Protegrity Data Security OverviewUNIXBusinessApplication

Protegrity Data Security is the #5 ranked solution in top Database Security tools and #7 ranked solution in top Data Masking tools. PeerSpot users give Protegrity Data Security an average rating of 8.0 out of 10. Protegrity Data Security is most commonly compared to Micro Focus Voltage SecureData Enterprise: Protegrity Data Security vs Micro Focus Voltage SecureData Enterprise. Protegrity Data Security is popular among the large enterprise segment, accounting for 76% of users researching this solution on PeerSpot. The top industry researching this solution are professionals from a financial services firm, accounting for 29% of all views.
What is Protegrity Data Security?

Organizations leveraging networked applications and services benefit from the flexibility and convenience of being able to create and access data across multiple devices and users. At the same time, sensitive data, including health and personally identifiable information, may need to be protected or de-identified to satisfy regulations or internal privacy policies.

Protegrity Data Security Gateway addresses these security, privacy, and compliance risks with advanced encryption and tokenization to transparently protect sensitive data as it moves across the network. By securing data in real-time as it is transmitted, enterprises are assured that data automatically adhere to rules governing sensitive data at all times.

Transparently protect sensitive data across the network without modifying applications or database calls. Protect applications and API’s quickly without impacting your business.

Protegrity Data Security Customers

A $4 billion retail conglomerate and holding company

Protegrity Data Security Video

Protegrity Data Security Reviews

Filter by:
Filter Reviews
Filter Unavailable
Company Size
Filter Unavailable
Job Level
Filter Unavailable
Filter Unavailable
Filter Unavailable
Order by:
  • Date
  • Highest Rating
  • Lowest Rating
  • Review Length
Showingreviews based on the current filters. Reset all filters
Vinoth Raj Prabhakaran - PeerSpot reviewer
Senior Data Architect at Tata Consultancy Services
Real User
Top 10Leaderboard
Beneficial data security, good support, and straightforward initial setup

What is our primary use case?

Protegrity Data Security is used for masking or the tokenization of data.

What is most valuable?

The most valuable feature of Protegrity Data Security is the reduction of information being exposed.

What needs improvement?

Protegrity Data Security could improve by having more integration.

For how long have I used the solution?

I have been using Protegrity Data Security for approximately one year.

What do I think about the stability of the solution?

We have some performance issues with Protegrity Data Security but we are in the process of fixing it. However, the performance of the solution is only as good as your hardware.

What do I think about the scalability of the solution?

Protegrity Data Security is a scalable solution.

How are customer service and support?

The technical support of Protegrity Data Security is good.

How was the initial setup?

The initial setup of Protegrity Data Security was straightforward. However, we had a few problems, it's not multi-tenanted. It does not have a hierarchy of roles and differential priorities.

To have the initial sandbox version of Protegrity Data Security up and running, took approximately one week. However, it needed to be set up in a resilient way because if it fails, then it is going to be a challenge bringing back the lost information. We have to be particular in terms of architecting it correctly which is taking us a bit of time. We are anticipating anywhere between four to six weeks to be finished.

What other advice do I have?

For people who are operating only on structured information, Protegrity Data Security would work very well. If they have information that is unstructured, semi-structured, such as video images, then this solution is not the tool for them.

I rate Protegrity Data Security an eight out of ten.

Which deployment model are you using for this solution?

Public Cloud
Disclosure: My company has a business relationship with this vendor other than being a customer: Partner
Flag as inappropriate
PeerSpot user