The Sensitive Data Lifecycle: IBM vs Informatica vs MENTIS

Sensitive data lifecycle starts with the discovery of sensitive data, continuing with its protection (which may involve encryption, tokenization and/or both static and dynamic data masking), and ends with its retirement. Also relevant is monitoring of sensitive data, and who is accessing it, during the course of this lifecycle.

Download this paper by Bloor Research to know each of the vendor’s offerings within each of these areas, beginning with an overview of each company’s suite of (relevant) products.

Comparing Data Security Solution Vendors? 1

What’s inside:

Vendor product suites

Detailed comparison of vendor product suites (relevant to sensitive data lifecycle)

 

How each vendor’s product suite fares in each stage of the sensitive data lifecycle:

  • Discovery
  • Static Data Masking
  • Dynamic Data Masking
  • Monitoring
  • Retirement