MENTIS is now Mage. READ MORE >



OVERVIEW

A deeper analysis

Over the past 15+ years, we have helped our customers, across industries, to protect sensitive data while enabling regulatory compliance, test data management, cross border data transfer, enterprise security amongst other complex use cases.

Is ERP Fast becoming an Extreme Risk to Privacy?

October 27, 2021 | 12:00 PM EST When first introduced, ERP solutions transformed businesses by enabling them with the ability to consolidate their business into…

READ MORE >

Webinar | Discovering Sensitive Data using AI and NLP

Fast | Accurate | Comprehensive August 03, 2021 | 2:00 PM – 3:00 PM | SGT Data Governance, Data Privacy, Data Security, all have a…

READ MORE >

Forrester Wave for Dynamic Data Masking Solutions

With 7 different deployment options, and over 70+ anonymization methods that include a range of encryption, tokenization and masking mechanisms, iMask has been ranked the…

READ MORE >

Webinar | Secure Data. Delivered Seamlessly.

Automate and Deploy award-winning DevSecOps into your CI (Continuous Innovation) / CD (Continuous Delivery) process. June 29, 2021 | 12:00 PM - 1:00 PM |…

READ MORE >

Data Subject Access Requests and the MENTIS Platform

This document details DSARs offered by different privacy compliance laws – what they are, and how to comply to them. The latter is where the…

READ MORE >

Data Anonymization for a Leading Global Grocery Company

The case study discusses, in-brief, the implementation of our data security solutions - data discovery and static data masking, for a leading global grocery chain.…

READ MORE >

CCPA Compliance With MENTIS

A comprehensive document on the key areas covered by the CCPA, mapped to our product capabilities and solutions. Read this document to find out how…

READ MORE >

Canadian Management and Consultancy Services Business

This case study is about how we implemented our data minimization solution, sensitive data retirement, for a leading global Canadian business providing management and consultancy…

READ MORE >

Test Data Management Market Update

Although the fundamental concepts of Test Data Management, such as subsetting or deriving virtual copies, have remained the same, there are three popular Test Data…

READ MORE >

Comparing Data Security Solution Vendors?

Sensitive data lifecycle starts with the discovery of sensitive data, continuing with its protection (which may involve encryption, tokenization and/or both static and dynamic data…

READ MORE >

GDPR and the MENTIS Data and Application Security Platform

Despite a generous transitional period of more than two years, some organisations are finding themselves scrambling to comply with GDPR, sometimes resorting to desperate measures…

READ MORE >

MENTIS Data and Application Security Platform

The market for discovering and protecting sensitive data assets is in a transformation phase due to increasing requirements for security and compliance. This is being…

READ MORE >

Dark Data Discovery

This is the first of a series of three articles about the fundamentals of data security that you can apply for your association to every…

READ MORE >

Integrated Data Masking for Oracle E-Business

MENTIS provides integrated static and dynamic data masking that fits directly into your current operations and security model. Download this paper to know how you…

READ MORE >

Data masking that is built for success

This is the second in a series of three articles about the fundamentals of data security that you can apply for your association to every…

READ MORE >

GDPR Compliance with MENTIS

The General Data Protection Regulation (GDPR) provides a unified set of rules for protecting personal data of all individuals residing within the European Union (EU).…

READ MORE >

Comprehensive security solution for a Top swiss bank

The success story of how MENTIS helped optimize the cost by offshoring IT application development while ensuring no compromise on sensitive data controls. Download to…

READ MORE >

Data Minimization

This is the third in a series of three articles about the fundamentals of data security that you can apply for your association to every…

READ MORE >

iScramble™ – Static Data Masking

Non-production databases are a goldmine of sensitive data and are regularly used in application development and testing. iScramble protects sensitive data in your nonproduction environments.…

READ MORE >

iDiscover™ – Sensitive Data Discovery

Analysts at Bloor said that iDiscover goes further than any other suppliers in its capabilities for discovering sensitive data. Download this data sheet to know…

READ MORE >

iMask™ – Dynamic Data Masking

iMask is the dynamic data masking solution that secures sensitive data in production environments. Download this data sheet to know how you can implement conditional…

READ MORE >

iRetire™ – Data Retirement

Ensure compliance and reduce risk by de-identifying and tokenizing inactive data within a production environment.  Download this datasheet to see how you can comply to the “Right to forget”…

READ MORE >

Discovery and masking for a Financial Services Software Provider

This is a case study of a successful implementation of sensitive data discovery and masking. Download to read more.        

READ MORE >

Security for complex ERP systems in Educational Universities

This is a success story of how we secured PeopleSoft using discovery and masking. Download the document to read more.        

READ MORE >

Monitoring solution for Private Bank in DR

This is a success story of how we implemented discovery, static data masking, and monitoring. Download the document to read more.        

READ MORE >

Enterprise security in a fortune 20 conglomerate

This is a success story of how we implemented discovery and static data masking. Download the document to read more. [hubspot type=form portal=6483169 id=bc535d8f-6b3e-42cd-8ff4-46ce4ad6b175] Enterprise-wide…

READ MORE >

Automated static data masking for a leading healthcare company in US

This case study is about how we protected Patient Records & System Sensitive Data in a Healthcare Organization. Download to read why MENTIS masking was…

READ MORE >

Discovery and static data masking for one of the largest re-insurer

This case study is about successful implementation of discovery and static data masking to protect non-production environment. Download the document to read more.    …

READ MORE >

SOX compliance for a Leading utilities company

The scope of this project was to implement data discovery and monitoring (Database). Download the document to read more.    

READ MORE >

Static and Dynamic Masking in a Canadian Aviation Company

This case study is about how we implemented comprehensive Sensitive data discovery, Static Data Masking and Dynamic Data Masking solutions for PeopleSoft application. Download the…

READ MORE >

Discovery and masking for a large credit rating agency

This case study is about how we implemented complex role-based and location-based masking rules. Download the document to read more.

READ MORE >

Integrated Data Masking for PeopleSoft Enterprise

This case study is about how we protected Sensitive Data in Production and Non-Production Applications and Databases. Download the document to read more.    …

READ MORE >

GDPR Compliance Whitepaper

…what has happened and what should organizations do going forward Technology has an essential role to play in any effort to achieve compliance. Yet, not…

READ MORE >