Highlights • Prevent abuse of sensitive data in non-production environments, enhancing data security for outsourced application development • Useable, realistic data for application developers, trainers and testers without exposing sensitive production data • Assist organizations in meeting regulatory compliance requirements • Avoid common compliance pitfalls and facilitate rapid implementation • Ensure data masking supports organizational business processes for development, testing, quality assurance, training, outsourcing or offshoring Mask sensitive data to protect against privacy breach, ensure regulatory compliance, and improve operational efficiency with industry leading technology and expert guidance from Camouflage Organizations today know the value in protecting their sensitive data. Exposing sensitive information can have severe consequences to the corporate health and image ofthe organization. Therefore, organizations must take a proactive approach in protecting, securing and ultimately preventing an event resulting in potentially brand damaging consequences. Camouflage Enterprise Data Masking disguises copies of production databases to create realistic and fully functional data required for use in nonproduction environments. A comprehensive application used to protect personal and other sensitive information, the solution intuitively handles a wide range of data masking requirements from individual departmental needs through to the complex demands of the enterprise. Coupled with a veteran team of data masking experts and best practice guidance, Camouflage offers a proven and comprehensive approach to securing sensitive data. Users can either mask data in a single database, or across multiple databases and platforms enterprise-wide, all the while ensuring that the newly masked data behaves like the original. Best Practice Guidance from Camouflage The diagram below outlines the four phases of the Camouflage Data Masking Best Practice and highlights the steps involved in implementing a data masking solution. • Minimize risk with industry-specific best practices validated through time tested implementations • Understand the human capital requirements for data masking and the typical duration of the investment Inputs Guidance on automation and repeatability to minimize the requirement foryour time and resources • Outputs • Leverage Camouflage's expertise and leadership in data masking including professional services and online e-Iearning with Camouflage Campus Portal. ./ Data Classification Functional Data System Def inition Security Policies and Procedures Requireme nts DBPoliciesand Procedures Strategies Data Masking Threat M odeling Fit/GapAnalysis Environment Requirements Risk Posture GRC Requirements Training Search Configuratio ns ./ Draft Functional Masking Docum en t .;' Success criteria ,/ Detailed Funct io na l Masking Document ,/ Refin ed Search Con figura tions ,/ Accep table Risk Profile ,/ Solu tion Architecture Create Masking Configurations Develop Customizatio ns QA & Acceptance Planning Change Create Backup / Resto re jobs Create Masking Jobs Con figure Execution Schedule Operat io ns Training & Handover Management Planning ,/ Mas king/Subset Configuratio ns ,/ Dat aMasking Solution Guide ,/ Test Plans ,/ ,/ ,/ ,/ Change Management Process Change Audit Pro cess Solution Docum entation Data M asking COE Discover - Retrieve and analyze sensitive data Individual customer needs for a data masking solution vary widely depending on the size of the organization, complexity of the data, scope of the data masking project, and number of applications and projects involved. The goal ofthe Discover phase isto identify the data thatmust be masked to sufficiently protect the data without compromising data utility. Databases Supported • • • • Oracle® IBM® DB2® Microsoft® SQL Server® SAP® ASE® • MySQL® • Teradata® • DB2® • VSAM • IMS Design - Establish context for discovered data Data discovered during the Discover phase is used to establish criteria for masking the data and develop the Functional Masking Document. Develop - Create data masking configurations Data masking configurations are created based upon customer-specific Functional Masking Requirements defined inthe prior phases. Consideration isgiven to how the data masking configurations will be integrated into the refresh process. Deploy - Integrate data masking in the business process Data masking is transitioned into the refresh process for non-production environments taking the overall business processes into account. This phase entails executing configurations constructed during the Develop Phase - such as creating database subsets and deploying data masking job scheduling scripts. Products Powering the Solution Atthe heart of the Camouflage Data Masking Solution are the robust products thatpower it at every step along the way. Camouflage Discovery Camouflage Discovery's full featured search engine and data analysis tool provides sophisticated pattern based searching that uncovers the type and location of sensitive data. The data classification functionality automatically categorizes discovered data according to classification schemes that best represent your sensitive data and intended uses. Features and Benefits • Eliminate risk of disclosure of sensitive data in testing, training, and development environments • Retain statistical properties, integrity, and realism of the original data • Enterprise-class scalability and collaboration • Broad platform support • Centralized Repository, Sophisticated Search Engine, and Sensitive Data Analysis Reports to provide insight intothe sensitive data landscape with Discovery • Reduce data footprint with Subsetting Camouflage Masking The core of the Camouflage Data Masking Solution isCamouflage Masking which applies sophisticated data transformation techniques to databases containing sensitive data. This results in realistic data thatenables non-production users to meet their objectives without risking exposure of personally identifiable or otherwise sensitive information. Camouflage Subsetting Camouflage Subsetting is designed to create smaller target databases that retain the original database's referential integrity, for use in testing, application development and training environments. Our advanced subsetting engine connects to multiple databases and database types, allowing your organization to create subsets of data from several business lines. Camouflage Database Unity Framework Camouflage Database Unity Framework automatically maintains consistent data relationships across multiple databases, database types, applications, and over time, regardless of the underlying platform or database. Training and Professional Services The best way to ensure an efficient and successful data masking implementation within your organization isto ensure that your team receives guidance and training from the experts. Camouflage Campus Portal is an on-demand e-Iearning environment designed specifically for partners • Maintain application and database integrity and consistency with Database Unity Framework and end users ofCamouflage products. Delivered completely online, Campus Portal offers self-paced training courses, interactive workshops, and progress assessments to help you quickly and affordably gain expertise in Camouflage products and methodologies and maximize your software investment. Camouflage Professional Services provides superior data discovery, classification and masking consulting services, with some of the industry's most experienced professionals. Whether you are looking for consulting to support a software license, or to complete a data masking project purely on a consulting basis, Camouflage has an array of options thatcan be tailored to your organization's unique needs. For more infomation contact Camouflage at info@datamasking.com, 1.866.345.8888 orvisit www.datamasking.com
© Copyright 2024