Challenger, Gartner’s Magic Quadrant on Data Masking (2013-2015); Visionary (2012); Cool Vendor (2008)
"To increase the accuracy of discovery and identify the best masking algorithm for each data classification, MENTIS analyzes not only data, but also the application codes that access the data, and then shares this intelligence across the platform."
"The vendor's offerings provides useful templates for packaged systems, such as Oracle E-business Suite(EBS) and PeopleSoft."
"As a demonstration of its vision, MENTIS' DDM incorporates user location data and allows the creation of location-aware masking policies."
"Its (MENTIS) data security offering reaches beyond SDM and also includes DDM and DAP."
"MENTIS innovates in securing sensitive data by offering the retirement of inactive sensitive data."
Discovery that provides certainty about where data is and the programs that put it there. Masking and Monitoring that wrap security around it. Retirement to reduce exposure. MENTIS has a complete and integrated solution that can help secure your sensitive data across the data's lifecycle, in all IT environments, whether Non-Production, Pre-Production, or Production.
Find 100% of your sensitive data across data sources – the essential first step towards comprehensive data security.
Mask sensitive data across non-production, production, and pre-production environments maintaining consistency and user access without compromises with static, dynamic, and blended data masking.
Gain visibility to your sensitive data access in production – who, where, and what. Be notified of any changes to your security posture from changes in application code.
De-identify and tokenize aged inactive data without losing their value.
Every data security requirement is different. As we DEFINE the solutions specific to your organization we begin the process of gathering information. We make sure we understand your business, needs, and your desired outcome.
Once defined, we begin to build the solution that will manage and safeguard your sensitive data.
Thorough planning and a strong focus on your objectives guides our final step – deliver. We launch a pilot program, make any adjustments necessary, and then we implement, monitor, and measure your results.
Redesigned site offers visitors deeper insight into MENTIS’ revolutionary data security solutions. MENTIS Software, the long-time leader in the sensitive data protection market, today announced the launch of its newly revamped website. The redesigned website offers improved access to essential information about MENTIS’ fully-integrated platform of information security software. The platform’s revolutionary risk-based approach enables companies to use a single platform to secure sensitive data across environments and across the data’s risk lifecycle. The platform includes the market’s premier discovery, masking, monitoring and retirement solutions. Click below to continue reading.
Suresh joins our leadership team as Executive Director to oversee strategy, marketing, and corporate development. Suresh will take on a key strategic role as the company builds on its unique platform and insights, and its focus on securing sensitive information throughout its lifecycle in the enterprise, to become a trusted partner and a market leader in the information security market. Click below to continue reading.
MENTIS Software, the leading provider of Information Lifecycle Management for Sensitive Data™ solutions, today announced that Gartner, Inc., a leading IT research and advisory firm, has again positioned MENTIS as a Challenger in its December 2015 Magic Quadrant for Data Masking Technology, Worldwide report. Gartner’s Magic Quadrant evaluation is based on its assessment of the vendor’s completeness of vision and ability to execute. Click below to continue reading.
Not knowing all the locations of your HCM sensitive data is like playing Russian Roulette. The first step to protecting your HCM sensitive data is finding it: text fields, staging and back-up tables, forms, and pages. The second step is securing and monitoring that sensitive data in complex environments: seamless masking of production, pre-production, non-production environments; supporting compliance needs for conditional and location-aware masking; proactive monitoring of authorized user access, and the like. Click below to continue reading.