MENTIS

Automate your data protection and privacy compliance efforts through MENTIS unified solution that enables data security while equipping you with the tools to respond to compliance-related requests like the Right to Know and Right to Erasure in a swift and efficient manner.

Uncover hidden sensitive data locations within your enterprise through MENTIS patented Sensitive Data Discovery module. Find data hidden in all types of data stores in the most obscure locations, be it structured, unstructured, Big Data, or on the Cloud.

null

Uncover Hidden Data Security Risks

  • Leverage the power of Artificial Intelligence and Natural Language Processing to uncover data in the most complex of locations.
  • Ensure efficient identification of sensitive data with minimal false positives with a patented approach to data discovery
  • Configure any additional data classifications over and above the 70+ out-of-the-box data classifications covering all popular PII and PHI data.

null

Demonstrate compliance with Privacy Regulations

  • Discover all the popular data classifications mandated by global privacy regulations like the GDPR, CCPA, HIPAA, etc.
  • Maintain dashboards that track the risk carried by individual datastores due to the presence of sensitive data.
  • Generate reports that are specific to security leaders responsible for maintaining regulatory compliance.
  • Audit-ready reporting that displays the presence of sensitive data across the enterprise.

null

User & Program Discovery

  • Scan the underlying code using MENTIS’ Code Discovery to discover users and programs with access to your sensitive data.
  • Uncover insights as to how sensitive data came to be present in a particular location.
  • Develop a data flow map that illustrates the proliferation of sensitive data within your enterprise.

null

Patented Approach

  • Determine the likelihood of the discovered data classification being sensitive data with a scorecard approach that assigns confidence scores.
  • Choose from 3 scan types, namely Sample Scan, Full Scan, and Incremental Scan, with flexible scanning methods.
  • Scan only the newly added tables/rows/columns after a datastore refresh through incremental scanning.

null

Simplistic yet powerful

  • Deploy iDiscover with minimal effort for the configuration set up with 35 out-of-the-box data classifications.
  • Analyze the discovery results in a short time frame in as less as three days* with the minimal additional manual effort required.
  • Easily configure additional data classifications if required, in a simple to understand user interface.

null

Unstructured Data Discovery

  • Utilize the power of Artificial Intelligence and Natural Language Processing that can understand the context and discover sensitive data in unstructured fields.
  • Discover sensitive data even in log files that could otherwise go undiscovered.

Get the flexibility to choose the anonymization method as per your requirements – including encryption, tokenization, and masking techniques – to protect your sensitive data in a delicate balance of performance and security.

null

Secure data in Pre-Production and Non-Production environments

  • Choose from 60+ different anonymization methods that protect your sensitive data effectively.
  • Maintain referential integrity between applications through anonymization methods that give you consistent results across applications and datastores.
  • Anonymization methods offer you the best of both worlds in terms of protection and performance.

null

Demonstrate compliance with Privacy Regulations

  • Anonymize your sensitive data using a range of methods that provide adequate security while maintaining data usability.
  • Protect sensitive data across data stores and applications and maintain referential integrity between them.
  • Choose from a variety of NIST-approved encryption and tokenization algorithms in addition to masking to secure your sensitive data

null

Encryption, Masking, and Tokenization

  • Choose how you want to secure your sensitive data with a data classification-centric anonymization technique.
  • Secure your data across the spectrum, whether it is in-transit, at-rest, or in-use.
  • Provide the best-in-class security for your sensitive data with the NIST-approved fips140 algorithm for encryption and tokenization.

null

Preserve data context while integrating with DevOps

  • Implement masking that integrates easily with your replication process with a choice of in-app or API-based execution of anonymization.
  • Anonymize your data with context-preserving techniques that enable you to retain the data’s usability.
  • Retain the characteristics of the original data with anonymization techniques that maintain format, length, and context.

null

Minimal risk of Re-identification

  • Enable adequate anonymization with minimal re-identification risk through the use of the MENTIS Identities (patent pending) masking method.
  • Generate a fake dataset similar in characteristics to the original data through fuzzy logic and artificial intelligence, with MENTIS identities.
  • Maintain an anonymized data store that preserves demographics, gender ratios, age distribution, and the like.

iMask secures your sensitive data at the Application Layer and the Database Layer by offering flexible approaches that cater to all use cases and all types of users – small, medium, and large enterprises.

null

Take control of sensitive data in Production Environments

  • Ensure your data’s complete production instances by masking sensitive data at both application and database layers.
  • Configure rules within the product UI to enable role-based, user-based, program-based, and location-based access controls on who can access your sensitive data.
  • Maintain data consistency between production and non-production instances by having the flexibility to choose from over 40 anonymization methods.

null

Enable Secure Off-shore Data Access and Data Residency Requirements

  • Configure authorization rules to control who can view the sensitive data through conditions based on user, geography, roles, departments, etc.
  • Enable secure anonymization protocols without any loss of performance.
  • Deidentify data without any change in application architecture or existing security protocols through a database-embedded approach.

null

Transparent Data Protection

  • Choose how you want to secure your sensitive data with a data classification-centric anonymization technique.
  • Secure your data across the spectrum, whether it is in-transit, at-rest, or in-use.
  • Provide the best-in-class security for your sensitive data with NIST-approved fips140 algorithm for encryption and tokenization.

null

Blended and Hybrid Data Masking

  • Unlock the power of co-existent static and dynamic data masking that addresses unique use cases.
  • Maintain integrity between application clusters during cloud migration.
  • Securely migrate individual applications within your application cluster to the cloud without any hassles or complexities.
  • Enhance your data security program by anonymizing data in the database layer and at the application layer.

null

User, Location, and Program based conditional masking

  • iMask offers you the ability to control who accesses your sensitive data through the application of authorization rules.
  • Rules can be configured based on user, location, role, and even programs.
  • Ensure complete control over your sensitive data access, and combine with real-time monitoring, enabling a full 360-degree data protection coverage.

iMinimize maps the data flow within your enterprise, thereby providing you with accurate knowledge of data proliferation, and equips you to act on Subject Rights Requests in an automated and comprehensive manner.

null

Automate Subject Rights Requests responses through a unified console

  • Securely respond to the Right to Access and Right to Erasure requests through iRetire.
  • Define rules for secure tokenization or deletion of requested sensitive data.
  • Send automated secure emails with details of sensitive data requested.
  • Automate Data Subject Requests, thereby generating a return in investment of approximately 12000% in a year.

null

Demonstrate preparedness towards Audit & Regulatory Compliance requirements

  • Configure rules to identify inactive sensitive data as per organizational policies.
  • Securely de-identify operational data while maintaining the transactional integrity of the data store.
  • Automate the retirement or deletion of sensitive data that is past the retention period.

Exhibit regulatory compliance while ensuring last-mile data security through a comprehensive solution that offers:

null

Flexibility to retire or delete your sensitive data

  • Secure sensitive data through tokenization, thereby preserving the data store’s transactional integrity.
  • Enable adequate data security with easily configurable rules.
  • Automate your data retention rules, thereby eliminating the risk of inactive sensitive data exposure.

null

Simplified response to Subject Rights Requests

  • View your data flows and data proliferation within the enterprise in a single place.
  • Demonstrate compliance to these requests in a single click.
  • Scale the solution to handle more requests in a single go.

Super secure your data with MENTIS

Request Demo