TRADITIONAL METHODS HAVE CHALLENGES
Identifies only a third of sensitive data locations
Only way to identify composite columns is through deep code analysis
Application logic has a lot of important data relationships
Reg-ex and pattern match
Results in >75% False Positives
We particularly like the MENTIS iDiscover module: like other products it can discover sensitive data by inspecting data and metadata but, unlike most other products, it can also do so by introspecting code, which means that this solution goes beyond normal discovery solutions and finds which users and what programs access sensitive data. This information provides complete discovery metadata that is used for downstream masking, monitoring and retirement.
MENTIS offers a number of differentiators, the main one being its support for the introspection of code, for which there is no equivalent functionality.
In the 17 years’ working on this system, there is no way I would have known that.
IDISCOVER™ CUSTOMER ON THE SURPRISING VOLUME OF SENSITIVE DATA THAT THEY DID NOT KNOW WAS IN THEIR SYSTEM
We could never have found all the sensitive data locations that were identified by MENTIS discovery... even with 22 years of PeopleSoft application knowledge.
APPLICATION DIRECTOR, LARGE HEALTHCARE COMPANY