• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Camouflage Updates Data Masking Software

    November 1, 2011 Alex Woodie

    Camouflage Software is providing customers with new ways of accessing its data masking functionality–including via API and as a component of an ETL process–with the version 4.2 release of its eponymous Camouflage Data Masking Solution.

    Camouflage Software has specialized in data masking since it was called in by the Royal Canadian Mounted Police in 2001 to assist with the testing of a PeopleSoft application. The Mounties flatly refused to hand over its internal database to test the new application against it, as it would have been a major security breach. Instead, it spent a lot of time and money altering the contents of the database by hand, so it could be used for testing.

    Such was the genesis of Camoflage Software, which soon went into business making software that would mask the contents of databases, while keeping them usable for development and testing purposes. The St. John’s, Newfoundland, company added support for DB2/400 about two years ago, providing coverage across all major versions of DB2.

    With the recent release of Camouflage version 4.2, the vendor has added several new capabilities, including a new ETL Masking Engine, which complements the existing “in-place” masking architecture. Instead of modifying data in place, the ETL Masking Engine masks data as it’s copied from one system to another. This new feature integrates with the existing subsetting module, Camouflage says.

    This release also introduces the Transformer API, which allows customers to call data masking processes from outside the product. Camouflage says this capability will integrate directly with any home-grown or commercial applications. Camouflage has also unveiled new Transformer Plugins that should make it easier to implement data masking rules and policies.

    For more information on Camouflage Data Masking, see the vendor’s website at www.datamasking.com.

    RELATED STORY

    Data Masking Tool from Camouflage Now Supports DB2/400



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    Computer Keyes

    Fax Directly from your IBM i

    KeyesFax is a full function automated IBM i fax system. Spooled files are burst by fax number and auto transmitted with overlays.  It combines both a send and receive facsimile processing system with a complete image package.

    The fax software will edit, send, receive, display, print, and track fax documents or images using any standard IBM i without additional expensive hardware, software or subscriptions.

    Computer Keyes has been developing Software Solutions since 1978!

    www.computerkeyes.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    New Generation Software:  FREE Business Intelligence Webinar. November 9
    Dan Riehl Presents:  Fall Training Sale – Discounts up to 40%! RPG IV COBOL CL Admin Security
    BCD:  WebSmart PHP is the fastest way to develop IBM i and multi-platform PHP web apps

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    What Could IBM Do Instead Of Spending $12.2 Billion On Shares? Debugging Authority Failures, Part 3

    Leave a Reply Cancel reply

Volume 11, Number 36 -- November 1, 2011
THIS ISSUE SPONSORED BY:

looksoftware
Help/Systems
ASNA
inFORM Decisions
Connectria Hosting

Table of Contents

  • Help/Systems Streamlines IFS Backups with Robot/SAVE 12
  • VAI Unveils New Cognos-Based BI Solution
  • Adaptive Planning Delivers CPM Without the Geeks
  • Venyu Delivers Online Backup and Recovery for Kawasaki
  • Halcyon Bolsters IBM i Security Tool
  • Actuate Unveils Android Interface for BIRT BI
  • Ryobi Die Casting Taps Solarsoft for ERP
  • JDA Says Big Deals Drive Record Q3 Results
  • Sensage Touts Growth of SEIM Sales
  • Camouflage Updates Data Masking Software

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Power Systems Grows Nicely In Q3, Looks To Grow For All 2025, Too
  • Beta Of MCP Server Opens Up IBM i For Agentic AI
  • Sundry IBM i And Power Stack Announcements For Your Consideration
  • Please Take The IBM i Marketplace Survey
  • IBM i PTF Guide, Volume 27, Number 43
  • IBM Pulls The Curtain Back A Smidge On Project Bob
  • IBM Just Killed Merlin. Here’s Why
  • Guru: Playing Sounds From An RPG Program
  • A Bit More Insight Into IBM’s “Spyre” AI Accelerator For Power
  • IBM i PTF Guide, Volume 27, Number 42

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle