Unified data masking for the enterprise.

Protect data at rest, in use, and in transit – for production, testing, and analytics environments.

masking icon-1

In-flight integration
and masking

Ensure integrity with a
data product approach.

masking icon copy-1

Dynamic and
static masking

Protect operational,
analytical, and test data.

masking icon copy 2

Structured and unstructured data

Mask all data types
withan extensive set of tools.

K2View gets top scores in the
Gartner Voice of the Customer report

GartnerPeerInsightsLogo_FINAL_onpurple_RGB-1

“High-end security for your sensitive information...”

“Innovative, fast and also scalable...”

“Excellent dynamic and static data masking...”

 


Download Gartner 2021 Data Masking Report

Our unique approach

DM-1

K2View Data Masking is powered by our Data Product Platform, which organizes fragmented data from disparate systems according to data product schemas – customer, order, device, or any other business entity.

data product delivers all the data related to a specific business entity such as a customer, claim, credit card, payment, or device – to authorized data consumers. All the sensitive data of an individual business entity is masked and managed within its own, encrypted Micro-Database.

K2View greatly simplifies the implementation of dynamic data masking for operational use cases like Customer 360, Test Data Management, Legacy Application Modernization, Data Tokenization,  and Data Pipelining.

Data masking orchestration tool

In-flight data masking tools

K2View's in-flight data masking eliminates the need for cumbersome batch data masking processes and risk-prone staging areas, where unmasked data is exposed to potential breaches.

Using our graphical Data Transformation and Orchestration tool, data engineers quickly integrate, cleanse, and mask data from production systems, and make it instantly accessible to authorized data consumers.

A data product approach simplifies data masking complexity, ensuring that customer data is:

  • Complete, with all customer data unified, and sensitive data masked
  • Clean, with data quality policies enforced in flight
  • Compliant, adhering to data privacy regulations (GDPR, CPRA, LGPD,...)
  • Consistent, preserving referential integrity and formatting of masked data, across systems
dynamic data masking

Dynamic data masking

K2View employs dynamic data masking to transform, obscure, or block access to sensitive data based on user roles and privileges.

A broad range of prebuilt, in-line masking functions can be invoked to protect the data. Additionally, real-time and batch data tokenization and detokenization is supported.

dpm-Aug-19-2021-12-44-16-94-PM

Manage and mask unstructured data

Protect unstructured data – such as images, PDFs, text files, and more – with static and dynamic masking capabilities. Replace real photos with fake ones. Use OCR to detect content and enable intelligent masking. Synthetically generate digital versions of receipts, checks, contracts and other items for testing purposes.

By managing unstructured data within the data product schema, referential integrity is ensured, and consistency maintained, across structured and unstructured data.

Extensive and extendible masking functions

K2View Data Masking comes with a comprehensive library of prebuilt masking functions, designed to provide realistic, but fake data, to preserve data formatting and integrity.

The table below shows a few examples, including masking that creates a valid social security number (SSN), selecting (masked) names from name directories, and generating random numbers, as well as address-based zip codes. The library can be easily extended by custom Java functions that implement additional masking functions.

Field Masking function
SSN/National ID Generate valid SSN
Credit card Generate valid number based on card type
First name/Last name/Zip code Select from collection
DOB Shuffle (preserve statistical diversity)
Any String/number Random String/number
Email Concatenation based on new first and last names
Const Static masking based on a pre provided value
Address Based on the provided Zip
IBAN Generate masked values that comply with international banking standards

 

WHITEPAPER
Data-masking-tools-whitepaper

Data masking tools
for data-centric enterprises

Learn about a new, real-time data masking approach, based on data products, that is used by some of the world's most data-intensive enterprises.

Download this whitepaper to understand how, using this unique data model, you can:
Mask in-flight with referential integrity
Manage and anonymize unstructured data
Support both persistent and dynamic data masking
Employ advanced and extendible masking functions
Generate production-grade, realistic, yet fake, data

See in-flight data masking in action