Best Software for 2025 is now live!
|| products.size

Best Data Masking Tools

Lauren Worth
LW
Researched and written by Lauren Worth

Data masking software protects an organization’s important data by disguising it with random characters or other data so that it is still usable by the organization but not outside forces.

To qualify for inclusion in the Data Masking category, a product must:

Encrypt data by masking it behind random characters or other data
Allow the application and removal of a mask at will
Provide consistent or random masking

Best Data Masking Software At A Glance

Best for Small Businesses:
Best for Mid-Market:
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Best for Enterprise:
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
83 Listings in Data Masking Available
(82)4.5 out of 5
4th Easiest To Use in Data Masking software
View top Consulting Services for Salesforce Shield
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Ease of Use
    15
    Privacy Management
    15
    Data Security
    11
    Access Control
    7
    Cons
    Learning Curve
    6
    Performance Issues
    5
    Access Control Issues
    4
    Complexity
    4
    Complexity Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Shield features and usability ratings that predict user satisfaction
    8.9
    Ease of Admin
    Average: 8.6
    8.3
    Static Masking
    Average: 8.5
    6.7
    Dynamic Masking
    Average: 8.5
    8.3
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    584,242 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78,543 employees on LinkedIn®
    Ownership
    NYSE:CRM
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 32% Enterprise
Salesforce Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Ease of Use
15
Privacy Management
15
Data Security
11
Access Control
7
Cons
Learning Curve
6
Performance Issues
5
Access Control Issues
4
Complexity
4
Complexity Issues
4
Salesforce Shield features and usability ratings that predict user satisfaction
8.9
Ease of Admin
Average: 8.6
8.3
Static Masking
Average: 8.5
6.7
Dynamic Masking
Average: 8.5
8.3
Sensitive Fields
Average: 8.8
Seller Details
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
584,242 Twitter followers
LinkedIn® Page
www.linkedin.com
78,543 employees on LinkedIn®
Ownership
NYSE:CRM
(14)5.0 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AI-Driven Data Anonymization For Knowledge Management -> Nymiz detects sensitive data in unstructured files (doc, docx, xls, xlsx, jpg, tlf, png, pdf) and also in structured data (databases), and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 21% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nymiz features and usability ratings that predict user satisfaction
    0.0
    No information available
    10.0
    Static Masking
    Average: 8.5
    10.0
    Dynamic Masking
    Average: 8.5
    10.0
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Nymiz
    Year Founded
    2019
    HQ Location
    Bilbao, ES
    Twitter
    @nymizglobal
    192 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AI-Driven Data Anonymization For Knowledge Management -> Nymiz detects sensitive data in unstructured files (doc, docx, xls, xlsx, jpg, tlf, png, pdf) and also in structured data (databases), and

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 21% Enterprise
Nymiz features and usability ratings that predict user satisfaction
0.0
No information available
10.0
Static Masking
Average: 8.5
10.0
Dynamic Masking
Average: 8.5
10.0
Sensitive Fields
Average: 8.8
Seller Details
Seller
Nymiz
Year Founded
2019
HQ Location
Bilbao, ES
Twitter
@nymizglobal
192 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(26)4.8 out of 5
2nd Easiest To Use in Data Masking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Accelario enhances efficiency and excellence in software development with advanced AI-powered Anonymization and Database Virtualization technologies. By delivering real, compliant, and on-demand test

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 46% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Accelario Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    10
    Efficiency
    10
    Time-Saving
    10
    Automation
    7
    Data Management
    7
    Cons
    Learning Curve
    5
    Expensive
    2
    Improvement Needed
    2
    Integration Issues
    2
    Lengthy Setup
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Accelario features and usability ratings that predict user satisfaction
    9.3
    Ease of Admin
    Average: 8.6
    8.9
    Static Masking
    Average: 8.5
    9.0
    Dynamic Masking
    Average: 8.5
    8.9
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Accelario
    Company Website
    HQ Location
    New York NY
    Twitter
    @Accelario2
    45 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Accelario enhances efficiency and excellence in software development with advanced AI-powered Anonymization and Database Virtualization technologies. By delivering real, compliant, and on-demand test

