Enterprise Data Masking Modernization Guide
Enterprise Data Masking is a testing product by Grid-Tools. Explore technical details, modernization strategies, and migration paths below.
Product Overview
Enterprise Data Masking is a tool designed to mask sensitive data fields in production data to create safe and realistic test data.
Without it, organizations risk exposing sensitive data, leading to compliance violations and potential data breaches.
Modernization Strategies
Rehost
- Timeline:
- 6-12 months
Lift-and-shift to cloud infrastructure with minimal code changes. Fast migration with lower risk.
Refactor (Recommended)
- Timeline:
- 18-24 months
Optimize application architecture for cloud while preserving business logic. Best ROI long-term.
Replatform
- Timeline:
- 3-5 years
Complete rewrite to cloud-native architecture with microservices and modern tech stack.
Frequently Asked Questions
General
What does Enterprise Data Masking do?
Enterprise Data Masking is a tool designed to protect sensitive data by replacing it with realistic, but non-sensitive, substitutes. This allows organizations to create safe test environments using production data without exposing confidential information.
Is this a system, application, or tool?
It is a tool set that provides functionalities for masking data. It is not a complete system or application, but rather a set of utilities designed to integrate with existing data management processes.
What types of organizations use this?
Organizations across various industries, especially those handling sensitive customer or financial data, use this. This includes banking, healthcare, insurance, and government sectors. Any organization needing to create realistic test environments from production data while adhering to data privacy regulations can benefit.
When should we consider Enterprise Data Masking?
A company should consider using Enterprise Data Masking when it needs to create test data that accurately reflects production data, but without exposing sensitive information. This is particularly important when complying with data privacy regulations or when outsourcing testing activities.
What are the alternatives to Enterprise Data Masking?
Alternatives include Informatica Data Masking, IBM InfoSphere Optim Test Data Management, and Delphix. Enterprise Data Masking distinguishes itself through its focus on mainframe environments and its ability to handle complex data relationships within those systems.
Technical
For mainframe products: Does this run in an LPAR?
Enterprise Data Masking typically runs on z/OS. It may require specific subsystems depending on the data sources being masked. It is often deployed on an LPAR to isolate the masking process from production systems.
What infrastructure is required?
The product requires access to the data sources that need to be masked. This may include databases (such as DB2, IMS), VSAM files, and sequential datasets. It also requires sufficient processing power and storage to handle the data transformation.
What are common commands and configuration files?
Common commands include defining masking rules, executing masking jobs, and generating reports. Configuration files specify the data sources, masking algorithms, and output formats.
Does it offer APIs for integration?
The product may offer APIs for integration with other systems, such as test data management platforms or data governance tools. These APIs could be REST-based or use other protocols for communication.
Business Value
What is the primary business value?
The primary business value is the ability to create realistic and safe test data, which reduces the risk of exposing sensitive information during testing. This helps organizations comply with data privacy regulations and avoid potential data breaches.
What happens if an organization does NOT use this product?
Without Enterprise Data Masking, organizations risk exposing sensitive data in test environments, which can lead to compliance violations, reputational damage, and potential legal liabilities. It also limits the ability to safely outsource testing activities.
What is the typical licensing model?
The licensing model is typically subscription-based, with costs depending on the size of the data being masked and the number of users. Additional costs may include implementation services, training, and ongoing support.
Security
What authentication methods are supported?
Authentication methods may include integration with z/OS security systems such as RACF, ACF2, or Top Secret. The access control model is typically role-based access control (RBAC), where users are assigned roles with specific permissions.
What encryption and audit logging capabilities exist?
Encryption may be used to protect sensitive data during the masking process and while at rest. Audit logging captures all masking activities, providing a record of who masked what data and when.
How does it control access to mainframe datasets?
The product controls access to mainframe datasets by integrating with z/OS security systems. Masking rules define which fields are masked and how, ensuring that sensitive data is protected.
Operations
How is this product typically deployed?
Deployment typically involves installing the software on a z/OS LPAR and configuring it to access the necessary data sources. Implementation requires technical expertise in z/OS, data management, and security.
What ongoing operational requirements exist?
Ongoing operational requirements include monitoring the masking jobs, maintaining the masking rules, and ensuring that the software is up-to-date. Staffing requirements include data management professionals and security administrators.
What are common implementation challenges?
Common implementation challenges include identifying all sensitive data, defining appropriate masking rules, and ensuring that the masked data is consistent and usable for testing purposes.
Ready to Start Your Migration?
Download our comprehensive migration guide for Enterprise Data Masking or calculate your ROI.