Find out what your peers are saying about Informatica, Perforce, Broadcom and others in Data Masking.
Product | Market Share (%) |
---|---|
Broadcom Test Data Manager | 7.8% |
NextLabs Externalized Authorization Management | 0.6% |
Other | 91.6% |
Company Size | Count |
---|---|
Small Business | 3 |
Midsize Enterprise | 2 |
Large Enterprise | 30 |
Broadcom Test Data Manager enables effective test data processes with tools for synthetic data generation, data masking, and data subsetting. It enhances automation and ensures data privacy and compliance, catering to diverse testing environments.
Broadcom Test Data Manager provides centralized data management with flexible functionalities like cubing and test matching, simplifying the creation and handling of test data. It supports both relational and non-relational data, optimizing test processes for effective results. Users find its intuitive UI and self-service portal time-saving. However, enhancements in programmatic capabilities, non-relational data handling, automation, and integration speed are needed. A unified web-based interface, better API usability, and expanded data source support could improve user experience. Mainframe functionality, data reservation, and web-based UI transitions also require focus for stability and scalability improvements.
What are its key features?Broadcom Test Data Manager is widely used in industries like healthcare and finance for data masking and test management. It aids in creating synthetic data, managing subsetting, and anonymizing information, particularly valuable in handling regulated data. Its alignment with DevOps and comprehensive data capabilities are key in supporting secure, efficient testing workflows.
NextLabs Authorization Management separates policy management from the application lifecycle. It externalizes access control decisions to a decision point (decision is based on the data they want to access and the action they want to perform) that is decoupled from the application. The system interrogates an information point to determine a user's access rights based on a centrally managed policy. Authorization and access rights to an organization's network or assets are granted dynamically in real-time based on user, data and environmental attributes. Externalized authorization allows for the management of permissions to multiple systems from a single platform, streamlining the access process and reducing administrative burden. Access control to file shares, network subnets, document repositories and applications can now be made in real time by a centrally-managed decision point, using attributes in a user's directory entry.
We monitor all Data Masking reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.