Informatica White Paper: Best Practic...

Informatica White Paper: Best Practices for Dynamic Data Masking

Posted in the Informatica Forum

Informatica-URG

UK

#1 Dec 5, 2011
Over recent years there have been a swathe of regulations created in response to a growing problem: exposure and theft of sensitive and personal information.

These regulations include PCI-DSS, GLBA, BASEL II, the EU Personal Data Protection Directive, and HIPAA. They all require organisations to limit data access based on the user’s business function. However, applying this across the board has always been difficult – especially in environments that include external users and outsourced or part-time employees.

This Informatica White Paper discusses how Dynamic Data Masking provides real-time protection for your organisation’s sensitive data by masking or blocking data access to IT personnel and outsourced teams – while ensuring quick compliance with privacy regulations, full auditing, and alerts about attempted access.

Download the white paper:
http://uk.vip.informatica.com/content/Dynamic...
Informatica-URG

UK

#2 Dec 5, 2011
As well as being the perfect introduction to Dynamic Data Masking, this White Paper also includes a step-by-step guide to Dynamic Data Masking best practices – giving your organisation the knowledge to install, test and deploy an implementation in a matter of days.

By reading this White Paper you will learn how Dynamic Data Masking:

• Compares to other security technologies – such as end-layer and application-layer encryption, storage encryption, tokenisation, and Database Access Management.

• Masks data in real-time based on the end user’s network privileges – ensuring a seamless experience with existing ActiveDirectory, LDAP, and Identity Access Management software.

• Enables IT organisations to give authorised users the appropriate level of data access – without changing a single line of code or the database.

• Applies a flexible set of masking policies in real time – dynamically masking, scrambling, hiding, blocking and auditing data while issuing alerts about unauthorised usage.

• Provides a proactive security layer around popular enterprise business applications – including Siebel, PeopleSoft, SAP, Oracle Apps ERP Suite, Clarify, Cognos, and many others.

Tell me when this thread is updated:

Subscribe Now Add to my Tracker

Add your comments below

Characters left: 4000

Please note by submitting this form you acknowledge that you have read the Terms of Service and the comment you are posting is in compliance with such terms. Be polite. Inappropriate posts may be removed by the moderator. Send us your feedback.

Informatica Discussions

Title Updated Last By Comments
Loading a specific Erwin model version into Met... Apr '16 SCHJA26 1
not recognizing the source file (Jun '08) Mar '16 Jayashree 2
calling informatica powercentre workflow as a s... Mar '16 anil 1
Update Records Feb '16 beginer_informatica 1
First and last rec from flat file to table Feb '16 Nan 1
active and passive t/f Feb '16 Nan 1
Informatica PowerCenter SAML Support Feb '16 Steve 1
More from around the web