We anonymize data with GEM Winch
Wondering how to provide your developers or third-party vendors with a representative sample of data from your production environment for development, testing, or training purposes without violating security policies for handling sensitive data?
GEM System offers you universal modular system for creating slices, transforming, migrating and anonymizing data - GEM Winch. We developed this tool based on experience from projects in the environment of a complex and extensive information system of a large organization. At the same time, we took advantage of the great advantages of a progressive and flexible tool Enterprise Architect, which covers all aspects of the development cycle. At the same time, we built the GEM Winch on our know-how and procedures for solving a number of practical problems from a real environment.
Arguments for GEM WINCH
- Simple installation
- Work in the familiar Enterprise Architect environment
- Extensive libraries of ready-made transformation functions
- Comprehensive statistics on the use and application of transformations
S GEM Winch you can easily and intuitively determine which data should be included in the created sample. Decide for yourself what the target volume of data should be, which data will be anonymized or how it will be anonymized. The transformation module and the database module take care of anonymization and the implementation of data transformation in the environment of the specified database platform.
Reasons for anonymization
- Compliance with legislative and regulatory data protection measures (General EU Regulation on Personal Data Protection No. 2016/679 (GDPR))
- Providing consistent test data for non-production environments
- Saving time and money compared to generating "artificial" test data
- Protection against data misuse in non-production environments
Principles of anonymization
- Random character generation
- Use of pre-prepared dictionaries
- Data mixing
- Adding noise
- Micro-aggregation
- Application of rules for compliance with the data format (RČ, IČ, IBAN)
- Binary content anonymization
Who will take care of you?
An experienced team of IT security experts will take care of all your company data. Don't be afraid to trust them, they are also in charge of our security.