in big data security
Real callenges in big data securityReal callenges in big data security
Real callenges in big data securitybalasahebcomp
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 

Similar to 2015 AUG 24-Overview Version #2 (20)

2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution2015 AUG 24-PeopleSoft Solution
2015 AUG 24-PeopleSoft Solution
 
Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection Foxtrot Division Capabilities Collection
Foxtrot Division Capabilities Collection
 
Dstca
DstcaDstca
Dstca
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheet
 
Accelerite Sentient Executive Briefing
Accelerite Sentient Executive BriefingAccelerite Sentient Executive Briefing
Accelerite Sentient Executive Briefing
 
seqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdfseqrite-hawkkeye-datasheet.pdf
seqrite-hawkkeye-datasheet.pdf
 
Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Data Fabrics.pptx
Data Fabrics.pptxData Fabrics.pptx
Data Fabrics.pptx
 
Digital Guardian and CDM
Digital Guardian and CDMDigital Guardian and CDM
Digital Guardian and CDM
 
Sumo Logic IT Operations Solutions Brief
Sumo Logic IT Operations Solutions BriefSumo Logic IT Operations Solutions Brief
Sumo Logic IT Operations Solutions Brief
 
Atea erfa microsoft mobile security
Atea erfa microsoft mobile securityAtea erfa microsoft mobile security
Atea erfa microsoft mobile security
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
Microstrategy Mobile
Microstrategy MobileMicrostrategy Mobile
Microstrategy Mobile
 
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
Real callenges in big data security
Real callenges in big data securityReal callenges in big data security
Real callenges in big data security
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 

