Dynamic Data Masking and Filtering Cross-applications

Secure enterprise data without compromising productivity

Centralized Data Masking Rules

Implement complete or partial data masking on any chosen field, utilizing a centrally managed rule for straightforward deployment.

Attributes Policies

Centrally manage policies with customisable masking patterns and rules to control who, what, when, where, and why fields are masked in real-time.

Contextual Data Masking

Deploy masking dynamically based on the context of access, such as remote locations, mobile usage, and time of day.

Data Access Audits

Utilize logging features such as click-to-view and MFA to create a comprehensive audit trail of all data access for easy reference.
Data Security

Dynamic Data Masking for SAP

PFCG roles are not designed to protect data everywhere, at granular level, taking into consideration the context of the user, of the data (classification).

Given the growing importance to protect privacy data, transfer data, customer data, technical data, financial data, etc., the need for a simple systematic data masking approach is as crucial as ever.

Without data masking, organizations increase the risk of being non-compliant with applicable regulations, in addition to jeopardizing security through the inadvertent or intentional disclosure of sensitive or confidential information.

Data Security

Mask and filter data at DB level, at runtime, based on dynamic policies

The new approach allows to mask and filter data at DB level, at runtime, based on dynamic policies: Any applications using Hana DB, Oracle DB or any JDBC/ODBC DB will be protected systematically, in any UI, any users (even administrators), any modes (debugging..).

Policies are preventative, therefore making more efficient controls than detective, after-the-fact controls.

Policies are external to the applications, applying rules on top of the existing roles, not replacing those. Because they are external, logs about cross-application protections are automated, allowing natural automated reporting about cross-application protection (impossible before).

This solution enables organizations to prevent data loss or leakage from critical applications

Data Security

Core
features.

Enable access control & protects data within applications, data leaving applications (files) and on the move (files), with policies.

0

Global Customer

0

Global industries

Data Masking and filtering
Data Masking and filtering

Perform field-level data masking and filtering based on dynamic attributes

Customizable Policy
Customizable Policy

Centrally manage policies with customizable masking patterns and rules to determine who, what, when, where, and why to mask field(s) in real-time

Centralized Policy Management
Centralized Policy Management

Support any UI, Fiori application, transaction, or microservice with a single set of policies within a single solution

Centralized Audit & Monitoring
Centralized Audit & Monitoring

Monitor, track, report, and alert on risky access activities to critical field(s)

Data Security

Dynamic Data Masking and Filtering Cross-applications
Benefits

Regulatory Compliance
The capacity for detailed decision-making ensures that only authorized personnel access sensitive information, aiding compliance with regulations like GDPR, ITAR, HIPAA, SOX, NERC, FERC, PIPAA, and others.
Application Security
Entitlement Manager secures access to critical SAP data, preventing unauthorized users or external entities from gaining entry. It enhances control over your key SAP applications and safeguards against improper disclosure of sensitive information
Reduces Administration
Our centralized policy-based solution significantly reduces the number of policies needed to enforce data and application access resulting in fewer policies to manage and making it fast and efficient to create/modify and deploy policies.
Get Started
Comprehensive Reporting
All activities are tracked and logged through the system providing a full view into who is accessing what data and what they are doing with it, making it easy to detect anomalies.
Get Started
Data Security

US NIST standards

The US Standard NIST (National Institute of Standards) has strongly promoted the principles of the architecture of this solution, called “Attribute Based Access Control” (ABAC). ABAC as per the standard from US NIST is residing on top of existing Roles (Role Based Access Control, PFCG Roles), adding control layers on top, which traditional roles are not designed to perform.

Create an account

How do I reconcile my business objectives with my data security and compliance mandates?

With Enterprise Data Insight Data Protection you can quickly and easily detect, identify and fix your exposure. The dynamic data masking process can be applied across all core and/or industry-specific modules.