About
Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
|
About
The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
|
About
Oracle Database@AWS enables customers to migrate Oracle Databases, including Oracle Exadata workloads, to Oracle Exadata Database Service on Dedicated Infrastructure or Oracle Autonomous Database on Dedicated Exadata Infrastructure within AWS. This migration requires minimal to no database or application changes while maintaining full feature and architecture compatibility, performance, and availability. Customers can establish low-latency connections between Oracle Database@AWS and applications deployed in AWS, including on Amazon Elastic Compute Cloud (Amazon EC2). Oracle Database@AWS integrates directly with AWS Analytics services through zero-ETL to unify data across Oracle and AWS, enabling analytics and machine learning. Further, integration with AWS generative AI services is supported to accelerate innovation. It offers a unified experience for collaborative purchasing, management, operations, and support.
|
About
Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Enterprises and companies searching for an encryption solutions to secure their data and their businesses
|
Audience
Organizations that need a flexible solution that discovers, masks and subsets sensitive data to safely share across non-production environments
|
Audience
IT teams seeking a tool to migrate and modernize Oracle workloads in the cloud
|
Audience
CISOs, CDOs and SaaS vendors looking to keep sensitive data secure and private
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$230 one-time payment
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationIBM
Founded: 1911
United States
www.ibm.com/products/guardium-data-encryption
|
Company InformationOracle
Founded: 1977
United States
www.oracle.com/database/technologies/security/data-masking-subsetting.html
|
Company InformationAmazon
Founded: 1994
United States
aws.amazon.com/marketplace/featured-seller/oracle/
|
Company InformationTitaniam
Founded: 2019
United States
titaniam.io
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
|
|||||
|
|
|
|
||||
|
|
|
|||||
|
|
|
|
||||
Categories |
Categories |
Categories |
Categories |
|||
Cybersecurity Features
AI / Machine Learning
Behavioral Analytics
Endpoint Management
Incident Management
IOC Verification
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting
Data Security Features
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Encryption Features
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
|
||||||
Integrations
AWS IoT Analytics
Amazon EC2
Amazon Web Services (AWS)
IBM Cloud
IBM Db2
IBM Guardium
IBM Informix
Microsoft 365
MySQL
Oracle Autonomous Database
|
Integrations
AWS IoT Analytics
Amazon EC2
Amazon Web Services (AWS)
IBM Cloud
IBM Db2
IBM Guardium
IBM Informix
Microsoft 365
MySQL
Oracle Autonomous Database
|
Integrations
AWS IoT Analytics
Amazon EC2
Amazon Web Services (AWS)
IBM Cloud
IBM Db2
IBM Guardium
IBM Informix
Microsoft 365
MySQL
Oracle Autonomous Database
|
Integrations
AWS IoT Analytics
Amazon EC2
Amazon Web Services (AWS)
IBM Cloud
IBM Db2
IBM Guardium
IBM Informix
Microsoft 365
MySQL
Oracle Autonomous Database
|
|||
|
|
|
|
|