STATIC DATA MASKING

[et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/masking.jpg” background_size=”initial” custom_padding=”1px||408px|||” fb_built=”1″ _i=”0″ _address=”0″][et_pb_row _builder_version=”3.26.6″ transform_scale_last_edited=”on|desktop” transform_translate=”0px|151px” transform_translate_last_edited=”on|phone” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|phone” _i=”0″ _address=”0.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”0.0.0.0″]

static data masking

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”22px” _i=”1″ _address=”0.0.0.1″]

Non-production environments are a goldmine of sensitive data. Have you secured it all?

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.26.6″ transform_translate=”0px|151px” transform_translate_linked=”off” _i=”1″ _address=”0.1″][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”0″ _address=”0.1.0″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM0OCJ9fQ==@” button_text=”LIVE DEMO” button_alignment=”center” _builder_version=”3.27.3″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.0.0″][/et_pb_button][/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.26.6″ _i=”1″ _address=”0.1.1″][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NDUifX0=@” button_text=”DATASHEET” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ saved_tabs=”all” _i=”0″ _address=”0.1.1.0″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”1″ _address=”1″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”1.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”1.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”1.0.0.0″]

traditional methods have challenges

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”1.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”1.1.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” header_font_size=”27px” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”20px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”1.1.0.0″]

GENERIC APPROACH

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” custom_padding=”||0px|||” _i=”1″ _address=”1.1.0.1″]

Each non-production environment is unique in its own way. One-size-fits-all approach creates risk.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”1.1.1″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”27px” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”20px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”1.1.1.0″]

tick-box masking

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”1.1.1.1″]

A patch-fix masking solution is security in name only. The extract-mask-load approach creates vulnerabilities and is time consuming.

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”1.1.2″][et_pb_text _builder_version=”3.27.4″ header_font_size=”27px” header_2_text_align=”center” header_2_text_color=”#ffffff” header_2_font_size=”20px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” _i=”0″ _address=”1.1.2.0″]

home grown scripts

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”1.1.2.1″]

Home grown scripts are not comprehensive and do not maintain referential integrity

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”2″ _address=”2″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”2.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”2.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”2.0.0.0″]

How is iscramble™ better

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”2.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”2.1.0″][et_pb_text _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” _i=”0″ _address=”2.1.0.0″]

SCRAMBLING METHODS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” text_text_align_phone=”center” text_text_align_last_edited=”on|phone” _i=”1″ _address=”2.1.0.1″]

Choose from 54 out-of-the-box scrambling methods

 

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”15px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” _i=”2″ _address=”2.1.0.2″]

Flexible Design

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” text_text_align_phone=”center” text_text_align_last_edited=”on|phone” _i=”3″ _address=”2.1.0.3″]

Approaches depending on the infrastructure constraints, and performance

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”2.1.1″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/fingerprint_2018-1.png” _builder_version=”3.26.6″ _i=”0″ _address=”2.1.1.0″][/et_pb_image][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”2.1.2″][et_pb_text _builder_version=”3.27.4″ header_text_align=”left” header_font_size=”16px” header_2_font_size=”16px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” header_text_align_phone=”center” header_text_align_last_edited=”on|phone” header_2_text_align_phone=”center” header_2_text_align_last_edited=”on|phone” _i=”0″ _address=”2.1.2.0″]

Referential Integrity

[/et_pb_text][et_pb_text content_phone=”

Consistent masking across tables, columns, databases, and files

” content_last_edited=”on|phone” _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” _i=”1″ _address=”2.1.2.1″]

Consistent masking across tables, columns, databases, and files

 

[/et_pb_text][et_pb_text content_phone=”

Blended Masking

” content_last_edited=”on|desktop” _builder_version=”3.27.4″ header_text_align=”right” header_font_size=”16px” header_5_font=”Avenir||||||||” header_5_font_size=”18px” custom_margin=”||8px|||” header_text_align_phone=”center” header_text_align_last_edited=”on|desktop” header_font_size_last_edited=”on|phone” _i=”2″ _address=”2.1.2.2″]

