Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:02 PM
Dark Reading
Dark Reading
Products and Releases

Dataguise Announces Dgmasker Application Templates

Templates will allow organizations that have deployed leading enterprise applications to mask and secure data in a matter of days

Fremont, Calif., January 13, 2010 " dataguise (http://www.dataguise.com), a leading innovator of security solutions for protecting sensitive data across the enterprise, today announced the availability of its dgmasker enterprise application templates. Developed with leading application experts, the dataguise dgmasker templates provide enterprise organizations that have deployed Oracle' E-Business Suite, PeopleSoft Enterprise, SAP ERP and NextGen Healthcare Software with the ability to quickly secure Personally Identifiable Information (PII) for use in non-production application development, testing, QA & training environments.

Enterprise package applications are extremely complex, often requiring customizable deployments based on a particular organization or industry. The dataguise dgmasker application templates eliminate the complexities of protecting sensitive data within these applications, allowing organizations to implement secure data masking procedures in just a few days versus weeks " an industry first.

dgmasker is a highly automated and advanced security solution that helps enterprises meet the multitude of compliance requirements, including PCI-DSS, PII, HIPAA, GLBA and SOX. Unlike

alternatives on the market, dgmasker is an easy-to-use data masking solution that has been built from the ground up with security and compliance in mind. By developing the dgmasker application templates, dataguise has further simplified the data masking process across industry-leading applications, offering it's unique Masking On-Demand technology to organizations spanning several vertical markets including education, healthcare, financial services and human resources.

The University of California, Berkeley recently leveraged dgmasker application templates for NextGen Software in order to enforce data privacy requirements in the university's software testing and application development environments. Prior to dataguise, UC Berkeley was challenged with providing quality test data to its application development group which works on the University's internally developed Web-based software solutions for SQL Server and includes the housing and assignment system.

UC Berkeley's use of dataguise technology has allowed large volumes of student information, critical for effective software development, to be randomized so that student social security numbers, record numbers, home addresses, names and dates of birth look like original data but are related in format only. The de-identification process takes place entirely within the production network, preventing the exposure of sensitive data before it enters the less secure non-production environment.

"Our internal application development processes require production quality data - which in our case means student data," said Steve McCabe, Associate Director of Information Technology in UC Berkeley's Residential and Student Service Program. "With the original data preserved in the production database, our software developers perform development and testing with data that have been processed using dgmasker to desensitize the information, essentially rendering it inert. This significantly reduces our risk exposure and allows us to readily share test data with our end users during QA and training."

In order to effectively implement packaged applications, enterprises need to have the ability to support these systems in production environments as well as during the development, QA, testing and pilot deployment process. These methods can expose highly-sensitive data to employees at various levels within an organization " developers, QA personnel, etc. " as well as offshore and outsourced personnel, increasing the risk of a data breach. dgmasker supports non-production use of enterprise applications while eliminating the risk of sensitive data exposure.

"Developing a masking strategy for packaged enterprise applications is a particularly difficult and time-consuming issue for organizations, as a typical application may contain tens of thousands of tables with hundreds of potentially sensitive data types," said Allan Thompson, Executive Vice President, Operations for dataguise. "By using our dgmasker application templates, organizations can implement a comprehensive data masking solution within a matter of days, ensuring they are protected against exposure resulting from an internal or external breach, reducing their risk profile."

Pricing and Availability

The dataguise dgmasker application templates will be available in the first quarter of 2010 with pricing based on environment and configuration. Organizations with security concerns reviewed in this announcement can learn more about dataguise by visiting www.dataguise.com.

Tweet this: dataguise Announces Data Masking Application Templates, Expanding dgmasker Support Across Industry-Leading Applications

Follow dataguise on Twitter at: http://twitter.com/dataguise

About dataguise

dataguise offers automated and advanced data security solutions to help ensure regulatory compliance, protect against data theft, discover sensitive data and maintain data quality. dgdiscover enables organizations to find structured database repositories across the network, search and discover sensitive data in structured databases. dgmasker is then able to mask or de-identify to protect sensitive data. dgmasker provides secure masking of database content with unprecedented flexibility and functionality across heterogeneous environments. For more information, call 510-824-1036 or visit www.dataguise.com

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...