Alan Brown wrote:
>IBM Optim can privatize production data for a test environment while
>maintaining your application referential integrity.  It works natively on
>z/OS to create privatized complete clones or subsets of production data.
>There is also a version for the distributed world.

Voltage SecureData Format-Preserving Encryption also provides data masking and 
encryption functionality: with Format-Preserving Encryption, encrypted data can 
be used for test, since it's in the same format (that's, like, why it's called 
Format-Preserving Encryption). This means that if your product data is 
encrypted, you can copy and use it directly for test, or you can encrypt (mask) 
production data when you copy it to test.

More info: http://www.voltage.com/products/data_protection.htm

And some more info:

Voltage offers unique encryption technology that prevents data leakage, 
targeting data protection requirements like PCI-DSS, GLBA, Identity Red Flag, 
SB1386, et al. The Voltage SecureData product takes advantage of the US 
Government standard AES Encryption algorithm in an advanced mode known as 
"Format-Preserving Encryption" (FPE). FPE allows you to encrypt things like 
credit card numbers or addresses, and the encrypted versions match the format 
of the originals (n decimal digits, etc.), thus avoiding the need to redo 
database schema, screens, and the like.

Multiple levels of encryption enable role-based access: Customer Service 
representatives might see only the last four digits of an account or Social 
Security number, whereas applications that need the full number can decrypt it.

With FPE, since the data format is unaltered, only "trusted" applications need 
changes -- typically one or two lines of code -- as most components can just 
use the encrypted value.

And since it's a multi-platform solution, data can reside encrypted in the 
database, traverse the network, and be decrypted only once it reaches its final 
destination.

Combined with our simplified key management, Voltage SecureData adds controlled 
encryption technology to existing applications very easily for regulatory 
compliance, and without the key management headaches that accompany most such 
solutions.
-- 
...phsiii

Phil Smith III
[email protected]
Voltage Security, Inc.
www.voltage.com
(703) 476-4511 (home office)
(703) 568-6662 (cell)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to