Blended Masking

[/et_pb_text][et_pb_text content_phone=”

Concurrent static and dynamic masking for masking rollouts

” content_last_edited=”on|phone” _builder_version=”3.27.4″ text_font_size=”16px” text_orientation=”right” text_text_align=”right” _i=”3″ _address=”2.1.2.3″]

Concurrent static and dynamic masking for masking rollouts

 

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_image=”http://zero2compliance.com/wp-content/uploads/2019/08/sample-64_0.jpg” fb_built=”1″ _i=”3″ _address=”3″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”3.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”3.0.0″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”3.0.0.0″]

mentis advantages

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.1.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”29px” _i=”0″ _address=”3.1.0.0″]

GENERATION

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.1.0.1″]

Generating masked data sets for testing and machine learning

 

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.1.1″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”3.1.1.0″]

DEV OPS INTEGRATION

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.1.1.1″]

Integrate easily with replication process with choice of in-app or API based execution

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.1.2″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”3.1.2.0″]

OPTIMAL PERFORMANCE

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.1.2.1″]

Runs at the target datasource

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2″][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”0″ _address=”3.2.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” header_font_size=”29px” _i=”0″ _address=”3.2.0.0″]

ENTERPRISE WIDE

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” header_text_color=”#ffffff” _i=”1″ _address=”3.2.0.1″]

Common and Consistent discovery methods to find all sensitive data across structured, un-structured, cloud and big data sources

[/et_pb_text][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”1″ _address=”3.2.1″][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.26.6″ _i=”2″ _address=”3.2.2″][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” header_text_color=”#ffffff” _i=”0″ _address=”3.2.2.0″]

compliance

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_text_color=”#ffffff” text_font_size=”16px” _i=”1″ _address=”3.2.2.1″]

Reports generated for compliance requirements and Privacy Impact Assessment

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#787878″ fb_built=”1″ _i=”4″ _address=”4″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”4.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.0.0″][et_pb_text _builder_version=”3.27.4″ header_text_color=”#ffffff” _i=”0″ _address=”4.0.0.0″]

accolades

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row _builder_version=”3.26.6″ _i=”1″ _address=”4.1″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”4.1.0″][et_pb_slider show_image_video_mobile=”on” _builder_version=”3.27.3″ custom_padding=”50px||51px|||” _i=”0″ _address=”4.1.0.0″][et_pb_slide heading=”philip howard” image=”http://zero2compliance.com/wp-content/uploads/2019/08/BLOOR-LOGO-RGB-.png” _builder_version=”3.27.3″ header_text_align=”center” body_text_align=”justify” background_color=”rgba(0,0,0,0)” background_enable_color=”on” child_filter_saturate=”98%” child_filter_brightness=”150%” child_filter_contrast=”115%” child_mix_blend_mode=”screen” hover_enabled=”0″ _i=”0″ _address=”4.1.0.0.0″]

…In terms of the masking itself, MENTIS supports more than 50 different masking algorithms, which is as much as you might expect.

[/et_pb_slide][et_pb_slide heading=”philip howard” image=”http://zero2compliance.com/wp-content/uploads/2019/08/BLOOR-LOGO-RGB-.png” _builder_version=”3.27.3″ header_text_align=”center” body_text_align=”justify” background_color=”rgba(0,0,0,0)” background_enable_color=”on” child_filter_saturate=”98%” child_filter_brightness=”150%” child_filter_contrast=”115%” child_mix_blend_mode=”screen” hover_enabled=”0″ _i=”1″ _address=”4.1.0.0.1″]

We like MENTIS’ as it happens option and the ability to combine static and dynamic masking is also a significant differentiator.