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 46% Mid-Market
  • 38% Small-Business
Accelario Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
10
Efficiency
10
Time-Saving
10
Automation
7
Data Management
7
Cons
Learning Curve
5
Expensive
2
Improvement Needed
2
Integration Issues
2
Lengthy Setup
2
Accelario features and usability ratings that predict user satisfaction
9.3
Ease of Admin
Average: 8.6
8.9
Static Masking
Average: 8.5
9.0
Dynamic Masking
Average: 8.5
8.9
Sensitive Fields
Average: 8.8
Seller Details
Seller
Accelario
Company Website
HQ Location
New York NY
Twitter
@Accelario2
45 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
(21)4.5 out of 5
View top Consulting Services for Oracle Data Masking and Subsetting
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other act

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Data Masking and Subsetting features and usability ratings that predict user satisfaction
    7.8
    Ease of Admin
    Average: 8.6
    9.2
    Static Masking
    Average: 8.5
    9.5
    Dynamic Masking
    Average: 8.5
    9.2
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    824,139 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    199,405 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other act

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Enterprise
  • 24% Mid-Market
Oracle Data Masking and Subsetting features and usability ratings that predict user satisfaction
7.8
Ease of Admin
Average: 8.6
9.2
Static Masking
Average: 8.5
9.5
Dynamic Masking
Average: 8.5
9.2
Sensitive Fields
Average: 8.8
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
824,139 Twitter followers
LinkedIn® Page
www.linkedin.com
199,405 employees on LinkedIn®
Ownership
NYSE:ORCL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Data security and privacy for data in use by both mission-critical and line-of-business applications.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 27% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Informatica Dynamic Data Masking features and usability ratings that predict user satisfaction
    8.2
    Ease of Admin
    Average: 8.6
    8.2
    Static Masking
    Average: 8.5
    8.8
    Dynamic Masking
    Average: 8.5
    8.5
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    Redwood City, CA
    Twitter
    @Informatica
    102,081 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,576 employees on LinkedIn®
    Ownership
    NYSE: INFA
Product Description
How are these determined?Information
This description is provided by the seller.

Data security and privacy for data in use by both mission-critical and line-of-business applications.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 27% Small-Business
Informatica Dynamic Data Masking features and usability ratings that predict user satisfaction
8.2
Ease of Admin
Average: 8.6
8.2
Static Masking
Average: 8.5
8.8
Dynamic Masking
Average: 8.5
8.5
Sensitive Fields
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
Redwood City, CA
Twitter
@Informatica
102,081 Twitter followers
LinkedIn® Page
www.linkedin.com
5,576 employees on LinkedIn®
Ownership
NYSE: INFA
(35)4.2 out of 5
Optimized for quick response
3rd Easiest To Use in Data Masking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tonic.ai offers a developer platform for data de-identification, synthesis, subsetting, and provisioning to keep test data secure, accessible, and in sync across testing and development environments.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 34% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tonic.ai features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.6
    8.5
    Static Masking
    Average: 8.5
    7.6
    Dynamic Masking
    Average: 8.5
    8.5
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tonic.ai
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco, California
    Twitter
    @tonicfakedata
    682 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tonic.ai offers a developer platform for data de-identification, synthesis, subsetting, and provisioning to keep test data secure, accessible, and in sync across testing and development environments.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 34% Small-Business
Tonic.ai features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.6
8.5
Static Masking
Average: 8.5
7.6
Dynamic Masking
Average: 8.5
8.5
Sensitive Fields
Average: 8.8
Seller Details
Seller
Tonic.ai
Company Website
Year Founded
2018
HQ Location
San Francisco, California
Twitter
@tonicfakedata
682 Twitter followers
LinkedIn® Page
www.linkedin.com
94 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 61% Mid-Market
    • 27% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Satori Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    11
    Security
    11
    Ease of Use
    8
    Data Protection
    7
    Integrations
    7
    Cons
    Complexity
    3
    Slow Data Transfer
    3
    Slow Performance
    3
    Difficult Setup
    2
    Improvement Needed
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Satori Data Security Platform features and usability ratings that predict user satisfaction
    8.8
    Ease of Admin
    Average: 8.6
    9.4
    Static Masking
    Average: 8.5
    9.0
    Dynamic Masking
    Average: 8.5
    9.3
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Satori
    Company Website
    Year Founded
    2019
    HQ Location
    Rehovot, Israel
    Twitter
    @SatoriCyber
    303 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    119 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can