2015 AUG 24-Overview Version #2

  • 1. MENTIS Solution Overview www.mentisoftware.com sales@mentisoftware.com 800.267.0858 INTEGRATED MODULES • Static & Dynamic Data Masking • User Access Monitoring • Audit Workbench • Continuous Monitoring • Sensitive Data RetirementTM DEFENSE IN DEPTH • Support for both Production & Non-Production Databases • Pre-built intelligence and version support for Oracle EBS and PeopleSoft Enterprise • Support for custom applications on Oracle, SQL Server and DB2 • Support for Servers Sensitive Data is Everywhere Databases and application environments are dynamic and complex. The data itself brings business to life, becoming tangible, usable, shareable -- and open to abuse. Managing sensitive data privacy and compliance requires pro-active controls to keep up with application changes and the dynamic regulatory compliance landscape. The MENTIS Platform™ A single, integrated platform that forms the base for all MENTIS products. The MENTIS Platform™ is licensed for a set of production instance/database environments. The Platform includes the metadata repository, template building capability, audit history, intelligence reporting and role based security. This powerful, fully integrated platform provides core functionality for the entire MENTIS enterprise solution set. MENTIS iDiscover™ Do you know where all of your sensitive data resides? MENTIS iDiscover-Locations™ provides deep scanning of your enterprise databases to automate the search for all locations of sensitive data. iDiscover’s proprietary classification engine uses Sensitive Data Discovery™ to build a business language taxonomy so all stakeholders can communicate and work toward the same goals, providing out-of-the-box metadata and security rules to enable rapid compliance with ever-changing regulations. MENTIS iDiscover-Locations™ is automated and repeatable so you can run on an ad hoc or a regular schedule to keep up with application and database changes. Sensitive Data Lifecycle ManagementTM “Our data masking project has been a complete success. The MENTIS software has met our requirements and their people are highly qualified and a pleasure to work with. I highly recommend MENTIS for data masking or any other enterprise needs related to protecting sensitive data.” Rajesh Kolluri Director Primatics Financial
  • 2. www.mentisoftware.com A valuable compliance and pre-production step, iDiscover-Code™: determines if a piece of code could inappropriately expose users to sensitive data; classifies all data affected by the code so it can be compared to both the legislative and the compliance requirements; reviews source code automatically in all application access objects; provides templates that compliance can customize to any law applicable to your organization; and works with both old and new code, creating a comprehensive digital library of your source code. Equally powerful, iDiscover-User™ includes user discovery capabilities that report who, what and how users have access to sensitive data at the database and application levels. This includes the ability to develop complex rules for real time detection and analysis of user conflicts to ensure Segregation of Duties (SOD) is maintained. MENTIS iMask™ What are the appropriate levels of access to sensitive data for each user in your organization, according to their job role and responsibilities? MENTIS provides data masking for both production and non-production database environments to prevent accidental or malicious data breach events. In production environments MENTIS iMask™ prevents authorized users from seeing sensitive data by dynamically masking data elements that fall outside of their roles and privileges. MENTIS iScramble™ MENTIS iScramble™ provides static data masking capabilities for non-production databases that fit directly into your database cloning operations. Best of all, MENTIS data masking maintains application integrity, preserving functionality for end users, testers and developers alike so they can get their jobs while eliminating risk of sensitive data exposures. MENTIS iMonitor™ Monitoring authorized and unauthorized access to databases is an important part of your security and compliance strategy. MENTIS iMonitor™ allows privileged user access to sensitive data so you can establish baseline behaviors for users and respond to actionable alerts such as intrusion detection. In real-time, iMonitor™ logs accesses to sensitive data without putting unnecessary overhead on your environments. With MENTIS monitoring and intrusion prevention you can detect, prevent and manage unauthorized user access across production and non-production environments. MENTIS iMonitor™ can help you authorize users, programs and devices and assign authorized levels of access all from a single administrative console. MENTIS iProtect™ MENTIS iProtect™ provides powerful, easy to use and complete access control for your production environment. Unauthorized users are prevented from accessing sensitive data. This capability allows you to be in full compliance with regulatory requirements and - equally important - prevent fraudulent activity. MENTIS iSubset™ MENTIS iSubset™ allows you to rapidly create database extracts and intelligent data subsets to support application testing, developement, and QA. With iSubset™, IT can create fully functional, intelligent database extracts of the production database in a fast and simple manner, keeping infrastructure costs down, improving data integrity, and reducing the risk of data breach. MENTIS iRetire™ The industry’s first data retirement software, MENTIS iRetire™ allows IT organizations to de-identify and tokenize aged, inactive data with a production environment to ensure compliance and reduce risk. With data retirement policies based on the specific parameters and retention policies of the organization. MENTIS iRetire™ allows for sensitive data to be retired while the valuable market, demographic and operational data associated with the retired data remains intact and usable by the system of origin. Additionally, the retired data can be reinstated or permanently removed as deemed necessary. About MENTIS MENTIS provides comprehensive Sensitive Information Management™ to discover, protect and manage sensitive data in enterprise databases and applications. MENTIS Sensitive Data Discovery™ and classification engine provides an automated and repeatable approach to locate sensitive data and reduce the risk of unintended exposures across production and non-production databases. MENTIS lowers the cost of compliance, protects against data breaches with integrated monitoring, masking and auditing capabilities. BY THE NUMBERS INSIDER THREAT % of all breaches that are attributed to those already inside your network SENSITIVE DATA % of Sensitive Data locations that are typically in undocu mented places BREACH COST $$ cost of breach per record in the United States Sources: Ponemon Institute True Cost of Compliance Study (2013),Cost of a Data Breach Report (2013) ACCOLADES & AWARDS • “Challenger” in the data masking magic quadrant (2014) • “Challenger” in the data masking magic quadrant (2013) • “Visionary” in the data masking magic quadrant (2012) • “Top 10 Security Company ” (2011) – Silicon India • “Cool Vendor in Risk & Compliance” – Leading Analyst Firm • “Security Industry Leader” – Standard & Poor’s • “Rising Star in Corporate Governance” – Yale University, Millstein Center sales@mentisoftware.com3 Columbus Circle, 15th Floor New York , NY 10019 800.267.0858 INSIDER THREAT