[/et_pb_slide][et_pb_slide heading=”In excess of 250 users currently have access to the development, test and training clients of SAP, including contractors and other non-organization employees all of whom potentially having access to some aspects of sensitive data. Post static data scrambling, this risk will be entirely eliminated.” _builder_version=”3.27″ header_font=”Avenir||||||||” header_text_align=”center” header_font_size=”23px” body_font=”fun city level 2||||||||” body_line_height=”2em” background_color=”rgba(0,0,0,0)” background_enable_color=”on” custom_padding=”||||false|false” hover_enabled=”0″ _i=”2″ _address=”4.1.0.0.2″]

LEADING FINANCIAL INSTITUTION

[/et_pb_slide][/et_pb_slider][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ fb_built=”1″ _i=”5″ _address=”5″][et_pb_row _builder_version=”3.26.6″ _i=”0″ _address=”5.0″][et_pb_column type=”4_4″ _builder_version=”3.26.6″ _i=”0″ _address=”5.0.0″][et_pb_text _builder_version=”3.27.4″ _i=”0″ _address=”5.0.0.0″]

resources

[/et_pb_text][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.27.4″ custom_margin=”||||false|true” _i=”1″ _address=”5.1″][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”0″ _address=”5.1.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|85px|10px|false|false” _i=”0″ _address=”5.1.0.0″]

Healthcare – Oracle Data Masking vs. MENTIS iScramble™

Healthcare Company Chooses MENTIS to Protect Patient Records & System Sensitive Data

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MDkifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.1.0.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”1″ _address=”5.1.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|38px|10px|false|false” _i=”0″ _address=”5.1.1.0″]

Banco Popular Dominicano – Sensitive Data Discovery & iScramble™

Largest Private Bank in the Dominican Republic Chooses MENTIS to Protect Customers’ Sensitive Data

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|0px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.1.1.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”2″ _address=”5.1.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”5.1.2.0″]

Primatics Financial – Sensitive Data Discovery, iScramble™ & iMask™ for DB

Financial Services Software Manufacturer Chooses MENTIS to Protect Customers’ Sensitive Data

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0OTcifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|1px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.1.2.1″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.27.4″ custom_margin=”|||auto|false|false” custom_margin_phone=”|||||true” custom_margin_last_edited=”on|phone” _i=”2″ _address=”5.2″][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”0″ _address=”5.2.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”289px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|85px|10px|false|false” _i=”0″ _address=”5.2.0.0″]

Enterprise Wide Deployment – Static Data Masking

Enterprise Wide Solution for a Fortune 20 Global Conglomerate

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0OTIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|1px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.2.0.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”1″ _address=”5.2.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|38px|10px|false|false” _i=”0″ _address=”5.2.1.0″]

Securing Coppin State From Discovery To Masking In Peoplesoft Environments

Largest Private Bank in the Dominican Republic Chooses MENTIS to Protect Customers’ Sensitive Data

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MTYifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|1px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.2.1.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”2″ _address=”5.2.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”5.2.2.0″]

Primatics Financial – Sensitive Data Discovery, iScramble™ & iMask™ for DB

Financial Services Software Manufacturer Chooses MENTIS to Protect Customers’ Sensitive Data

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0NDUifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|1px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.2.2.1″][/et_pb_button][/et_pb_column][/et_pb_row][et_pb_row column_structure=”1_3,1_3,1_3″ _builder_version=”3.27.4″ custom_margin=”||||false|true” _i=”3″ _address=”5.3″][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”0″ _address=”5.3.0″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”289px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|85px|10px|false|false” _i=”0″ _address=”5.3.0.0″]

THE SENSITIVE DATA LIFECYCLE: IBM VS INFORMATICA VS MENTIS

A comparison research performed by UK based research firm Bloor.