Users
  • Software Engineer
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 61% Mid-Market
  • 27% Enterprise
Satori Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
11
Security
11
Ease of Use
8
Data Protection
7
Integrations
7
Cons
Complexity
3
Slow Data Transfer
3
Slow Performance
3
Difficult Setup
2
Improvement Needed
2
Satori Data Security Platform features and usability ratings that predict user satisfaction
8.8
Ease of Admin
Average: 8.6
9.4
Static Masking
Average: 8.5
9.0
Dynamic Masking
Average: 8.5
9.3
Sensitive Fields
Average: 8.8
Seller Details
Seller
Satori
Company Website
Year Founded
2019
HQ Location
Rehovot, Israel
Twitter
@SatoriCyber
303 Twitter followers
LinkedIn® Page
www.linkedin.com
119 employees on LinkedIn®
(47)4.7 out of 5
1st Easiest To Use in Data Masking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Very Good Security (“VGS”) makes it easy for customers to collect, protect and share sensitive financial data in a way that accelerates revenue, eliminates risk, ensures compliance, and drives profita

    Users
    • Software Engineer
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 51% Mid-Market
    • 45% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VGS Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance
    2
    Compliance Management
    2
    Ease of Use
    2
    Audit Management
    1
    Customer Support
    1
    Cons
    Audit Issues
    1
    Evidence Collection
    1
    Expensive
    1
    Limited Functionality
    1
    Manual Intervention Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VGS Platform features and usability ratings that predict user satisfaction
    9.3
    Ease of Admin
    Average: 8.6
    9.5
    Static Masking
    Average: 8.5
    9.5
    Dynamic Masking
    Average: 8.5
    9.4
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    San Francisco, California
    Twitter
    @getvgs
    1,369 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Very Good Security (“VGS”) makes it easy for customers to collect, protect and share sensitive financial data in a way that accelerates revenue, eliminates risk, ensures compliance, and drives profita

Users
  • Software Engineer
Industries
  • Financial Services
  • Banking
Market Segment
  • 51% Mid-Market
  • 45% Small-Business
VGS Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance
2
Compliance Management
2
Ease of Use
2
Audit Management
1
Customer Support
1
Cons
Audit Issues
1
Evidence Collection
1
Expensive
1
Limited Functionality
1
Manual Intervention Required
1
VGS Platform features and usability ratings that predict user satisfaction
9.3
Ease of Admin
Average: 8.6
9.5
Static Masking
Average: 8.5
9.5
Dynamic Masking
Average: 8.5
9.4
Sensitive Fields
Average: 8.8
Seller Details
Year Founded
2015
HQ Location
San Francisco, California
Twitter
@getvgs
1,369 Twitter followers
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    CA Test Data Manager uniquely combines elements of data subsetting, masking, synthetic, cloning and on-demand data generation to enable testing teams to meet the agile testing needs of their organizat

    Users
    No information available
    Industries
    • Banking
    • Accounting
    Market Segment
    • 48% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CA Test Data Manager features and usability ratings that predict user satisfaction
    8.5
    Ease of Admin
    Average: 8.6
    7.5
    Static Masking
    Average: 8.5
    8.1
    Dynamic Masking
    Average: 8.5
    7.9
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Broadcom
    Year Founded
    1991
    HQ Location
    San Jose, CA
    Twitter
    @broadcom
    59,257 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    61,034 employees on LinkedIn®
    Ownership
    NASDAQ: CA
Product Description
How are these determined?Information
This description is provided by the seller.

CA Test Data Manager uniquely combines elements of data subsetting, masking, synthetic, cloning and on-demand data generation to enable testing teams to meet the agile testing needs of their organizat

Users
No information available
Industries
  • Banking
  • Accounting
Market Segment
  • 48% Small-Business
  • 33% Enterprise
CA Test Data Manager features and usability ratings that predict user satisfaction
8.5
Ease of Admin
Average: 8.6
7.5
Static Masking
Average: 8.5
8.1
Dynamic Masking
Average: 8.5
7.9
Sensitive Fields
Average: 8.8
Seller Details
Seller
Broadcom
Year Founded
1991
HQ Location
San Jose, CA
Twitter
@broadcom
59,257 Twitter followers
LinkedIn® Page
www.linkedin.com
61,034 employees on LinkedIn®
Ownership
NASDAQ: CA
(63)4.3 out of 5
5th Easiest To Use in Data Masking software
View top Consulting Services for Oracle Data Safe
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security con

