You are on page 1of 2

D A T A S H E E T

Te PowerCenter Data Masking Option protects sensitive, private information


by masking it in fight to produce realistic-looking data, reducing the risk of
security and compliance breaches.
Protect Sensitive, Private Data
The Informatica PowerCenter Data Masking Option protects sensitive, private information by
masking it in fight to produce de-identifed but realistic-looking data.
This option features multiple data masking techniques and algorithms to ensure randomization
while maintaining the original nature of the data and preserving referential integrity. It also includes
specialized, built-in content and rules for common sensitive felds, such as name, address, Social
Security number, credit card number, and telephone number.
A simple plug-in seamlessly integrates this option into existing PowerCenter environments. Fully
integrated within PowerCenters architecture, these data masking capabilities automatically leverage
the core strengths of PowerCenter, including universal data access, rich transformations, high
performance, and a robust security framework.
Informatica PowerCenter Data Masking Option
Mask Data in Production and Nonproduction Environments
BENEFITS
Lower the risk of data and
compliance breaches
Reduce development costs
Accelerate time to market
With the PowerCenter Data Masking Option, you can assign masking techniques to sensitive data felds.
D A T A S H E E T
Worldwide Headquarters, 100 Cardinal Way, Redwood City, CA 94063, USA
phone: 650.385.5000 fax: 650.385.5500 toll-free in the US: 1.800.653.3871 www.informatica.com
Informatica Offces Around The Globe: Australia Belgium Canada China France Germany Ireland Japan Korea the Netherlands Singapore Switzerland United Kingdom USA
2010 Informatica Corporation. All rights reserved. Printed in the U.S.A. Informatica, the Informatica logo, PowerCenter and The Data Integration Company are trademarks or registered trademarks of Informatica Corporation in the United
States and in jurisdictions throughout the world. All other company and product names may be trade names or trademarks of their respective owners.
6793 (08/30/2010)
Key Features
Powerful Data Masking
Algorithms and Techniques
To mask sensitive felds and produce realistic,
fully functional data, this option uses a variety
of techniques and algorithms:
Nondeterministic randomization. Replace
a sensitive feld with a randomly generated
value subject to various constraints
(e.g., generate a random date between
01/01/1910 and 12/31/2010)
Blurring. Add a random variance to the
original value (e.g., replace a sales amount
with a random value but within a 5 percent
range of the original value)
Repeatable masking. Maintain referential
integrity by generating values that are both
repeatable and unique (e.g., replace the
tax ID number 12-3454165 with 32-
9843454 consistently)
Substitution. Randomly substitute original
values with false but realistic-looking values
(e.g., substitute John Smith with Glen
Carter)
Built-in methods maintain repeatability and
preserve referential integrity across multiple
tables. Fine-grained controls produce
randomized output while also preserving the
original data properties such as width, format,
and range.
Specialized, Built-In Rules and
Content
The Data Masking Option includes
prepackaged rules for special feldssuch as
Social Security, credit card, and telephone
numbersand sample mappings for common
data masking scenarios. These rules are used
to substitute or mask name and address
datafor example, to generate a random
Social Security number that is structurally
correct but not a valid number or to produce a
random credit card number that maintains the
issuer ID and checksum validation rule.
Benefts
Lower the Risk of Data and
Compliance Breaches
IT organizations take extreme measures
to secure private data in production
environments. But often nonproduction
environments, such as development, test, or
training, are overlooked. These environments
require realistic data and are often provided
with a copy of the production data. As a
result, nonproduction environments are an
attractive target to malicious users. This option
reduces the risk of exposing sensitive data
nonproduction environmentsa common risk
when development and testing is outsourced
or offshored. It de-identifes sensitive,
private data and provides fully functional
data for such environments. By leveraging
PowerCenters high security standards, this
option furnishes enterprise-grade security for a
data masking solution.
Reduce Development Costs
Creating de-identifed data in nonproduction
environments isnt an easy taskespecially
when there are large databases with
hundreds of interdependent tables. This
option provides specialized, built-in rules
and content for common data masking
scenarios, which reduce development efforts.
Because this option is seamlessly integrated
within PowerCenter, developers can quickly
come up to speed and also leverage built-in
connectivity, reusability, and transformation
capabilities for building a data masking
solution.
Accelerate Time to Market
Project slippage often occurs when dummy
data is used in the development and test
environments. While use of dummy data
protects privacy, it doesnt accurately refect
the real production data. With this option, IT
teams can create fully functional, production-
like data that retains the original datas
inherent properties, such as format, width, and
range. This ability helps IT teams develop and
deliver successful applications that conform to
specifcations with high fdelity and accuracy,
reducing project risk and accelerating time to
market.
Learn More
Learn more about Informatica PowerCenter
and the entire Informatica Platform. Visit us at
www.informatica.com or call (800) 653-3871.
About Informatica
Informatica Corporation (NASDAQ: INFA) is
the worlds number one independent provider
of data integration software. Organizations
around the world gain a competitive
advantage in todays global information
economy with timely, relevant and trustworthy
data for their top business imperatives. More
than 4,000 enterprises worldwide rely on
Informatica to access, integrate and trust
their information assets held in the traditional
enterprise, off premise and in the cloud.

You might also like