FRS Data Masking: Protecting Your Sensitive Data, One Byte at a Time
Discover sensitive data based on predefined data analysis rules. Manipulate the data permanently.
How Do We Do It?
The process is performed according to two parameters: the values of "sampling count" and the "hit ratio." In this method, FRS scans all columns in a database, randomly fetches a specified number of rows, and then compares them to a predefined critical dataset to calculate a compatibility ratio.
If the ratio is greater than or equal to the hit ratio values, the columns are added to the analysis result, and a sensitive data map is created. This map includes information such as the location of the data, the compatibility value, and the action rule for masking.