DYNAMIC DATA MASKING

[et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/masking.jpg” background_size=”initial” custom_padding=”1px||367px|||” fb_built=”1″ _i=”0″ _address=”0″][et_pb_row _builder_version=”3.26.6″ transform_scale_last_edited=”on|desktop” transform_translate=”0px|151px” transform_translate_last_edited=”on|phone” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|phone” _i=”0″ _address=”0.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”0.0.0.0″]

dynamic data masking

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”22px” _i=”1″ _address=”0.0.0.1″]

Does your masking solution have Location-aware and conditional masking abilities?

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.26.6″ transform_translate=”0px|151px” transform_translate_linked=”off” _i=”1″ _address=”0.1″][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”0″ _address=”0.1.0″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0OCJ9fQ==@” button_text=”LIVE DEMO” button_alignment=”center” _builder_version=”3.27.3″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.0.0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”0.1.1″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NjUifX0=@” button_text=”DATASHEET” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.1.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”1″ _address=”1″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”1.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”1.0.0.0″]

traditional methods have challenges

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”1.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”1.1.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” header_font_size=”27px” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”20px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”1.1.0.0″]

FLEXIBILITY

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” custom_padding=”||0px|||” _i=”1″ _address=”1.1.0.1″]

Policy based masking for users, program, condition while having flexible approaches based on application architecture

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”1.1.1″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”27px” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”20px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”1.1.1.0″]

OPTIMAL PERFORMANCE

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”1.1.1.1″]

Ensure Dynamic Data Masking does not affect the performance of the production systems while maintaining data consistency

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”1.1.2″][et_pb_text _builder_version=”3.27.4″ header_font_size=”27px” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”20px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”1.1.2.0″]

SCALABILITY

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”1.1.2.1″]

Support all key data sources – structured, unstructured, cloud and big data sources

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”2″ _address=”2″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”2.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”2.0.0.0″]

How is iMASK™ better

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”2.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”2.1.0″][et_pb_text _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” _i=”0″ _address=”2.1.0.0″]

SOLUTION THAT DOES IT ALL

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” text_text_align_phone=”center” text_text_align_last_edited=”on|phone” _i=”1″ _address=”2.1.0.1″]

Only solution that offers user, role, program, location and condition based dynamic data masking 

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” _i=”2″ _address=”2.1.0.2″]

CompREhensive

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” hover_enabled=”0″ text_text_align=”right” text_text_align_phone=”center” text_text_align_last_edited=”on|phone” _i=”3″ _address=”2.1.0.3″]

Masking at both database layer and application layer like forms, pages, reports.

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”2.1.1″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/fingerprint_2018-1.png” _builder_version=”3.26.6″ _i=”0″ _address=”2.1.1.0″][/et_pb_image][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”2.1.2″][et_pb_text content_phone=”

DESIGN APPROACHES

” content_last_edited=”on|phone” _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”2.1.2.0″]

DESIGN APPROACHES

[/et_pb_text][et_pb_text content_phone=”

Various approaches depending upon database and application architecture

” content_last_edited=”on|phone” _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” _i=”1″ _address=”2.1.2.1″]

Various approaches depending upon database and application architecture

 

[/et_pb_text][et_pb_text content_phone=”

Blended Masking

” content_last_edited=”on|phone” _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”2″ _address=”2.1.2.2″]

Blended Masking

[/et_pb_text][et_pb_text content_phone=”

Concurrent static and dynamic masking for masking rollouts

” content_last_edited=”on|phone” _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” _i=”3″ _address=”2.1.2.3″]

Concurrent static and dynamic masking for masking rollouts

 

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/sample-64_0.jpg” fb_built=”1″ _i=”3″ _address=”3″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”3.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”3.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”3.0.0.0″]

mentis advantages

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.1.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”29px” _i=”0″ _address=”3.1.0.0″]

GENERATION

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.1.0.1″]

Generating masked data sets for testing and machine learning

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1.1″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”3.1.1.0″]

DEV OPS INTERGRATION

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.1.1.1″]

Integrate easily with replication process with choice of in-app or API based execution

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.1.2″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”3.1.2.0″]

OPTIMAL PERFORMANCE

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.1.2.1″]

Runs at the target datasource

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.2.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”29px” _i=”0″ _address=”3.2.0.0″]

ENTERPRISE WIDE

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” header_text_color=”#ffffff” _i=”1″ _address=”3.2.0.1″]

Common and Consistent discovery methods to find all sensitive data across structured, un-structured, cloud and big data sources

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.2.1″][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2.2″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”3.2.2.0″]

compliance

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.2.2.1″]

Reports generated for compliance requirements and Privacy Impact Assessment

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”4″ _address=”4″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”4.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”4.0.0.0″]

accolades

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ _i=”1″ _address=”4.1″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.1.0″][et_pb_slider show_image_video_mobile=”on” _builder_version=”3.27.3″ custom_padding=”50px||51px|||” _i=”0″ _address=”4.1.0.0″][et_pb_slide heading=”philip howard” image=”http://zero2compliance.com/wp-content/uploads/2019/08/BLOOR-LOGO-RGB-.png” _builder_version=”3.27.3″ header_text_align=”center” body_text_align=”justify” background_color=”rgba(0,0,0,0)” background_enable_color=”on” child_filter_saturate=”98%” child_filter_brightness=”150%” child_filter_contrast=”115%” child_mix_blend_mode=”screen” hover_enabled=”0″ _i=”0″ _address=”4.1.0.0.0″]

…few if any competitors can match MENTIS’ choices for dynamic masking or can offer co-existent static and dynamic masking.

