Overview
Product Information on Imperva Data Masking (Legacy)
What is Imperva Data Masking (Legacy)?
Imperva Data Masking (Legacy) Pricing
Overall experience with Imperva Data Masking (Legacy)
“Secure data from different threats and mask it with Imperva Mask”
“Data masking tool to sort out all your data problems”
About Company
Company Description
Imperva is a cybersecurity firm that assists organizations in safeguarding critical applications, APIs, and data across various scales and locations. It adopts a comprehensive approach that amalgamates edge, application security, and data security to offer protection to businesses at all levels of their digital journey. Imperva Threat Research and the worldwide intelligence community contribute to Imperva's knowledge of the evolving threat landscape. This understanding allows incorporation of the most recent security, privacy, and compliance expertise into the offered solutions.
Company Details
Do You Manage Peer Insights at Thales Group (Imperva)?
Access Vendor Portal to update and manage your profile.
Key Insights
A Snapshot of What Matters - Based on Validated User Reviews
Reviewer Insights for: Imperva Data Masking (Legacy)
Deciding Factors: Imperva Data Masking (Legacy) Vs. Market Average
Performance of Imperva Data Masking (Legacy) Across Market Features
Imperva Data Masking (Legacy) Likes & Dislikes
The application keeps many data masking techniques that are widely used in the industry and are constantly updated. It offers built-in templates and also predefined rules saves that save a lot of time. Through data linkage identity automation, Imperva Data Masking has greatly reduced our human effort and enabled us to operate a more effective sensitive data analysis process, permitting us to find and monitor changes in our confidential data in real-time, other data masking applications with which I have previously worked do not have this feature.
Imperva is capable of much more than data masking since it assists us in testing, learning, app development, and operational operations while protecting our sensitive data. Even though the data is unprotected, we are always safe since unauthorized persons will not be able to recover private data or information. The auditing features of Imperva are excellent, and the system provides excellent reliability and tweaking options for the agents on the servers. Our company guarantees that our systems are properly configured for failover.
Its open architecture allows it to quickly adapt to any company's hybrid working atmosphere and it works with all enterprise databases and we can even run it on Windows, Linux, and Mac OS X. It's also simple to set up, administer, and maintain, even newbies can easily use it, allowing for a consistent masking procedure. The information gathered is excellent, and it is given in a readily understandable way for auditors and the system's agents on the servers are exceptional which provides excellent internal consistency. This Data Masking tool employs algorithms and data analysis to examine sensitive data linkages. Imperva Data Masking has greatly lowered our human work and enables us to perform a more effective sensitive data analysis process through data linkages identity automation, allowing us to discover and monitor changes in our sensitive data in real-time. Other data masking programs with which I have previously dealt do not have such functionality.
Getting support from their team can be tough sometimes because they are less experienced and do not have knowledge about their product to fix my problems on time. There were several issues while interacting with other internal applications and pricing can be more adaptable.
The menu's navigation becomes perplexing. Agent configuration may be challenging at times, and alerts need a great deal of fine-tuning to produce useful insight. It has the potential to irritate everyone.
A lot of fine tweaking is required in the alerts feature of the Imperva tool so they can provide users with actionable intelligence. Getting help from their team is hard at times because they are less experienced and don't have enough knowledge about their product to solve my issues on time.
Top Imperva Data Masking (Legacy) Alternatives
Peer Discussions
Imperva Data Masking (Legacy) Reviews and Ratings
- Project Director50M-1B USDServices (non-Government)Review Source
Data masking tool to sort out all your data problems
We began using it for database monitoring. We can now quickly monitor crucial databases, transactions, log activity, user activity, all modifications, and a variety of other things. Its alerting function is a lifesaver since it alerts us if any questionable behavior happens. It also keeps track of all database transactions and arranges our operations in a logical order. It enabled us to satisfy crucial compliance standards, and when it comes to protecting vital data, we can quickly monitor how and by whom it is being utilized. It only takes a little bit of administration to get it to work correctly. - Senior Business Manager50M-1B USDServices (non-Government)Review Source
Secure data from different threats and mask it with Imperva Mask
The Imperva Data Masking tool does much more than just mask data for us and it assists us in testing, learning, app development, and operational operations while protecting sensitive data from unauthorized access even if we are in an unprotected environment. Its open architecture enables it to simply adapt to the hybrid working environment of our company, and it works with all enterprise databases. It's extremely simple to set up, administer, and maintain; even inexperienced users may utilize it to ensure a constant masking operation. - Data Analyst, Sales1B-10B USDIT ServicesReview Source
Maintain data accuracy and security in a less secure environment
The Imperva Data Masking tool is capable of much more than just data masking. It helps us in testing, learning, app development, and operational processes while shielding sensitive data from being accessed. It replaces our sensitive data with fictional but provides accurate values in non-production contexts, ensuring analytical and functional accuracy. Even in an unprotected setting, we are always safe because if unauthorized people obtain access, they will not be able to retrieve our confidential information. After all, the disguised material preserves its realism without revealing its original qualities. - Senior Software Engineer50M-1B USDIT ServicesReview Source
A scalable and complete data masking approach
The Strong Imperva Data Masking tool helps us to fulfill our goal of keeping our sensitive data safe while sending a useful alternative to employees and users with the same format but change value that is unusable for data hackers at layers 3 and 4. This powerful tool develops a powerful version of data after masking that is impossible to interpret or recreate for hackers so our data transmit safely and securely and we never face any data leakage problem that leads us to huge losses. Its integration with multiple applications enables us to access and secure our databases in a smarter way. - IT Support Sharepoint Development50M-1B USDIT ServicesReview Source
Imperva keeps data strictly confidential
The ability to keep our data secure and masked with Imperva is one of the best we have seen.


