FEATURES

Database masking

Database masking is the technology that discovers sensitive data, creates a mask, and applies the mask to obfuscate sensitive data. It is useful to ensure data security and comply with security regulations like GDPR, HIPAA, etc.
 
Windocks Data Orchestration offers a built-in database masking capability and also integrates with third-party database masking offerings.
 
Let's chat!
data-masking-banner2

Masking functionality

  • Mask ordering is automated, and each row masked only once, for high performance. Many masking solutions require manual ordering of masking rules, where Windocks automates the order of masking, and ensures that each row is masked only once, ensuring highest possible performance.
  • Partial masking can preserve statistical data - Windocks simplifies the masking of credit card numbers, for example, ensuring that the distribution of credit cards is maintained between Visa, American Express, and others.
  • Automated referential integrity - Foreign key and user defined dependencies are both supported automatically. Even where dependencies are not defined, Windocks deterministic masking ensures that the same masked values will be delivered for each source value, preserving referential integrity.
  • Field format flexibility and preservation, deterministic masking - Retains field formats, preserves parts of fields for masking. This is useful for example to retain parts of domain names. Deterministic masking across databases.
  • Flexibile roles based masking - Based on membership of users in authorization groups, different masking rules may be applied to deliver differently masked data to users for the same databases.

Windocks offers built-in data masking that is orchestrated with Windocks orchestration. The Windocks database orchestrator builds images, uses Windocks masking to mask the data, then clones that data with Windocks cloning and delivers into Windocks SQL Server containers, docker Oracle, MySQL containers. Windocks database orchestration also works with other masking solutions from leaders such as Curiosity Software. It orchestrates these masking solutions to build database images with obfuscated data and uses Windocks or other cloning to deliver masked databases to Windocks SQL Server containers, docker Oracle, MySQL containers.

Let's chat!

Steps to get started on Database masking

1. Install Windocks

Download the Windocks Community Edition or email support@windocks.com for a full featured evaluation edition.

 

Provision a Windows Server VM (Server 2016, 2019, or 2022), install SQL Server (for SQL database delivery) and then install Windocks as described in the download docs. 

2. Create the database mask

Connect to the database using Windocks Synthetic data, and create the masking to be applied to columns of the database.

3. Run the mask

Save the mask of step #2 as a named transform, and "run" the transform.   The resulting database will include the masked data fields.

 

 

Get a demo

Explore topics

 

 

Meet with us