Visibility of the sensitive data
Filling gaps for the PII data which wasn't classified
Discovery was important phase for us to know what data resides and where.
Capabilities like vaultless tokenization and masking helps us to maintain security of data when encryption isn't feasible and helps us to comply with various standards for data at rest. Review collected by and hosted on G2.com.
Many enhancement is feasible in centralized data management.
Reporting can also be enhanced. Review collected by and hosted on G2.com.
When it comes to data security, thales has a very wide spectrum. It provides you with end-to-end data security. Review collected by and hosted on G2.com.
kb solutions are a bit limited. You can usually solve problems by opening a case. Review collected by and hosted on G2.com.
It eases the data security with improved compliance time and it also protects cloud migration. What more do you expect from Thales ? Review collected by and hosted on G2.com.
Lot of features and control options makes it bit bulky to operate.. but that's all due to this demanding industry.. can't complaint Review collected by and hosted on G2.com.
confidence and knowing I can do my job safely Review collected by and hosted on G2.com.
I dont have control of program to adjust to my liking. Central point of service, not privy to Review collected by and hosted on G2.com.