Four Phases of Evaluating and Implementing a Data Masking Solution
The over-riding factor in choosing data masking is for the protection of data privacy by de-identifying sensitive data in non-production environments. The prospect of Personally Identifiable Information (PII) falling into the wrong hands strikes fear among many data center managers. Data security remains the paramount criterion when deciding which data masking solution to choose. Your clients expect it. Industry standards require it. The law demands it.
This white paper provides an overview of the four phases of the Data Masking Lifecycle. This document will also review the data masking methodology, identifying key data masking milestones, an estimate of human capital required for data masking and the timeframe needed to implement and deploy data masking within a typical enterprise.