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 44% Enterprise
    • 29% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Data Safe features and usability ratings that predict user satisfaction
    8.1
    Ease of Admin
    Average: 8.6
    8.5
    Static Masking
    Average: 8.5
    8.6
    Dynamic Masking
    Average: 8.5
    9.1
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    824,139 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    199,405 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security con

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 44% Enterprise
  • 29% Small-Business
Oracle Data Safe features and usability ratings that predict user satisfaction
8.1
Ease of Admin
Average: 8.6
8.5
Static Masking
Average: 8.5
8.6
Dynamic Masking
Average: 8.5
9.1
Sensitive Fields
Average: 8.8
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
824,139 Twitter followers
LinkedIn® Page
www.linkedin.com
199,405 employees on LinkedIn®
Ownership
NYSE:ORCL
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Enterprise
    • 32% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Informatica Data Security Cloud features and usability ratings that predict user satisfaction
    7.9
    Ease of Admin
    Average: 8.6
    7.9
    Static Masking
    Average: 8.5
    8.4
    Dynamic Masking
    Average: 8.5
    8.9
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    Redwood City, CA
    Twitter
    @Informatica
    102,081 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,576 employees on LinkedIn®
    Ownership
    NYSE: INFA
Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Enterprise
  • 32% Small-Business
Informatica Data Security Cloud features and usability ratings that predict user satisfaction
7.9
Ease of Admin
Average: 8.6
7.9
Static Masking
Average: 8.5
8.4
Dynamic Masking
Average: 8.5
8.9
Sensitive Fields
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
Redwood City, CA
Twitter
@Informatica
102,081 Twitter followers
LinkedIn® Page
www.linkedin.com
5,576 employees on LinkedIn®
Ownership
NYSE: INFA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 59% Enterprise
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Informatica Persistent Data Masking features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.6
    9.2
    Static Masking
    Average: 8.5
    7.5
    Dynamic Masking
    Average: 8.5
    8.8
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    Redwood City, CA
    Twitter
    @Informatica
    102,081 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,576 employees on LinkedIn®
    Ownership
    NYSE: INFA
Product Description
How are these determined?Information
This description is provided by the seller.

Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain

Users
No information available
Industries
No information available
Market Segment
  • 59% Enterprise
  • 29% Mid-Market
Informatica Persistent Data Masking features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.6
9.2
Static Masking
Average: 8.5
7.5
Dynamic Masking
Average: 8.5
8.8
Sensitive Fields
Average: 8.8
Seller Details
Year Founded
1993
HQ Location
Redwood City, CA
Twitter
@Informatica
102,081 Twitter followers
LinkedIn® Page
www.linkedin.com
5,576 employees on LinkedIn®
Ownership
NYSE: INFA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Apache Atlas provides scalable governance for Enterprise Hadoop that is driven by metadata.

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 44% Mid-Market
    • 31% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Apache Atlas Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Efficiency
    2
    Ease of Use
    1
    Functionality
    1
    Cons
    Difficult Setup
    1
    Onboarding Difficulty
    1
    Slow Performance
    1
    Small Business Challenges
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Apache Atlas features and usability ratings that predict user satisfaction
    9.2
    Ease of Admin
    Average: 8.6
    6.7
    Static Masking
    Average: 8.5
    5.8
    Dynamic Masking
    Average: 8.5
    6.7
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Wakefield, MA
    Twitter
    @TheASF
    66,229 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,291 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Apache Atlas provides scalable governance for Enterprise Hadoop that is driven by metadata.

Users
No information available
Industries
  • Computer Software
Market Segment
  • 44% Mid-Market
  • 31% Small-Business
Apache Atlas Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Efficiency
2
Ease of Use
1
Functionality
1
Cons
Difficult Setup
1
Onboarding Difficulty
1
Slow Performance
1
Small Business Challenges
1
Apache Atlas features and usability ratings that predict user satisfaction
9.2
Ease of Admin
Average: 8.6
6.7
Static Masking
Average: 8.5
5.8
Dynamic Masking
Average: 8.5
6.7
Sensitive Fields
Average: 8.8
Seller Details
Year Founded
1999
HQ Location
Wakefield, MA
Twitter
@TheASF
66,229 Twitter followers
LinkedIn® Page
www.linkedin.com
2,291 employees on LinkedIn®
(15)4.3 out of 5
6th Easiest To Use in Data Masking software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Immuta enables organizations to unlock value from their cloud data by protecting it and providing secure access. The Immuta Data Security Platform provides sensitive data discovery, security and acces

