Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Data Masking System

Automatic discovery of sensitive data | Compatibility with multiple databases | Efficient data extraction and masking

Data Masking System Overview

Topsec Data Masking System uses built-in or user-defined masking algorithms to de-identify sensitive data, shielding the real data. This product helps enterprises guarantee data security in development, testing, data replication and sharing processes.

Activity & Announcement
Advantages
Abundant masking algorithms and data domains

The product has a variety of built-in data masking algorithms and allows users to create new algorithms by adjusting certain parameters. It also has a full range of built-in sensitive data domain rules to protect private information of individuals and enterprises.

Mechanisms to guarantee resource security

The system is designed following the principle of "separation of powers". All important operations, such as adding of data sources, data discovery, and data masking, are controlled with a comprehensive permission application and approval mechanism.

High reliability and compatibility

The system supports KylinOS made in China and is compatible with multiple mainstream database, file, and big data systems. It supports cross-database migration of various elements, including table structures, indexes, master keys, partitions, and triggers.

Stable and easy-to-use system

Data masking tasks are easy to configure by creating projects in the system, and data masking results can be sampled for check. The Data Masking System is developed based on the secure operating system developed by Topsec, and is highly compatible and secure.

Application
Data Masking

After a source database is established using the data files exported from an application database, the Data Masking System masks data in the source database and transmits masked data to the destination database. The destination database then delivers masked data to users who need the data.

Issues Resolved
  • Masked data can be used for testing, development, and training, and be read by third-party applications.
  • The data masking process is optimized to improve the masking efficiency, thus saving time and money of users.
  • Real data not used or accessed, lowering the risks of data leakage.
Value to Customers
Guaranteed quality of masked data

Using built-in masking algorithms, the system provides high-quality masked data to ensure data security in various scenarios, such as testing, development, and data sharing.

Improved efficiency

The masking process is fully automated to reduce consumption of time and resources.

High security

The real data is inaccessible to employees of development, testing, and other departments, as well as third-party personnel. This eliminates risks of data leakage. The system supports databases developed in China and meets the requirements of China for data security.

Legal compliance

The system helps enterprises fulfill their obligation and responsibility of data protection in accordance with the Data Security Law, Cybersecurity Law, and other applicable laws.

Success Case