RESOURCES

[et_pb_section fb_built=”1″ _builder_version=”3.27.3″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/www.mentisinc.com-1070525337034174.jpg” background_size=”initial” min_height=”576px” custom_padding=”1px||0px|||” fb_built=”1″ _i=”0″ _address=”0″][et_pb_row _builder_version=”3.26.6″ transform_scale_last_edited=”on|desktop” transform_translate=”0px|151px” transform_translate_last_edited=”on|phone” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|phone” _i=”0″ _address=”0.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”0.0.0.0″]

RESOURCES

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”18px” _i=”1″ _address=”0.0.0.1″]

With MENTIS in your corner, you’re never on your own.

Explore insightful and educational content including data sheets, case studies, videos, infographics, white papers, and more. And look for frequent additions and updates — all aimed at helping you succeed at protecting your sensitive data.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”1″ _address=”1″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”1.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.0.0″][et_pb_text _builder_version=”3.27.4″ custom_padding=”0px|||||” _i=”0″ _address=”1.0.0.0″]

CASE STUDIES

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”293px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Healthcare – Oracle Data Masking vs. MENTIS iScramble™

Healthcare Company Chooses MENTIS to Protect Patient Records & System Sensitive Data

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MDkifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ hover_enabled=”0″ saved_tabs=”all” _i=”1″ _address=”1.1.0.1″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” hover_enabled=”0″ inline_fonts=”fun city level 2″ _i=”0″ _address=”0″ min_height=”295px”]

Banco Popular Dominicano – Sensitive Data Discovery & iScramble™

MENTIS helped the largest private bank in Dominican Republic to find all sensitive data in DB2 and Oracle databases

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”1″ _address=”1.1.1.1″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″ min_height=”266px”]

Primatics Financial – Sensitive Data Discovery, iScramble™ & iMask™ for DB

Financial Services Software Manufacturer Chooses MENTIS to Protect Customers’ Sensitive Data

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0OTcifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”1″ _address=”1.1.2.1″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”296px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Securing Coppin State From Discovery To Masking In Peoplesoft Environments

A member institution of the University System of Maryland

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTYifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”1.3.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”296px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Highly Integrated Data Security Solution

Securing Coppin State From Discovery To Masking In Peoplesoft Environments.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0ODcifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”1.3.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”296px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Master Data Management Solution

Master Data Management Solution for Europe’s Largest Multinational Credit Insurance Provider

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NzcifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”1.3.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Monitoring client data for Sox Compliance

Sox Compliance for One of the Largest Utility Providers

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MzUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”2″ _address=”1.3.0.2″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Airline – User and Role Based Masking

User and Role Based Masking for a Leading Airline in Canada.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MzAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”1.4.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

A fully Compliant Solution for a Top Swiss Bank

Sensitive data assessment for cloud migration, cross border sharing and compliance.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MzAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”1.4.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.27.3″ _i=”4″ _address=”1.4″][et_pb_column type=”1_3″ _builder_version=”3.27.3″ _i=”0″ _address=”1.4.0″][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.3″ _i=”1″ _address=”1.4.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Enterprise Wide Deployment – Static Data Masking

Enterprise Wide Solution for a Fortune 20 Global Conglomerate

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0OTIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”1.6.1.0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.3″ _i=”2″ _address=”1.4.2″][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.27.3″ background_color=”#F4F4F4″ fb_built=”1″ _i=”2″ _address=”2″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”2.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#000000″ _i=”0″ _address=”2.0.0.0″]

DATA SHEETS

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”210px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

iDiscover™ – Discover Accurately

If you aren’t finding 100%, it might as well be zero.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NzIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”2.2.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”211px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” hover_enabled=”0″ _i=”0″ _address=”0″]

IMASK™ – MASK SEAMLESSLY

Dynamic Data Masking. Conditional and Location-Aware. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NjUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”2.2.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″ min_height=”211px”]

iMonitor™ – Monitor Continuously

Access, Activity, and Code. Which of these are you monitoring? 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NjAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”2.2.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″]

iProtect™ – Multiple Level Access Control for Production Databases

Multiple Level Access Control for Production Databases

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NTUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”2.4.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″ min_height=”218px”]

iRetire™ – Retire Securely

 

