Camouflage Data Masking

Protect sensitive data from exposure in non-production environments. Imperva Camouflage pseudonymizes and anonymizes sensitive data via data masking so you can safely use de-identified data in development, testing, data warehouses, and analytical data stores.

Mask Consistently

Maintain critical data relationships within databases, across different databases, between different database platforms, and over time. Camouflage uses both deterministic and random approaches to ensure consistency in how sensitive elements are masked and enable repeatable masking process.

Ensure enterprise-class scalability and performance

Mask large volumes of data quickly and easily. Imperva Camouflage Data Masking is engineered to meet the demands of your data-driven business. Platform-specific optimizations enable efficient and scalable masking regardless of database platform or dataset size. An open architecture allows Camouflage to easily adapt to your enterprise environment and existing automation tools.

How Data Masking Reduces Sensitive Data

Classify sensitive data

Automatically locate and categorize sensitive data in your databases. Integrated data classification uses heuristics and statistical analysis to locate personally identifiable information (PII) like name, email, date of birth, SSN and more. Leverage classification results to configure data masking rules.

Choose from multiple transformation techniques

Replace sensitive data with fictional but realistic values using a variety of masking techniques. Choose from pre-defined masking techniques or create custom data transformers. Masked data retains realism of production data and reduces sensitive data exposure, complying with data privacy and protection laws.

Support a broad range of platforms

Get a common interface to mask data across your enterprise data sources. Camouflage supports Oracle, SQL Server, DB2, SAP ASE, Teradata, Netezza, MySQL, PostgreSQL, IMS, Hadoop and more. It also supports a wide variety of operating systems from Windows, UNIX, Linux to mainframe and AS/400.

Specifications and System Requirements

Specification Description
Supported Databases
  • Oracle®
  • SQL Server®
  • DB2® (LUW, z/OS, i)
  • Sybase/SAP ASE® (Sybase)
  • Teradata®
  • Netezza®
  • Amazon RDS
  • Aurora
  • Maria DB
  • MySQL®
  • PostgreSQL®
  • Hadoop HDFS (delimited files)
  • VSAM
  • IMS via export to VSAM (KSDS, ESDS) or QSAM data files
Supported File Formats
  • VSAM
  • QSAM
  • Flat Files (COBOL copybook)
  • XML (including XML embedded in database fields)
  • HL7
  • Delimited files (e.g., CSV)
  • MS Excel
  • Free form text stored within relational databases
  • Image data (PNG, TIFF, JPG, GIF) – via replacement of image file
Note
  • Any operating system on which Java can be installed on can be used to run Imperva Camouflage. This includes the various versions of Windows, Mac OS, Linux/UNIX variants, as well as mainframe.

Resources

Blog

Data Masking Should be Part of Your Data Security Strategy

Explore three reasons data masking should be part of your data security strategy.

Read blog ›
Datasheet

Imperva Camouflage Data Masking

Discover the features and benefits of Imperva Camouflage Data Masking.

Read datasheet ›
Video

Camouflage Product Video

This demo provides an overview of Imperva Camouflage and explains how data is classified and masked.

Watch video ›
Guide

Beginner’s Guide to Data Masking

Explore what data masking is and how it can fortify your defenses against costly data breaches.

View guide ›
Webinar

Pseudonymization and Data Masking for GDPR

Learn how Imperva Camouflage Data Masking can address the GDPR’s pseudonymization requirements.

Watch webinar ›