Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking
  3. Rules
  4. Connection Rules
  5. Security Rules
  6. Security Rule Set Simulator
  7. Masking Functions
  8. Glossary

data masking

data masking

The process of disguising data to prevent access to sensitive information.

0 COMMENTS

We’d like to hear from you!