Feature of Data’s Dynamic Desensitization
  • User pain point
  • Program feature
  • Application scenario
User pain point

• Huge investment in “application system transformation”;
• Failed to construct a strong correlation between application user permission and sensitive data masking in current business application system;
• Hard to trace data leakages precisely

Program feature

• Based on sensitive data marked in the data classification hierarchy list (critical/core level or level 3/4), parse database access requests by proxy in real time;
• Desensitize data return results according to certain rules and algorithms, make the original data unreadable and unrecognizable, and ensure data security.

Application scenario

Suitable for “real-time” desensitization of queries and call results for sensitive data and other scenarios without departing from the production environment.