Risk
7/18/2012
02:14 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Solix Technologies Announces Free Data Masking Download

Solix EDMS Data Masking Standard Edition can mask up to 10 columns of sensitive data across all non-production instances of a single enterprise application

Santa Clara, CA, July 18, 2012 - Solix Technologies, Inc., a leading provider of enterprise data management (EDM) solutions, today announced Solix EDMS Data Masking Standard Edition (SE), a high performance data masking solution for PCI/PII compliance. Through a free download users are able mask up to 10 columns of sensitive data across all non-production instances of a single enterprise application. The software may be downloaded and fully deployed in minutes through an easy to use four step deployment wizard.

Credit card data protection is a serious problem with over 500 million records containing sensitive data breached since 2005 according to PrivacyRights.org. Yet, even today, many organizations still have not taken adequate steps to comply with the Payment Card Industry Data Security Standard (PCI DSS). Non-production databases represent a big part of the challenge as sensitive data is often copied from production and left unprotected on development servers, laptops and test instances. PCI DSS Requirement 3.4 states that stored cardholder data must be protected “anywhere it is stored.”

“The problem is small and mid-sized companies don't have dedicated security staff to manage complicated security systems. For products to help small companies they've got to be dead simple to use, automate basic security functions and save them time. The product has to make their jobs easier, not be their job.” according to Adrian Lane, CTO at Securosis.

Data masking has emerged as a best practice to protect non-production data because unlike encryption, masking is able to support the entire application development lifecycle. Data masking removes personally identifiable information such as a person’s name and account, credit card, or social security number, and transforms it into contextually accurate, albeit fictionalized, data. By obfuscating the information, data masking de-identifies personally identifiable information. And because it is no longer confidential, masked data is acceptable for use in non-production environments such as application development.

“We were able to download the software and mask an entire landscape of non-production instances in less than an hour,” said Sadagopan Singam, Vice President, HCL America. “It was easy, and best of all, the software was free.”

“Data must be protected where it lives - in the database,” said John Ottman Executive Chairman, Solix Technologies, Inc. “Non-production data is ground zero for attackers because there is a lot more of it, and fewer controls are in place.”

Solix EDMS Data Masking SE is available for free download immediately at http://www.solix.com/solix-edms-se/

About Solix Technologies Solix Technologies, Inc., a leading provider of Enterprise Data Management (EDM) solutions helps businesses improve application performance, reduce storage costs and meet compliance requirements by achieving Information Lifecycle Management (ILM) goals and data privacy objectives. The Solix Cloud provides a pay-as-you-go model for database archiving and application retirement. The Solix Enterprise Data Management Suite (EDMS) enables organizations to implement Database Archiving, Test Data Management (Data Subsetting), Data Masking and Application Retirement across all enterprise data. Solix Technologies, Inc. is headquartered in Santa Clara, California and operates worldwide through an established network of value added resellers (VARs) and systems integrators.

Visit Solix Technologies on the web at http://www.solix.com and follow Solix on Twitter (http://www.twitter.com/solixedms) and Facebook (http://www.facebook.com/solixtechnologies).

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

CVE-2014-2392
Published: 2014-04-24
The E-Mail autoconfiguration feature in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 places a password in a GET request, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer log...

Best of the Web