Ataccama Digital Conference
Digital Conference
New webinars, demos and more every week. ataccama.com/conference

Data Masking

Consistently and reliably mask large volumes of data at scale

Get all of your data automatically masked or anonymized

Using production data as-is for analytics or for testing and development purposes is often not an option for data privacy and security reasons.

Ataccama offers a solution that automatically detects PII data in all source systems and consistently masks it to prevent leaks or theft, while maintaining data usability.

Consistently and reliably mask large volumes of data at scale
Take a look inside
Consistently and reliably mask large volumes of data at scale

Automated discovery of sensitive data

Ataccama ONE automatically discovers PII and other sensitive data in all source systems and makes it easy for you to obtain a list of all objects that need to be masked.

Masked usable data

Masked data remains consistent in meaning with the original data, preserving its data quality and characteristics. It can be used with the same business logic, can be understood by users, and can be reliably consumed by applications and APIs.

Out-of-the-box masking components

Ataccama ONE comes with a set of pre-defined, easily tunable components for masking PII or other sensitive data. Additionally, you can create your own custom masking rules with an intuitive expression language.

Robust masking methods

Ataccama’s masking algorithms consistently mask data across different data sources and prevent the restoration of real data from the masked data.

Define once, use everywhere

Thanks to automated schema discovery and metadata-driven configuration, reuse sets of masking rules for different data sources without the need for additional data integration and ETL tools.

Automated masking workflows

Configurable masking pipelines, triggers, and workflows let you filter the data for masking, select the frequency, and limit the amount of data published to testing environments.

Ready to get started?

We use cookies on our website to enhance your browsing experience. By using our website, you consent to the use of cookies. To understand more about how we use cookies or how to change your preferences and browser settings, please see our Privacy Policy.

Close