Confirm Deletion
Are you sure you want to delete the saved search?
See the Informatica Dynamic Data Masking Release Guide to learn about new features and enhancements for current and recent releases, and to learn about behavior changes between versions.
Read the Dynamic Data Masking Release Notes to learn about fixes, known limitations, and Emergency Bug Fixes that are included in the version.
Read the Active Directory Accelerator Guide to learn how to use predefined security rules included in Dynamic Data Masking to mask data in an LDAP Directory.
Read the Data Archive Accelerator Guide to learn how to route requests made to the Data Vault through Dynamic Data Masking. Learn how to use a pre-defined set of security rules to mask sensitive data in Data Vault.
Read the Dynamic Data Masking Accelerator Guide for use with SAP to learn how to configure and use predefined connector and security rules to mask data in an SAP application.
Use the Log Loader Guide to learn how to export Dynamic Data Masking rule log information into database objects. You can then use the database clients to analyze the log information. You can load the information into Oracle, IBM DB2, Microsoft SQL Server, and Informix databases.
Read the Siebel Accelerator Guide to learn how to perform dynamic data masking on data in an Oracle database configured for Siebel.
Read the Stored Procedure Accelerator Guide for DB2 to learn how to perform dynamic data masking for stored procedures and user-defined table functions in a DB2 database.
Read the Stored Procedure Accelerator Guide for Microsoft SQL Server to learn how to perform dynamic data masking on stored procedures and table-valued functions in a Microsoft SQL Server database.
Read the Stored Procedure Accelerator Guide for Oracle to learn how to perform dynamic data masking on stored procedures and table-valued functions in an Oracle database.
Read the Stored Procedure Accelerator Guide for Sybase to learn how to perform dynamic data masking on stored procedures in a Sybase ASE database.
Read the Transparent Archive Guide to learn how to use Dynamic Data Masking with Data Archive Data Vault. Learn about the Management Console and how to manage the Dynamic Data Masking server and service.
Use the Dynamic Data Masking User Guide to learn how to protect sensitive information in a production environment. Learn how to create connection rules, security rules, and how to work with the rule set simulator.
Use the Informatica Dynamic Data Masking Administrator Guide to learn how to perform administrator tasks in Dynamic Data Masking. Understand how to configure security settings, create, and manage connections, and configure advanced Dynamic Data Masking settings.
Follow the instructions in the Informatica Dynamic Data Masking Installation and Upgrade Guide to install or upgrade Dynamic Data Masking. The guide also includes information on minimum requirements, prerequisite tasks, and post install and upgrade tasks.
This article describes how to create a Dynamic Data Masking security rule that captures the SET QUOTED_IDENTIFIER value to prevent a database error when you mask queries in a Sybase or Microsoft SQL Server database.
In Dynamic Data Masking™ version 9.8.4, the default masking functionality is enhanced in a way that changes its behavior. This H2L provides examples of different types of SQL statements to show the differences between the old and new default masking functionalities.
Use the Security Rule Set Simulator to test security rules and regular expressions for Microsoft Azure SQL Database.
This article describes how to configure IP address binding in Dynamic Data Masking.
This article describes how to create masking and blocking security rules in Dynamic Data Masking and test the rules with the Security Rule Set Simulator.
This article describes how to create a security rule set to limit the rows that a database request returns and to mask the returned data.
You can use a generic JDBC connection with Dynamic Data Masking. This article describes how you can automate the configuration of a generic JDBC client to work with Dynamic Data Masking. It includes the steps required to configure SQLWorkbench and includes three deployment tools that you can use. You can use the information as a …
This article describes how to use JMX to view Dynamic Data Masking Server event logs in JConsole.
You can configure Dynamic Data Masking to send user activity event logs in a Common Event Format (CEF) format to Secure@Source using a custom logger.
MicroStrategy is a business intelligence tool that includes performance management, dashboards, analysis, and reporting capabilities. This article describes how to capture MicroStrategy user context through Dynamic Data Masking.
You can use Nagios Core to monitor Informatica® Dynamic Data Masking servers on Windows and Linux machines. This article provides instructions for installing and configuring Nagios Core for monitoring Dynamic Data Masking.
Kerberos is an effective authentication protocol built on symmetric-key cryptography. This article describes how to enable Kerberos authentication for Hive and Impala databases in Dynamic Data Masking.
This article describes how to configure a Windows 7 or Windows Server 2008 client machine for Dynamic Data Masking when the client connects to the database with an ODBC connection.
This article describes an example architecture, development, and deployment of Dynamic Data Masking Multi-Server architecture.
This article describes how to create a custom logger and appender to log database access that occurs outside of normal business hours.