You are on page 1of 2

DATASHEET

Informatica Dynamic Data Masking
Kobi Hirsh
Partner Communications, Chief Information Security Officer Informatica Dynamic Data Masking is data masking software that in real time, dynamically masks sensitive information, and blocks, audits, and alerts end users, IT personnel, and outsourced teams who access sensitive information while ensuring quick compliance with privacy regulations.
With organizations collecting more and more sensitive data and with recent publicity about highprofile data losses, organizations are aggressively investing in data privacy and data security technologies to prevent damage to their reputation, minimize unforeseen costs, and limit fines. In fact, in the 2010 U.S. Cost of a Data Breach benchmark study by Ponemon Institute found that the:
• Average cost of a data breach is $7.2 million and $214 per compromised record • Highest percentage of data breaches came from insider negligence at 41%

“Dynamic Data Masking ensures that both IT and business users using applications and tools access personal information on a need-to-know basis.”

benefIts
• Readily comply with data privacy

regulations and internal reporting requirements
• Dramatically decrease the risk of a

data breach
• Protect personal and sensitive

information while supporting offshoring, outsourcing, and cloudenabling initiatives
• Quickly garner ROI with an

Companies and government organizations need to minimize the risk of data breaches and speed compliance with privacy regulations by by de-identifying data and controlling unauthorized access to production environments with comprehensive dynamic data masking software. They require sophisticated, but flexible data obfuscation rules that allow them to apply different kinds of masks to different kinds of data depending upon a user’s authentication level. Informatica® Dynamic Data Masking prevents end users, customers, partners, production support, DBAs, and offshore and outsource workers from accessing sensitive and personal information that is not necessary to perform their job as mandated by various data privacy regulations and directives.

unparalleled fast and easy implementation across all applications, backups, clones, data warehouses, and development and DBA tools
• Save time—no changes to application

source-code or databases are necessary
• Easily customize a database security

solution for each business unit’s regulatory or business requirements
• Increase productivity of offshore and

production-support personnel by giving secured access to production and nonproduction environments

Informatica Dynamic Data Masking transparently de-identifies personal information to production support teams accessing a PeopleSoft HR application, with no changes to source-code or databases.

roles.S.informatica. Informatica.com © 2011 Informatica Corporation. the proxy processes all inbound application requests coming from application screens. When there is a match. or redirect. once they are analyzed or acted on. reporting.S. Key features Policy-Driven Real-time Database security and Monitoring • Apply a multitude of security actions in real time. blocking. and cell access level • Use role-based access control to enforce user access privileges based on Active Directory grouping. Redwood City.385.800.com or call +1 650-385-5000 (1-800-653-3871 in the U. the Informatica logo.informatica. More than 4. and responsibilities . LeaRn MoRe Learn more about the Informatica Platform. criteria can be specified to identify which SQL statements are to be acted upon (rewritten).653. relevant and trustworthy data for their top business imperatives. USA phone: 650. All other company and product names may be trade names or trademarks of their respective owners. and auditing data and issuing alerts about unauthorized usage • Restrict end users and IT personnel based on screen. integrate and trust their information assets held in the traditional enterprise. Organizations around the world gain a competitive advantage in today’s global information economy with timely. they are then sent to the database for prompt execution. dynamically masking.200 enterprises worldwide rely on Informatica to access. hiding. transparently installed between applications and databases. off premise and in the Cloud. column. and development tools. LDAP identity access management.3871 www. 100 Cardinal Way. Worldwide Headquarters.). canned reports. hide. DML. Printed in the U. and integrity of business applications while making no changes to values stored in the database ease of Installation and Configuration • Install and implement quickly to enable securing of complex business applications within days • Scale to support hundreds of databases with a single installation • Accelerate project timelines with predefined data masking rule sets for common business applications • Define data masking policies once and apply them across multiple tables and databases lets you quickly and consistently restrict access across tools. Informatica Dynamic Data Masking software applies one or more actions. consistency. scrambling. Through a simple yet elegant rules engine. All rights reserved. including mask. Visit us at www.5500 toll-free in the US: 1.A. block. scramble. and environments • Support all applications.the Product Informatica Dynamic Data Masking is built on a patented database network in-line proxy. rewrite. applications.5000 fax: 650.385. and The Data Integration Company are trademarks or registered trademarks of Informatica Corporation in the United States and in jurisdictions throughout the world. and development tools running on all versions of Oracle and MS SQL Server. row. CA 94063. Acting as a database listener. First Published: August 2011 1779 (08/08/2011) . about InfoRMatICa Informatica Corporation (NASDAQ: INFA) is the world’s number one independent provider of data integration software. and DCL commands and control ad hoc queries from end users • Produce a detailed audit trail and alerts with segregation of duties • Maintain the functional appearance. table. • Block and inform users when unauthorized usage of general application accounts occurs • Prevent unauthorized DDL.