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE0ODIifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|1px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.3.0.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”1″ _address=”5.3.1″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”291px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|38px|10px|false|false” _i=”0″ _address=”5.3.1.0″]

Integrated Data Masking for Oracle E-Business

Protecting Sensitive Data in Production and Non-Production Applications and Databases

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MDYifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|1px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.3.1.1″][/et_pb_button][/et_pb_column][et_pb_column type=”1_3″ _builder_version=”3.27.4″ _i=”2″ _address=”5.3.2″][et_pb_text _builder_version=”3.27.4″ text_font_size=”15px” header_text_align=”center” header_font_size=”18px” box_shadow_style=”preset1″ min_height=”290px” custom_margin=”|0px|10px|0px|false|false” custom_padding=”|10px|42px|10px|false|false” _i=”0″ _address=”5.3.2.0″]

Integrated Data Masking for PeopleSoft Enterprise

Protecting Sensitive Data in Production and Non-Production Applications and Databases

[/et_pb_text][et_pb_button button_url=”@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjE1MDEifX0=@” button_text=”DOWNLOAD” button_alignment=”center” _builder_version=”3.27.4″ _dynamic_attributes=”button_url” custom_button=”on” button_text_size=”18px” button_text_color=”#ffffff” button_bg_color=”#4bb76f” button_border_width=”0px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”6px” button_letter_spacing=”0px” button_font=”fun city level 2||||||||” box_shadow_style=”preset2″ transform_scale_last_edited=”on|desktop” transform_translate=”1px|0px” transform_translate_phone=”0px|1px” transform_translate_last_edited=”on|desktop” transform_translate_linked=”off” transform_rotate_last_edited=”on|desktop” transform_skew_last_edited=”on|desktop” transform_origin_last_edited=”on|desktop” transform_styles_last_edited=”on|desktop” saved_tabs=”all” _i=”1″ _address=”5.3.2.1″][/et_pb_button][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.26.6″ background_color=”#191919″ custom_padding=”8px||0px|||” saved_tabs=”all” fb_built=”1″ _i=”0″ _address=”0″ global_module=”1638″][et_pb_row column_structure=”1_5,1_5,1_5,1_5,1_5″ _builder_version=”3.27.4″ max_width=”1116px” _i=”0″ _address=”0.0″][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0″][et_pb_image src=”http://zero2compliance.com/wp-content/uploads/2019/08/mentis_w__138.png” _builder_version=”3.26.6″ _i=”0″ _address=”0.0.0.0″][/et_pb_image][et_pb_text _builder_version=”3.26.6″ text_text_color=”#ffffff” text_font_size=”15px” text_font_size_last_edited=”on|desktop” text_text_align=”left” _i=”1″ _address=”0.0.0.1″]

Headquarters
3 Columbus Circle 15th Floor
New York
NY 10019.
Telephone : +1 212 203 4365
E-mail: info@mentisinc.com

India
5 Sarojini Street
T Nagar
Chennai India 600017.
Telephone : 0091 44 4210 3594

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”1″ _address=”0.0.1″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.1.0″]

PRODUCTS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” _i=”1″ _address=”0.0.1.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”2″ _address=”0.0.2″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.2.0″]

SOLUTIONS

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” width=”100%” custom_margin=”|-5px||||” custom_padding=”|0px||||” text_text_color_last_edited=”on|desktop” _i=”1″ _address=”0.0.2.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”3″ _address=”0.0.3″][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” _i=”0″ _address=”0.0.3.0″]

SERVICES

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.3.1″]

[/et_pb_text][/et_pb_column][et_pb_column type=”1_5″ _builder_version=”3.26.6″ _i=”4″ _address=”0.0.4″][et_pb_text _builder_version=”3.26.6″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”16px” header_font_size=”31px” text_text_align=”left” _i=”0″ _address=”0.0.4.0″]

ABOUT US

[/et_pb_text][et_pb_text _builder_version=”3.27.4″ text_font=”fun city level 2||||||||” text_text_color=”#ffffff” text_font_size=”12px” _i=”1″ _address=”0.0.4.1″]

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]