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Immuta Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    5
    Features
    3
    Access Control
    2
    Customization
    2
    Data Classification
    2
    Cons
    Complex Setup
    2
    Difficult Interface
    2
    Difficult Setup
    2
    Manual Processes
    2
    Poor Interface Design
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Immuta features and usability ratings that predict user satisfaction
    8.6
    Ease of Admin
    Average: 8.6
    7.9
    Static Masking
    Average: 8.5
    7.1
    Dynamic Masking
    Average: 8.5
    7.1
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Immuta
    Year Founded
    2015
    HQ Location
    Boston, Massachusetts
    Twitter
    @immuta
    38,779 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    226 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Immuta enables organizations to unlock value from their cloud data by protecting it and providing secure access. The Immuta Data Security Platform provides sensitive data discovery, security and acces

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Enterprise
  • 20% Mid-Market
Immuta Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
5
Features
3
Access Control
2
Customization
2
Data Classification
2
Cons
Complex Setup
2
Difficult Interface
2
Difficult Setup
2
Manual Processes
2
Poor Interface Design
2
Immuta features and usability ratings that predict user satisfaction
8.6
Ease of Admin
Average: 8.6
7.9
Static Masking
Average: 8.5
7.1
Dynamic Masking
Average: 8.5
7.1
Sensitive Fields
Average: 8.8
Seller Details
Seller
Immuta
Year Founded
2015
HQ Location
Boston, Massachusetts
Twitter
@immuta
38,779 Twitter followers
LinkedIn® Page
www.linkedin.com
226 employees on LinkedIn®
(20)4.4 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    K2view Data Product Platform gets your data AI-ready: protected, complete, and accessible in a split-second. AI-ready datasets are packaged as products, allowing you to reuse them at scale and across

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Small-Business
    • 30% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • K2View Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Integration
    3
    Easy Integrations
    3
    Data Management
    2
    Data Security
    2
    Ease of Use
    2
    Cons
    Difficult Learning Curve
    3
    Complexity
    2
    Difficult Learning
    2
    Learning Curve
    2
    Complexity Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • K2View features and usability ratings that predict user satisfaction
    8.3
    Ease of Admin
    Average: 8.6
    8.3
    Static Masking
    Average: 8.5
    8.7
    Dynamic Masking
    Average: 8.5
    8.0
    Sensitive Fields
    Average: 8.8
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    K2View
    Year Founded
    2009
    HQ Location
    Dallas, TX
    Twitter
    @K2View
    134 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    191 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

K2view Data Product Platform gets your data AI-ready: protected, complete, and accessible in a split-second. AI-ready datasets are packaged as products, allowing you to reuse them at scale and across

Users
No information available
Industries
No information available
Market Segment
  • 40% Small-Business
  • 30% Mid-Market
K2View Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Integration
3
Easy Integrations
3
Data Management
2
Data Security
2
Ease of Use
2
Cons
Difficult Learning Curve
3
Complexity
2
Difficult Learning
2
Learning Curve
2
Complexity Management
1
K2View features and usability ratings that predict user satisfaction
8.3
Ease of Admin
Average: 8.6
8.3
Static Masking
Average: 8.5
8.7
Dynamic Masking
Average: 8.5
8.0
Sensitive Fields
Average: 8.8
Seller Details
Seller
K2View
Year Founded
2009
HQ Location
Dallas, TX
Twitter
@K2View
134 Twitter followers
LinkedIn® Page
www.linkedin.com
191 employees on LinkedIn®

Learn More About Data Masking Software

What is Data Masking Software?

Data masking is a technique used by organizations to protect sensitive data from unintended exposure. Data masking is also sometimes referred to as data obfuscation. There are a number of masking techniques, including data substitution, data shuffling, translating numbers into number ranges, nulling or deletion, character scrambling, and more. Companies use data masking software to shield sensitive data such as personally identifiable information (PII) or sensitive customer information while maintaining the data’s functional value. 

Data masking software ensures that unauthorized people do not have visibility into real, sensitive data records by masking the data. Companies commonly utilize data masking to limit the sensitive data visible to their employees. This protects against both employee mistakes in handling sensitive data and malicious insider threat actors seeking to steal sensitive information.

