(35)
4.2 out of 5
Visit Website
Sponsored
Sensitive Fields | The ability to create fields that automatically mask data such as credit card numbers or passwords. This feature was mentioned in 12 Informatica Dynamic Data Masking reviews. | 85% (Based on 12 reviews) | |
Dynamic Masking | Based on 12 Informatica Dynamic Data Masking reviews. The ability to mask data in real time as it is entered. | 88% (Based on 12 reviews) | |
Static Masking | The ability to apply or remove masking after data has been entered. 12 reviewers of Informatica Dynamic Data Masking have provided feedback on this feature. | 82% (Based on 12 reviews) | |
Consistent Masking | Tools to mask data using a consistent ruleset. This feature was mentioned in 12 Informatica Dynamic Data Masking reviews. | 86% (Based on 12 reviews) | |
Random Masking | Based on 11 Informatica Dynamic Data Masking reviews. Tools to mask data using random characters and data. | 85% (Based on 11 reviews) |
GDPR compliant | Meets GDPR requirements for pseudonymisation under the Data Protection by Design and by Default requirements. | Not enough data | |
CCPA compliant | Meets de-identification requirements under the CCPA. | Not enough data |
Static pseudonymization | Offers traditional static de-identification (also known as consistent replacement), where the pseudonymized data uses the same pseudonyms across multiple data sets. For example, John Smith is replaced with Robert Fox and the Robert Fox name is used multiple times. This type of pseudonymization carries some risks of re-identification if paired with enough datasets. | Not enough data | |
Dynamic pseudonymization | Offers dynamic de-identification (also known as random replacement), where the pseudonymized data uses different pseudonyms across multiple data sets. For example, John Smith is replaced with Robert Fox once, and then the next time the data is used the name changes to Michael Jones. This type of pseudonymization carries lesser risk of re-identification if paired with many datasets. | Not enough data | |
Batch de-identification | Offers methods to de-identify large volumes of data using batch files. | Not enough data |
Mobile SDK | Connects to mobile platforms using a mobile SDK. | Not enough data | |
Web services APIs | Offers APIs to connect products. | Not enough data |