Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Complexity is the enemy of security. Simplify and scale fine-grained data access control. Dynamically authorize and audit every query to comply with data security and privacy regulations. Okera integrates seamlessly into your infrastructure – in the cloud, on premise, and with cloud-native and legacy tools. With Okera, data users can use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives.

Description

The increasing risks to security and the rise of stringent privacy laws have necessitated a more cautious approach to handling sensitive information. Oracle Data Masking and Subsetting offers database users a solution to enhance security, streamline compliance efforts, and lower IT expenses by sanitizing production data copies for use in testing, development, and various other functions, while also allowing for the removal of superfluous data. This tool allows for the extraction, obfuscation, and sharing of both full copies and subsets of application data with partners, whether they are within or outside the organization. By doing so, it ensures the database's integrity remains intact, thus supporting the ongoing functionality of applications. Additionally, Application Data Modeling automatically identifies columns within Oracle Database tables that contain sensitive data through established discovery patterns, including national IDs, credit card details, and other forms of personally identifiable information. Furthermore, it can recognize and map parent-child relationships that are defined within the database structure, enhancing the overall data management process.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

MySQL
Oracle Database
Active Directory
Amazon Redshift
Amazon Web Services (AWS)
Apache Hive
Apache Spark
Azure Automation
Azure Data Lake
Collibra
Hadoop
IBM Informix
Jupyter Notebook
Looker
Microsoft Azure
Oracle E-Business Suite
PostgreSQL
Snowflake
Starburst Enterprise
Tableau

Integrations

MySQL
Oracle Database
Active Directory
Amazon Redshift
Amazon Web Services (AWS)
Apache Hive
Apache Spark
Azure Automation
Azure Data Lake
Collibra
Hadoop
IBM Informix
Jupyter Notebook
Looker
Microsoft Azure
Oracle E-Business Suite
PostgreSQL
Snowflake
Starburst Enterprise
Tableau

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$230 one-time payment
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Okera

Founded

2016

Country

United States

Website

www.okera.com/overview/

Vendor Details

Company Name

Oracle

Founded

1977

Country

United States

Website

www.oracle.com/database/technologies/security/data-masking-subsetting.html

Product Features

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Policy Management

Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Product Features

Alternatives

Alternatives

IRI FieldShield Reviews

IRI FieldShield

IRI, The CoSort Company
IRI Voracity Reviews

IRI Voracity

IRI, The CoSort Company
IRI Data Protector Suite Reviews

IRI Data Protector Suite

IRI, The CoSort Company