For example, credit card numbers in a database can be redacted or replaced with false data in a billing software application so that the real numbers are not exposed and visible to frontline employees. A masked credit card number would be structurally similar and maintain the sixteen-digit credit card number format of "xxxx-xxxx-xxxx-xxxx" that the company’s billing software application expects this data to be in, while not providing the actual credit card number. 

A common use case for data masking is providing non-production but realistic data for software development and testing. Applications must be developed and tested using real data to ensure the software meets the company or customer’s needs, but providing sensitive data to a development team exposes the data to people who don’t need to be authorized to view it. For example, if an educational software company is developing a solution to manage student testing data, having specific individuals’ testing information like real names, addresses, test scores, academic grades, and so on is not necessary to develop the tool. Having data based on real data but scrambled or obfuscated is sufficient to test the software. As long as the data is functionally correct, the software developers don’t need to know the precise, sensitive data to develop and test the software solution. 

Data masking is most often for non-production purposes like software development and testing mentioned above, but it can also be used in production environments to control which users have access to sensitive information. For example, employees in a call center may need to look up a customer’s account information in a CRM software to process a payment but do not need access to the customer’s exact payment details like bank account and routing numbers to complete the transaction. The company must retain the actual bank account information to process the transaction, but this sensitive information does not need to be visible to the call center employee, so the company masks that data for the call center employee in their call center software application.

Other use cases for using masked data include:

  • Sales demonstrations of software programs
  • User training modules
  • Sandbox experiments

What Types of Data Masking Software Exist?

Static data masking

Static data masking solutions allow sensitive datasets to be masked while the data is at rest. This usually entails a complete copy of a masked dataset. Most commonly, this is used for non-production use cases like providing datasets for software development and testing purposes.

Dynamic data masking

Dynamic data masking solutions allow sensitive data to be masked while the data is in use, and the masking can be based on the attributes of the person viewing it. Most commonly, this is used for in-production use cases. For example, frontline employees or employees in a specific geographic area can view the sensitive dataset dynamically masked based on their role type in real time. This software can be particularly beneficial for customer service use cases.

What are the Common Features of Data Masking Software?

The following are some core features within data masking software that can help users achieve their business goals:

Performance with large datasets: Data masking software must be able to meet the scale and speed of masking large datasets, whether the masking is performed on the database level itself, between application layers, or within the application itself. This is especially important for masking enterprise data and big datasets.

Preserving data characteristics: Some applications expect data to be in a specific format, such as a 16-digit credit card number. For masked data to be utilized in the application, the masked data must also conform to these data characteristics like number length.

Deterministic masking: Deterministic masking allows for the masked data to be consistently masked across multiple tables and applications. For example, if a data record has a first name of “Joan” then the masked name of “Claire” will appear consistently and uniformly across the masked dataset and applications it is used in. This is important especially for in-production customer service use cases where company employees interact with multiple applications like CRMs and billing applications to assist customers. Having consistently matching masked data in those disparate applications can aid in providing the best customer assistance.

Cloud-compatible data masking: Today, many companies are shifting from on-premises data stores to the cloud and are utilizing infrastructure as a service, platform as a service, and software as a service tools. Many data masking tools offer solutions to protect data regardless of where it is used.

What are the Benefits of Data Masking Software?

Reduce unintended data exposure: The main purpose of using data masking software is to protect the data from unintended exposure while maintaining the data’s usability. Data masking software obfuscates the data for audiences that are not authorized to view the data. 

Improve access control to data: Data masking software enables companies to only expose data on a need-to-know basis. Using dynamic data masking, in particular, can assist a company with enabling role-based data visibility. So a frontline worker may not be able to see specific customer data like their billing address or phone number within a CRM application, but their manager would have the authorization to do so.

Meet data protection compliance regulations: Data protection regulations and data privacy laws require businesses to safeguard data such as personally identifiable information. Data masking is a technique used to limit unintended data exposure and meet data protection by design and default requirements. Data masking can assist in meeting industry or governmental regulations such as GDPR, PCI DSS, or HIPAA.

Who Uses Data Masking Software?

InfoSec and IT professionals: Information security (InfoSec) and IT professionals implement and manage data masking tools to achieve their company’s data security, data privacy, and data usage goals.

Software developers: Software developers are the end users of data masked using data masking software. Using masked data allows software developers to use test data based on real data but without the risk of using plain text.

Frontline employees: Frontline and other employees use masked data in their day-to-day interactions in the business applications necessary to complete their work. Having masked data in their applications protects them from accidentally viewing, sharing, or using data they are not authorized to use.

