The Sensitive Data Lifecycle: IBM vs Informatica vs MENTIS
Sensitive data lifecycle starts with the discovery of sensitive data, continuing with its protection (which may involve encryption, tokenization and/or both static and dynamic data masking), and ends with its retirement. Also relevant is monitoring of sensitive data, and who is accessing it, during the course of this lifecycle.
Download this paper by Bloor Research to know each of the vendor’s offerings within each of these areas, beginning with an overview of each company’s suite of (relevant) products.
Vendor product suites
Detailed comparison of vendor product suites (relevant to sensitive data lifecycle)
How each vendor’s product suite fares in each stage of the sensitive data lifecycle:
- Static Data Masking
- Dynamic Data Masking