smartenterprisewisdom

Accutive Security

HID + Accutive Security Phishing Resistant Authentication Webinar

« Back to Glossary Index

Glossary

What is Data Masking?

Data masking is a critical technique used in data security to protect sensitive information by replacing actual data with fictitious yet realistic data. Its primary purpose is to prevent unauthorized access while maintaining the usability of data for legitimate purposes.

Evolution and Importance

Originally developed for testing and development purposes, data masking has become indispensable in ensuring data security and privacy across various industries. It addresses the growing concern of data breaches by providing a layer of protection for sensitive information such as personal identifiable information (PII) and payment card details.

Types of Data Masking

Pattern
Static Data Masking (SDM)
Mask once, copy to downstream
Dynamic Data Masking (DDM)
Mask on the fly at query time
In-place / In-flight Masking
Best For
Dev/Test, training, external data-sharing, compliance
Ad-hoc analytics, SaaS applications, internal portals, live access to sensitive data
Cloud migrations, log pipelines
Popular Solutions
ADM; Delphix; Broadcom Test Data Manager; Redgate
SQL Server Dynamic Data Masking; Oracle Data Redaction; Satori; Imperva Data Masking
Stream processors (Kafka, CDC tools)

Operational Overview

Data masking utilizes algorithms that transform sensitive data while preserving its format and function. This ensures that the masked data remains realistic enough for testing, analysis, and other legitimate uses without exposing sensitive information.

How Does Data Masking Work

Learn More About Data Masking

Download this Resource