Site Map

The Data Masker for DB2 UDB online data anonymization tutorials

 

KEY FEATURES


Key Features Icon

KEY FEATURES

A summary of the Data Masker software.

 

WHITE PAPERS


White Paper Icon

DATA MASKING: WHAT YOU NEED TO KNOW

A comprehensive survey of the techniques and issues you need to know about before you begin data masking.

 

DOWNLOAD


Download Icon

DOWNLOAD DATA MASKER

A 30 day, fully functional, evaluation copy of the Data Masker software.

 

DOCUMENTATION


Quick Start Icon

QUICK START

A Quick start to the Data Masker software.

FAQ Icon

DATA MASKER FAQ

Answers to frequently asked questions about the Data Masker software.

System Reqirements Icon

SYSTEM REQUIREMENTS

The hardware & software supported by Data Masker.

 

The Data Masker for DB2 UDB Online Tutorials

 

The Data Masker tutorials are interactive "movies" which show you how to use the Data Masker software to protect and sanitize the data in your test databases.

Viewing a tutorial is like sitting with an instructor - you see the mouse move and the buttons press and each step is explained in detail as you progress. The tutorials are entirely Flash based - no plugins are required! All you need is a reasonably recent web browser. The tutorials can be viewed online by clicking on the links below.

The tutorials are quite small given the complexity of what they do. However, they are each several hundred Kb in size. If you do view them online you might experience a short delay while they get started - we appreciate your patience.

 

Opening and Running Masking Sets [view]
This tutorial shows how to open an existing set of masking rules and execute it in the target environment.

Creating a New Masking Set [view]

This tutorial shows how to use the New Masking Set Wizard to create the basic structure of a masking set.

Using Rule Blocks and Dependencies [view]

The Data Masker can run masking rules in parallel. This tutorial discusses how they explicitly control the execution order of masking rules.

About Rule Controllers [view]

Rule Controllers hold the login information which determines the target schema on which the masking rules will operate. This tutorial walks you through the basics of editing and configuring Rule Controllers.

Creating Substitution Rules [view]

Substitution rules replace the existing information in DB2 UDB tables with realistic looking information of a similar type. This tutorial shows you how to create them.

Creating Command Rules [view]

Command rules are used to run user defined SQL and PL/SQL statements within the target schema.

Creating Shuffle Rules [view]

Shuffle rules are used to move a column of data between the rows in a table. This ensures that the existing information in the column is thoroughly randomized and is not related to the remaining contents of the row.

Creating Row-Internal Synchronization Rules [view]

A Row-Internal Synchronization Rule updates a field in a row with a combination of values from the same row.

Creating Table-Internal Synchronization Rules [view]

A Table-Internal Synchronization Rule updates columns in groups of rows within a table to contain identical values.

Creating Table-To-Table Synchronization Rules [view]

A Table-To-Table Synchronization Rule uses a join condition to update columns in another table to contain identical values.