REDWOOD CITY, Calif., Jan. 10, 2013 (GLOBE NEWSWIRE) -- Informatica Corporation (Nasdaq:INFA), the world's number one independent leader in data integration software, today announced that it has been positioned by Gartner, Inc. in the leaders quadrant in the 2012 Magic Quadrant for Data Masking Technology report, published December 21, 2012. The complete report, including the quadrant graphic, is available on the Informatica web site at www.informatica.com/datamasking
Joseph Feiman and Carsten Casper, authors of the report state, "Leaders demonstrate balanced progress in execution and vision. Their actions raise the competitive bar for all vendors and solutions in the market, and they tend to set the pace for the industry. A Leader's strategy is focused on data security and compliance. Its offering addresses the needs of security specialists within the SLC and data management. Leaders' brands are broadly recognized in the data security space. Leaders reach beyond SDM (Static Data Masking) capabilities and encompass the broader data security discipline, including data redaction capabilities, DDM (Dynamic Data Masking), DAM/DAP (Database Activity Monitoring/Database Audit and Protection) security intelligence. At the same time, Leaders are able to amass a relatively large clientele and revenue in this evolving market. A leading vendor is not a default choice for every buyer, and clients are warned not to assume that they should only buy from Leaders. Some clients may find that vendors in other quadrants better address their specific needs."
According to the report, "Sensitive data (such as credit card numbers), personally identifiable information (such as Social Security numbers), medical diagnoses and even nonpersonal sensitive data (such as corporate financial information and intellectual property) are exposed to abuse or negligence from enterprise employees and outsiders.Data masking aims to prevent the abuse of sensitive data by hiding it from users. Technology vendors offer multiple data masking techniques, such as replacing some fields with similar-looking characters, replacing characters with masking characters (for example, "x"), replacing real last names with fictional last names and reshuffling data in the database columns. Data masking is also known as data obfuscation, data privacy, data sanitization, data scrambling, data deidentification, data anonymization and data deauthentication."