What are the Alternatives to Data Masking Software?

Alternatives to data masking software can replace this type of software, either partially or completely:

Data de-identification and pseudonymity software: De-identification and pseudonymity software is similar to data masking software in that it focuses on anonymization by replacing real data with artificial data. However, the difference shows in the end states; data masking obfuscates the data while retaining the original data, while de-identified data is not masked but de-identified through pseudonymization to prevent re-identification.

Synthetic data software: Synthetic data software helps companies create artificial datasets, including images, text, and other data from scratch using computer-generated imagery (CGI), generative neural networks (GANs), and heuristics. Synthetic data is most commonly used for testing and training machine learning models.

Encryption software: Encryption software protects data by converting plaintext into scrambled letters known as ciphertext, which can only be decrypted using the appropriate encryption key. Most commonly, encrypted data cannot be used within applications and must first be decrypted prior to use within applications (with some exceptions with homomorphic encryption techniques). 

Software Related to Data Masking Software

Related solutions that can be used together with data masking software include:

Sensitive data discovery software: To determine what data to protect using data masking software, companies must first identify their sensitive data. Companies can use sensitive data discovery software to assist in and automate that process. These solutions search structured, unstructured, and semi-structured data stored in on-premises databases, cloud, email servers, websites, applications, etc.

Challenges with Data Masking Software

Software solutions can come with their own set of challenges. 

Sensitive data discovery: To protect data using data masking techniques, the data a company wants to protect must first be identified. The type of data that companies seek to mask can include personally identifiable information (PII), protected health information (PHI), payment card industry (PCI) data, intellectual property (IP), and other important business data. Often, this data is stored across multiple company systems, including databases, applications, and user endpoints. 

Defining role-based-access policies: Using dynamic masking that modifies what data is masked or visible based on a viewer’s role type requires those roles to be defined by company policy. This requires companies to invest in defining those roles for the data masking software to be effective.

Re-identification: A common concern of using masked data is the risk of it being re-identified using other context clues resulting in a data breach. This could be by combining the data with other datasets to re-identify it or simply by not masking enough data. For example, in a CRM system, if a customer’s first and last name is redacted, but not their email address, which is often a person’s first and last name, it can be easy to infer who the customer is.

How to Buy Data Masking Software

Requirements Gathering (RFI/RFP) for Data Masking Software

Users must determine their specific needs to prepare for data masking. They can answer the questions below to get a better understanding:

  • What is the business purpose? 
  • Does the user need static data masking solutions, or do they need dynamic data masking solutions?
  • What kind of data is the user trying to mask? 
  • Is it financial information, classified information, proprietary business information, personally identifiable information, or other sensitive data?
  • Have they identified where those sensitive data stores are--on-premises or in the cloud?
  • What specific software applications is that data used in? 
  • What APIs do they need? 
  • Who within the company should have the authorization to view sensitive data, and who should be served masked data? 

Compare Data Masking Software Products

Create a long list

Buyers can visit g2.com’s Data Masking Software category, read reviews about data masking products, and determine which products fit their businesses’ specific needs. They can then create a list of products that match those needs.

Create a short list

After creating a long list, buyers can review their choices and eliminate some products to create a shorter, more precise list.

Conduct demos

Once a user has narrowed down their software search, they can connect with the vendor to view demonstrations of the software product and how it relates to their company’s specific use cases. They can ask about the masking methods--from substitution to shuffling and more, and where their solution sits--at the database level, between the application and the database, or within the application. Buyers can also ask about integrations with their existing tech stack, licensing methods, and pricing—whether fees are based on the number of projects, databases, executions, etc.

Selection of Data Masking Software

Choose a selection team

Buyers must determine which team is responsible for implementing and managing this software. Often, that may be someone from the IT team and the InfoSec team. They should also include end users on their selection team, such as software developers or frontline employees. It is important to have a representative from the financial team on the selection committee to ensure the license is within budget. 

Negotiation

Buyers should get specific answers to the cost of the license and how it is priced, and if the data masking software is based on database size, features, or execution. They must keep in mind the company’s data masking needs for today and the future.

Final decision

The final decision will come down to whether the software solution meets the technical requirements, the usability, the implementation, other support, expected return on investment, and more. Ideally, the final decision will be made by the IT team in conjunction with InfoSec or data privacy teams, alongside input from other stakeholders like software development teams.