[/et_pb_slide][et_pb_slide heading=”philip howard” image=”http://zero2compliance.com/wp-content/uploads/2019/08/BLOOR-LOGO-RGB-.png” _builder_version=”3.27.3″ header_text_align=”center” body_text_align=”justify” background_color=”rgba(0,0,0,0)” background_enable_color=”on” child_filter_saturate=”98%” child_filter_brightness=”150%” child_filter_contrast=”115%” child_mix_blend_mode=”screen” hover_enabled=”0″ _i=”1″ _address=”4.1.0.0.1″]

As a demonstration of its vision, Mentis’ DDM incorporates user location data and allows creation of location-aware masking policies.

[/et_pb_slide][et_pb_slide heading=”iMask tool is one of the unique software tools that I have used. This intelligent tool has reduced my number of hours working on my tasks in the last project to a great extent. Also, it can be embedded with the product in order to get the sanity and smoke testing to work as security acceptance testing as part of pre-deployment checks and approval. There are many examples wherein the approach of the tool has helped me, prompting to use the real-life cases instead of internal innovation at place.” _builder_version=”3.27″ header_font=”Avenir||||||||” header_text_align=”center” header_font_size=”22px” body_font=”fun city level 2||||||||” body_line_height=”2em” background_color=”rgba(0,0,0,0)” background_enable_color=”on” custom_padding=”||||false|false” _i=”2″ _address=”4.1.0.0.2″]

LEADING FINANCIAL INSTITUTION

[/et_pb_slide][/et_pb_slider][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”5″ _address=”5″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”5.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”5.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”5.0.0.0″]

resources

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″ min_height=”294px”]

IMASK™ – MASK SEAMLESSLY

Dynamic Data Masking. Conditional and Location-Aware. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NjUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”5.2.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Primatics Financial – Sensitive Data Discovery, iScramble™ & iMask™ for DB

Financial Services Software Manufacturer Chooses MENTIS to Protect Customers’ Sensitive Data

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0OTcifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”5.2.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″ min_height=”296px”]

Securing Coppin State From Discovery To Masking In Peoplesoft Environments

Securing Coppin State From Discovery To Masking In Peoplesoft Environments.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTYifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”5.2.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

A fully Compliant Solution for a Top Swiss Bank

Sensitive data assessment for cloud migration, cross border sharing and compliance.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”5.4.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” hover_enabled=”0″ _i=”0″ _address=”0″]

Airline – User and Role Based Masking

User and Role Based Masking for a Leading Airline in Canada.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MzAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”5.4.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Integrated Data Masking for Oracle E-Business

Protecting Sensitive Data in Production and Non-Production Applications and Databases.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0ODcifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”5.4.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Integrated Data Masking for PeopleSoft Enterprise

Protecting Sensitive Data in Production and Non-Production Applications and Databases.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MDEifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”5.6.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” hover_enabled=”0″ _i=”0″ _address=”0″]

The Sensitive Data Lifecycle : IBM vs Informatica vs MENTIS

A comparison research performed by UK based research firm, Bloor.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0ODIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|1px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” hover_enabled=”0″ saved_tabs=”all” _i=”0″ _address=”5.6.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

GDPR and the MENTIS Data and Application Security Platform

A single integrated solution for GDPR compliance. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MjUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”5.6.2.0″ hover_enabled=”0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#191919″ custom_padding=”8px||0px|||” saved_tabs=”all” fb_built=”1″ _i=”0″ _address=”0″ global_module=”1638″][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”3.27.4″ max_width=”1116px” _i=”0″ _address=”0.0″][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/mentis_w__138.png” _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0.0″][/et_pb_image][et_pb_text _builder_version=”3.26.6″ text_text_color=”#ffffff” text_font_size=”15px” text_font_size_last_edited=”on|desktop” text_text_align=”left” _i=”1″ _address=”0.0.0.1″]

Headquarters
3 Columbus Circle 15th Floor
New York
NY 10019.
Telephone : +1 212 203 4365
E-mail: info@mentisinc.com

India
5 Sarojini Street
T Nagar
Chennai India 600017.
Telephone : 0091 44 4210 3594

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”1″ _address=”0.0.1″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.1.0″]

PRODUCTS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” _i=”1″ _address=”0.0.1.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”2″ _address=”0.0.2″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.2.0″]

SOLUTIONS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” custom_margin=”|-5px||||” custom_padding=”|0px||||” text_text_color_last_edited=”on|desktop” _i=”1″ _address=”0.0.2.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”3″ _address=”0.0.3″][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”0.0.3.0″]

SERVICES

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.3.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”4″ _address=”0.0.4″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.4.0″]

ABOUT US

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.4.1″]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]