Tag "data masking"

Partners – “Detect and Protect” Strategies for Data Security

This year’s Informatica World was truly eye opening. Thanks to the amazing participation and feedback from our partners, our teams walked away with incredible learnings about their growing successes and opportunities. And as underscored by Rodney Foreman in a recent blog post, Data Security stood out as one of the hottest topics. Having received  many... more

Part 2: The Importance of Test Data Management for Development and Operations

In my previous blog on The Importance of Test Data Management for DevOps Part 1, I discussed how Test Data Management tools complement test management and automation tools to support DevOps. I discussed the following key capabilities of Test Data Management that fills the gaps left by test automation solutions: Sensitive Data Protection Test data... more

What’s the Cost of a Data Breach in Telecoms?

Now that the European Union has passed the General Data Protection Regulation (GDPR) many Communications Service Providers (CSPs) are taking steps to ensure they are ready for the regulations and protected from the risk of a data breach. In general the telecoms industry has been focused on security for a long time but the focus... more

Data Masking and Encryption Are Different

A common misconception within the data community is that encryption is considered a form of data masking. Even worse is that there are some that erroneously identify both as one and the same. Data masking and Data encryption are two technically distinct processes. Encryption at the field level is considered a data masking function. There are many... more

At St. Joseph Health, Trusted Data Enables Better Patient Care

For St. Joseph Health, improving health and quality of life of the people is the ultimate mission. It requires a number of considerations, or, “dimensions of performance” as it was introduced by the organization at this year’s MDM & Data Governance Summit in San Francisco: Cost of the care – including the current and projected... more

Healthcare Data Masking: A Primer

When trying to protect your data from the nefarious souls that would like access to it (?), there are several options available that apply to very specific use cases. In order for us to talk about the different solutions – it is important to define all of the terms: PII – Personally Identifiable Information –... more