2014 Gartner Magic Quadrant for Data Masking Technology

Once Again Gartner Positions Informatica as a Leader Based on "Ability to Execute" and "Completeness of Vision"

Since the Gartner Magic Quadrant for Data Masking Technology debuted in 2012, Informatica has been positioned as a leader.1 In this latest 2014 report, the analysts outline why you need to make data masking part of your data best practices and evaluate the industry’s best partners who can help you reach your goals.

Amit Walia, senior vice president and general manager, Data Security Group, Informatica, said, “We are honored that Gartner, for the third year in a row, has positioned Informatica as a leader in its Magic Quadrant for Data Masking Technology. We believe that data masking is becoming the solution of choice for enterprises and government organizations that want to take a data-centric approach to preventing cyber-attacks and internal data breaches. Informatica’s data masking software delivers data-centric security to improve data privacy and security, with improved productivity and reduced overall costs.”

gartner-magic-quadrant-for-data-masking-technology_342x350 Gartner Magic Quadrant Data Masking Technology


The Gartner Magic Quadrant for Data Masking Technology report says “Leaders demonstrate balanced progress in execution and vision. Their actions raise the competitive bar for all vendors and solutions in the market, and they tend to set the pace for the industry. A Leader's strategy is focused on data security and compliance. Its offering addresses the needs of security specialists within the software life cycle (SLC) and data management processes. Leaders' brands are broadly recognized in the data security space. Leaders reach beyond SDM capabilities and encompass the broader data security discipline, including data redaction capabilities, DDM, and also masking data for big data platforms, DAP and security intelligence.”

Informatica believes that a sound data security strategy includes data masking in the reference architecture. Data masking is accomplished through a variety of techniques. Our Informatica solutions focus on what our customers describe as best practices through static and dynamic data masking. Static (or persistent) data masking permanently and irreversibly changes data values while preserving the original characteristics and patterns. This is a common technique used in non-production environments used for testing and training purposes. Dynamic data masking changes the value that is presented to the user during the request while leaving the original values untouched. This latter approach is commonly used to protect sensitive data in production. Authorized users see the original values, unauthorized users see masked values. In both cases, data masking can be deployed without the need to customize the application or write any code.

Our Informatica data masking solutions provide:

  • Rapid deployment of preventative security measures without the need to write code
  • Scalability for heterogeneous applications both on premises and in the cloud
  • Policy-driven security and monitoring throughout the application lifecycle from development to production to retirement
  • Full integration with authentication software

Learn more - Download the Gartner Magic Quadrant Data Masking Technology full report in English now.

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available here.

Gartner does not endorse any vendor, product, or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

1 Gartner Magic Quadrant for Data Masking Technology, Joseph Feiman and Brian Lowans, December 10, 2014