Blog

Sensitive Data Map

The Sensitive Data Map is the result of the search for sensitive information that we have covered in the last posts. It offers a model of the candidate fields for dissociation and an essential aid for the subsequent configuration. Also, the Sensitive Data Map presents relevant information about the […]

Read more...

Analyzing Database content

The last post of the DataMasking Project Diary was about the process of identifying where sensitive data is. As this is a complex topic, we are still missing some more relevant information about how to analyze databases and its content, that is today’s post topic. We want to localize […]

Read more...

Where is sensitive data stored?

We are all aware up to a certain point that we have sensitive data in our databases, but do we know where it is and what data do we have? To get a better picture of this situation, let’s follow the simile:

Imagine that you move to a new house. […]

Read more...

Sensitive Data Inventory

This is a key piece of information in the datamasking implementation project, which will be involved in every stage of the project and constantly updated.
The purpose
We need this document, so we know what information the company is interested in protecting.
Some of it might be due to legal requirements, but […]

Read more...

The ball starts to roll

After an exhaustive and sucessful Proof of Concept, the kick-off meeting is the first milestone of the real implementation project. The project team -client and netZima – had been working together for a while, so we know one another and the working atmosphere is great.
We are very confident this […]

Read more...