Top Rated PK Masking Alternatives
(12)
4.5 out of 5
Visit Website
Sponsored
2 PK Masking Reviews
4.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
Here's how.
We strive to keep our reviews authentic.
G2 reviews are an important part of the buying process, and we understand the value they provide to both our customers and buyers. To ensure the value is retained, it's important to make certain that reviews are authentic and trustworthy, which is why G2 requires verified methods to write a review and validates the reviewer's identity before approving. G2 validates the reviewers identity with our moderation process that prevents inauthentic reviews, and we strive to collect reviews in a responsible and ethical manner.

MK
Manik K.
Technical Consultant II
Mid-Market(51-1000 emp.)
What do you like best about PK Masking?
Masking confidential and sensitive information helps to secure the organization's databases from misuse. The best thing is data is protected with minimal risk and good value. Review collected by and hosted on G2.com.
What do you dislike about PK Masking?
Where pk masking is dominating with great use only problem which I feel is the complexity with which organisations are masking the data so that it remains protected and fit for use whenever required or queried. Review collected by and hosted on G2.com.
YS
Yuvaraj S.
Software Engineer
Mid-Market(51-1000 emp.)
There are not enough reviews of PK Masking for G2 to provide buying insight. Below are some alternatives with more reviews:
1
LiveRamp
4.2
(108)
Data Onboarding connects customer data to digital marketing applications and media platforms.
2
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
3

Satori Data Security Platform
4.8
(74)
The Satori Data Security Platform is a highly-available and transparent proxy service that sits in front of your data stores (databases, data warehouses and data lakes).
4

Oracle Data Safe
4.3
(63)
Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database or Oracle Database Cloud Service (Exadata, Virtual Machine, or Bare Metal), Data Safe delivers essential data security capabilities as a service on Oracle Cloud Infrastructure.
5

Clonetab
4.4
(47)
Clonetab provides cloning and refresh of Oracle E-Business Suite and Oracle Database.
6

Informatica Data Security Cloud
4.0
(47)
7
VGS Platform
4.7
(47)
VGS is the modern approach to data security. Its SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.
8

Tonic.ai
4.2
(35)
Tonic.ai is a synthetic data generator with one goal in mind: allowing you to make full use of your data, in full respect of your customers, collaborators, and the law. Our platform's data generation, de-identification, and subsetting tools help you streamline your workflows, decrease outages, and iterate faster without putting any real data at risk. Using pre-trained models and feature extraction, Tonic preserves the constraints, statistical correlations, distributions, and interdependencies that make your data unique. Accelerate your development cycle while advancing data security with synthetic data that looks, acts, and feels as real as its source.
9
Accelario
4.8
(26)
At Accelario we focus on one thing: streamlining the way data is moved and managed across platforms and environments.
10

Informatica Dynamic Data Masking
4.4
(22)
Data security and privacy for data in use by both mission-critical and line-of-business applications.