1 / 21

Masks on Pants off

Masks on Pants off. A MENTIS Webinar. Presentation Flow. What is Masking?. What is it? | Where does it apply?. Masking. STATIC. WHERE. WHAT HAPPENS. Non-Production. Data is UPDATED. Scrambling Persistent Obfuscation Anonymization. DYNAMIC. WHAT HAPPENS. WHERE. Masking.

chana
Download Presentation

Masks on Pants off

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Masks on Pants off A MENTIS Webinar CONFIDENTIAL

  2. Presentation Flow CONFIDENTIAL

  3. What isMasking? What is it? | Where does it apply? CONFIDENTIAL

  4. Masking STATIC WHERE WHAT HAPPENS • Non-Production • Data is UPDATED • Scrambling • Persistent • Obfuscation • Anonymization DYNAMIC WHAT HAPPENS WHERE • Masking • PRESENTATION is modified • Production • Pre-Production CONFIDENTIAL

  5. KEY CONCERNS CONSISTENCY COLLABORATION PERFORMANCE COMPLETENESS • LOCATIONS • Points-in-time • Application & Database • Other Applications • AUDIT • COMPLIANCE • IT • SECURITY • VOLUME • COMPEXITY • MAINTENANCE ALL LOCATIONS of sensitive data must be masked REPEATABILITY ACROSS the board CONFIDENTIAL

  6. TheProblem Where is sensitive data? CONFIDENTIAL

  7. Sensitive Data is everywhere 67% CONFIDENTIAL

  8. Sensitive Data is everywhere 61% DETAILS EBS R12.1.3 140 Countries 1.4 TB CONFIDENTIAL

  9. Results from recent implementation DETAILS EBS R12.1.3 Multiple Geographies 4 TB CONFIDENTIAL

  10. Masking Mask Are you sure? • Locations • Code • Users Mask Where Scramble Who Application Database Non-Production Production Where is your Sensitive Data? CONFIDENTIAL

  11. TheMENTIS Solution Purpose built masking solution CONFIDENTIAL

  12. SENSITIVE DATA LIFECYCLE MANAGEMENT ™ WHERE & HOW STATIC MASKING • iDiscover • Locations • Code iScramble GENERATE COPY Non-Production DISPOSE Production Production RETIRE Non-Production iRetire MASK & MONITOR SUBSET & WHO SHARE USE iMask iMonitor • iSubset • iDiscover • Users CONFIDENTIAL

  13. Sensitive Data Discovery ™ - iDiscover CONFIDENTIAL

  14. iDiscover ™ - LOCATIONS BASIC ADVANCED Data Classification Results

  15. Masking – the MENTIS way iMask 4 APPS iMask 4 DB Mask iScramble iDiscover- Code Mask Where Scramble Who iDiscover - Users Application Database Non-Production Production iDiscover- Locations Where is your Sensitive Data? CONFIDENTIAL

  16. KEY BENEFITS COMPREHENSIVE AUTOMATED INTELLIGENCE • Start with all COLUMNS • Map to all UI elements • Connect to USERS • WHAT data to MASK • WHERE to mask • WHO to mask from SHARED between all MENTIS products → COMMON platform TIME TO GO LIVE WEEKS NOT MONTHS CONFIDENTIAL

  17. AboutMENTIS Market leading solution for ERP Systems CONFIDENTIAL

  18. Magic Quadrant CONFIDENTIAL

  19. Sample customers CONFIDENTIAL

  20. Why MENTIS? FUTURE SUCCESS EVOLVED VISION OTHER APPLICATIONS PERSONAL CARE USER GROUP SECURITY • Customer Successes • Rated Highly by Analysts • Purpose Built COLLABORATIVE • Consistency • Repeatability • Flexibility • Built-in SOD • Ownership • Reporting CONFIDENTIAL

  21. Questions& Answers Please submit through the Chat feature CONFIDENTIAL

More Related