Discovery
Search
OpenNavigationArticle
Sensitive Data Discovery Tool
OpenNavigationArticle
Open Navigation Article
Discovery
  • Request Trial Request
    a trial
  • Request Demo Request
    a demo
  • Request Quote Request
    a quote

Analyzing databases

After you have connected to both Source and Destination servers, click on the “Analyze” button in the upper right corner.

The system will go against current database metadata and data and apply search patterns. The orange bar below will display the current progress of the discovery process.

Once analysis is completed, the tool displays the database schema information and identifies which one is pertaining to the sensitive data. The metadata display format is <schema>.<table>.<field>. Below you can see a list of schemas in our sample database AdventureWorksDB. Clicking on the schema arrow will expand it, and you will see multiple tables with sensitive data and suggested algorithms.

If you open any table after the analysis process, you will see that the tool determined the type of data and selected the closest algorithm based on metadata names and values for data masking. The search for data types is based on HIPAA’s Safe Harbor. However, it does not accommodate Expert Determination, as it is limitless. We provide you with the capability to choose algorithms manually.

About Hush-Hush Contact Us

E-mail: info@mask-me.net

tel: 855.968.4874

Privacy Policy Terms of Use