Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


12:02 PM
Dark Reading
Dark Reading
Products and Releases

Dataguise Announces Dgmasker Application Templates

Templates will allow organizations that have deployed leading enterprise applications to mask and secure data in a matter of days

Fremont, Calif., January 13, 2010 " dataguise (http://www.dataguise.com), a leading innovator of security solutions for protecting sensitive data across the enterprise, today announced the availability of its dgmasker enterprise application templates. Developed with leading application experts, the dataguise dgmasker templates provide enterprise organizations that have deployed Oracle' E-Business Suite, PeopleSoft Enterprise, SAP ERP and NextGen Healthcare Software with the ability to quickly secure Personally Identifiable Information (PII) for use in non-production application development, testing, QA & training environments.

Enterprise package applications are extremely complex, often requiring customizable deployments based on a particular organization or industry. The dataguise dgmasker application templates eliminate the complexities of protecting sensitive data within these applications, allowing organizations to implement secure data masking procedures in just a few days versus weeks " an industry first.

dgmasker is a highly automated and advanced security solution that helps enterprises meet the multitude of compliance requirements, including PCI-DSS, PII, HIPAA, GLBA and SOX. Unlike

alternatives on the market, dgmasker is an easy-to-use data masking solution that has been built from the ground up with security and compliance in mind. By developing the dgmasker application templates, dataguise has further simplified the data masking process across industry-leading applications, offering it's unique Masking On-Demand technology to organizations spanning several vertical markets including education, healthcare, financial services and human resources.

The University of California, Berkeley recently leveraged dgmasker application templates for NextGen Software in order to enforce data privacy requirements in the university's software testing and application development environments. Prior to dataguise, UC Berkeley was challenged with providing quality test data to its application development group which works on the University's internally developed Web-based software solutions for SQL Server and includes the housing and assignment system.

UC Berkeley's use of dataguise technology has allowed large volumes of student information, critical for effective software development, to be randomized so that student social security numbers, record numbers, home addresses, names and dates of birth look like original data but are related in format only. The de-identification process takes place entirely within the production network, preventing the exposure of sensitive data before it enters the less secure non-production environment.

"Our internal application development processes require production quality data - which in our case means student data," said Steve McCabe, Associate Director of Information Technology in UC Berkeley's Residential and Student Service Program. "With the original data preserved in the production database, our software developers perform development and testing with data that have been processed using dgmasker to desensitize the information, essentially rendering it inert. This significantly reduces our risk exposure and allows us to readily share test data with our end users during QA and training."

In order to effectively implement packaged applications, enterprises need to have the ability to support these systems in production environments as well as during the development, QA, testing and pilot deployment process. These methods can expose highly-sensitive data to employees at various levels within an organization " developers, QA personnel, etc. " as well as offshore and outsourced personnel, increasing the risk of a data breach. dgmasker supports non-production use of enterprise applications while eliminating the risk of sensitive data exposure.

"Developing a masking strategy for packaged enterprise applications is a particularly difficult and time-consuming issue for organizations, as a typical application may contain tens of thousands of tables with hundreds of potentially sensitive data types," said Allan Thompson, Executive Vice President, Operations for dataguise. "By using our dgmasker application templates, organizations can implement a comprehensive data masking solution within a matter of days, ensuring they are protected against exposure resulting from an internal or external breach, reducing their risk profile."

Pricing and Availability

The dataguise dgmasker application templates will be available in the first quarter of 2010 with pricing based on environment and configuration. Organizations with security concerns reviewed in this announcement can learn more about dataguise by visiting www.dataguise.com.

Tweet this: dataguise Announces Data Masking Application Templates, Expanding dgmasker Support Across Industry-Leading Applications

Follow dataguise on Twitter at: http://twitter.com/dataguise

About dataguise

dataguise offers automated and advanced data security solutions to help ensure regulatory compliance, protect against data theft, discover sensitive data and maintain data quality. dgdiscover enables organizations to find structured database repositories across the network, search and discover sensitive data in structured databases. dgmasker is then able to mask or de-identify to protect sensitive data. dgmasker provides secure masking of database content with unprecedented flexibility and functionality across heterogeneous environments. For more information, call 510-824-1036 or visit www.dataguise.com

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-08
Dell iDRAC8 versions prior to contain a host header injection vulnerability. A remote unauthenticated attacker may potentially exploit this vulnerability by injecting arbitrary ‘Host’ header values to poison a web-cache or trigger redirections.
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by a command injection vulnerability. The web administration contains functionality in which administrators are able to manage users. The edit users form contains a parameter vulnerable to command injection due to insufficient validation.
PUBLISHED: 2021-03-08
Maxum Rumpus 8.2.13 and 8.2.14 is affected by cross-site scripting (XSS). Users are able to create folders in the web application. The folder name is insufficiently validated resulting in a stored cross-site scripting vulnerability.
PUBLISHED: 2021-03-08
A flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulner...
PUBLISHED: 2021-03-08
PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in a command. The Compadmin user could potentially exploit this vulnerability, leading to potential privileges escalation.