Skip to content

We anonymize data with GEM Winch

Wondering how to provide your developers or third-party vendors with a representative sample of data from your production environment for development, testing, or training purposes without violating security policies for handling sensitive data?

Obsahuje váš informační systém citlivá data?
Pracujete s externími dodavateli IS?
Provozujete nejen produkční, ale i vývojová, testovací nebo školící prostředí?
Vybíráte nový HW a potřebujete otestovat jeho výkon?

GEM System offers you universal modular system for creating slices, transforming, migrating and anonymizing data - GEM Winch. We developed this tool based on experience from projects in the environment of a complex and extensive information system of a large organization. At the same time, we took advantage of the great advantages of a progressive and flexible tool Enterprise Architect, which covers all aspects of the development cycle. At the same time, we built the GEM Winch on our know-how and procedures for solving a number of practical problems from a real environment.

Arguments for GEM WINCH

S GEM Winch you can easily and intuitively determine which data should be included in the created sample. Decide for yourself what the target volume of data should be, which data will be anonymized or how it will be anonymized. The transformation module and the database module take care of anonymization and the implementation of data transformation in the environment of the specified database platform.

Reasons for anonymization

Principles of anonymization

Download GEM Winch Solution Specifications
(Czech version)

GEM Winch - solution specification in English
(Version française)

Who will take care of you?

An experienced team of IT security experts will take care of all your company data. Don't be afraid to trust them, they are also in charge of our security.

Are you interested in our offer?