PRODUCTS
ADM Platform
Platform Overview
Data Masking
Data Discovery
Data Subsetting
Data Automation
Data Tokenization
Use Cases
Static Data Masking
Test Data Management
Agile DevOps CI/CD
Security + Compliance
Hybrid Cloud / Multicloud
ADM Resources
Viewpoints
Software Advice
Guides + Whitepapers
Data Masking Case study
Get started with ADM
View Tiers + Pricing
Request Demo
SOLUTIONS
Industries
Financial Services
Healthcare
Retail
Insurance
Telecommunications
Public Sector
Databases
Databases + Data Sources for ADM
Data Security for Oracle
Data Masking for Temenos Core Banking (T24 / Transact)
Microsoft SQL Server Data Masking
Data Masking for MySQL
Data Masking for PostgreSQL
SERVICES
Center of Excellence
Data Protection, Cryptography + IAM Center of Excellence
Cybersecurity Assessments
ADM Services
Cybersecurity Needs Assessment & Solution Selection
Cybersecurity Research and Consulting
Software Development & API Integration
Cybersecurity Staff Augmentation
Cryptography + Data Security
Key Management System
Secrets Management
Hardware Security Modules
Certificate Lifecycle Management (CLM) & Machine Identity Management (MIM)
Public Key Infrastructure (PKI)
Data Encryption & Security
Test Data Management Services
Tokenization, Obfuscation, Anonymization, & Masking
Identity and Access Management
Identity and Access Management (IAM)
Customer Identity and Access Management (CIAM)
Know Your Customer (KYC) + Identity Verification (IDV)
Online Fraud Detection (OFD)
PARTNERS
Partner Network
Partner Network
Certified Partner Services
Thales
Thales Overview
Thales Managed Services (MSP)
Thales Health Checks + Assessments
Thales Technical Account Management + Staff Augmentation
Thales Solution Implementation + Journey Planning
Thales Platform Upgrades + Migrations
Thales Training Services
Venafi
Venafi Overview
Venafi Managed Services (MSP)
Venafi Health Checks + Assessments
Venafi Technical Account Management + Staff Augmentation
Venafi Solution Implementation + Journey Planning
Venafi Platform Upgrades + Migrations
Venafi Training Services
Keyfactor
Keyfactor Overview
Keyfactor Managed Services (MSP)
Keyfactor Health Checks + Assessments
Keyfactor Technical Account Management + Staff Augmentation
Keyfactor Solution Implementation + Journey Planning
Keyfactor Platform Upgrades + Migrations
Keyfactor Training Services
Partner Network
Partner Network
Certified Partner Services
Thales
Venafi
Keyfactor
HID
Thales
Thales Overview
Thales Managed Services (MSP)
Thales Health Checks + Assessments
Thales Technical Account Management + Staff Augmentation
Thales Solution Implementation + Journey Planning
Thales Platform Upgrades + Migrations
Thales Training Services
Venafi
Venafi Overview
Venafi Managed Services (MSP)
Venafi Health Checks + Assessments
Venafi Technical Account Management + Staff Augmentation
Venafi Solution Implementation + Journey Planning
Venafi Platform Upgrades + Migrations
Venafi Training Services
Keyfactor
Keyfactor Overview
Keyfactor Managed Services (MSP)
Keyfactor Health Checks + Assessments
Keyfactor Technical Account Management + Staff Augmentation
Keyfactor Solution Implementation + Journey Planning
Keyfactor Platform Upgrades + Migrations
Keyfactor Training Services
HID
HID Services Overview
HID Identity Verification (IDV)
Insights
Insights
Articles
Case Studies
Solution Briefs
Whitepapers
Videos
COMPANY
Company
About Us
Support Hub
Newsroom
Community Impact
Contact Us
Innovation Lab
Try before you buy : Discover, evaluate, and test the top cybersecurity tools in the market, before you invest.
Learn More
Download Resource
X
Request a Demo
Get in Touch
Back to Accutive Security Glossary
Data Breach
« Back to Glossary Index
A data breach occurs when unsanctioned software systems or individuals access private data.
Download this Resource