Alon Rosenthal

Alon Rosenthal
Alon Rosenthal is the director of product marketing and data security evangelist at Informatica. He was previously the co-founder and vice president of Sales and Marketing for ActiveBase, inventors of Dynamic Data Masking. Prior to founding ActiveBase, Rosenthal was a project leader and senior consultant in large scale ERP projects for Motorola Communications. Rosenthal holds a B.Sc. and B.A in Economics from the Technion, Israel Institute of Technology both Summa Cum Laude and an MBA from Tel Aviv University.

The Birth of “Jurisdiction-based Access Control”

As the founder of Dynamic Data Masking, I have the opportunity to meet many organizations worldwide, who are willing to openly discuss their security challenges.

These conversations have brought me to foresee the birth of yet another category in the fast growing application security market – Jurisdiction-based Access Control. (more…)

FacebookTwitterLinkedInEmailPrintShare
Posted in Data masking | Tagged , , , , | Leave a comment

Dynamic Data Masking in a Nutshell

I’ve been asked numerous times how Dynamic Data Masking works, so here it is – The Dynamic Data Masking process. Believe me it’s simple …

The use case –IT personnel, developers, consultants and outsource support teams have  access to production business applications (SAP, PeopleSoft, Oracle) or clones/backups that contains sensitive customer information and credit card information.

We cannot block their access, as they are required to ensure application performance, but we need to secure the data they are accessing.

These are the initial installation steps required:

  1. Install Informatica Dynamic Data Masking on the database or on a dedicated server as it acts as a proxy.
  2. Import one of our predefined rule sets that has been prepared for the application/data or create your own custom rules.
  3. Define the roles/responsibilities that need to be anonymized, using predefined hooks to ActiveDirectory/LDAP and application responsibilities.

Now how does Dynamic Data Masking work?

  1. User requests are intercepted in real-time by the Dynamic Data Masking server software.
  2. User roles and responsibilities are evaluated, and if they have been specified by the rules as requiring masking, Dynamic Dasta Masking rewrites them to return masked/scrambled personal information. No application changes, no database changes – completely transparent.

Sounds simple – yes it is.

Other common use cases include protecting development and reporting tool access to production databases, anonymizing datawarehouse reports and design tools, securing production clones and training environments.

See? Simple!

FacebookTwitterLinkedInEmailPrintShare
Posted in Data masking, Data Privacy | Tagged , , , , | Leave a comment