Automate your data retention policy in enterprise systems. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NTAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”2.4.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ transform_scale_last_edited=”on|phone” transform_translate_last_edited=”on|phone” transform_translate_linked_phone=”off” transform_rotate_last_edited=”on|phone” transform_skew_last_edited=”on|phone” transform_origin_last_edited=”on|phone” transform_styles_last_edited=”on|phone” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|23px|10px|false|false” _i=”0″ _address=”0″ min_height=”218px”]

iScramble™ – Conditional and Location-Aware Static Data Masking

Static Data Masking. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NDUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”2.4.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

iSubset™ – Ensure Application Integrity and Create Intelligent Database Subsets

Ensure Application Integrity and Create Intelligent Database Subsets with iSubset™ 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NDAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”2.6.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”3″ _address=”3″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”3.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”3.0.0″][et_pb_text _builder_version=”3.27.4″ custom_padding=”0px|||||” _i=”0″ _address=”3.0.0.0″]

information sheets

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

The Security Challenge of Dark Data

What you don’t know will hurt you.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0MjQifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”3.2.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Bloor InContext: GDPR Compliance

One year into GDPR, read on explore what has happened, what is likely to happen, and what organizations should do. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MzUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”3.2.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

GDPR and the MENTIS Data and Application Security Platform

A single integrated solution for GDPR compliance. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MjUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”3.2.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.27.4″ column_structure=”1_3,1_3,1_3″][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

The MENTIS Data and Application Security Platform

MENTIS offers a suite of solutions that protect and secure your data throughout its lifecycle. The platform it offers consists of data discovery, masking (both static and dynamic), monitoring, and finally retirement. 

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MjAifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”3.4.0.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”266px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

The Sensitive Data Lifecycle : IBM vs Informatica vs MENTIS

A comparison research performed by UK based research firm, Bloor.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0ODIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”3.4.1.0″][/et_pb_button][/et_pb_column][et_pb_column _builder_version=”3.27.4″ type=”1_3″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”266px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Integrated Data Masking for PeopleSoft Enterprise

Protecting Sensitive Data in Production and Non-Production Applications and Databases.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MDEifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”3.4.2.0″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.27.3″ _i=”4″ _address=”3.4″][et_pb_column type=”1_3″ _builder_version=”3.27.3″ _i=”0″ _address=”3.4.0″][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.3″ _i=”1″ _address=”3.4.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”245px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”0″]

Integrated Data Masking for Oracle E-Business

Protecting Sensitive Data in Production and Non-Production Applications and Databases.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MDYifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”3.6.1.0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.3″ _i=”2″ _address=”3.4.2″][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#191919″ custom_padding=”8px||0px|||” saved_tabs=”all” fb_built=”1″ _i=”0″ _address=”0″ global_module=”1638″][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”3.27.4″ max_width=”1116px” _i=”0″ _address=”0.0″][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/mentis_w__138.png” _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0.0″][/et_pb_image][et_pb_text _builder_version=”3.26.6″ text_text_color=”#ffffff” text_font_size=”15px” text_font_size_last_edited=”on|desktop” text_text_align=”left” _i=”1″ _address=”0.0.0.1″]

Headquarters
3 Columbus Circle 15th Floor
New York
NY 10019.
Telephone : +1 212 203 4365
E-mail: info@mentisinc.com

India
5 Sarojini Street
T Nagar
Chennai India 600017.
Telephone : 0091 44 4210 3594

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”1″ _address=”0.0.1″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.1.0″]

PRODUCTS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” _i=”1″ _address=”0.0.1.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”2″ _address=”0.0.2″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.2.0″]

SOLUTIONS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” custom_margin=”|-5px||||” custom_padding=”|0px||||” text_text_color_last_edited=”on|desktop” _i=”1″ _address=”0.0.2.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”3″ _address=”0.0.3″][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”0.0.3.0″]

SERVICES

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.3.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”4″ _address=”0.0.4″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.4.0″]

ABOUT US

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.4.1″]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]