An approach to Data Masking: Exploration Ms. Jain Ruby1, Dr. Puri Manimala2 1Research Scholar, JSPM's AIOCA under SPPU, Pune, Maharashtra 2Director, JSPM's AIOCA, Pune, Maharashtra Online published on 22 January, 2018. Abstract Amidst the numerous cyber attacks, securing organizational data and information has made it a tough time for administrators. The fear of cyber attacks has also made a tremendous change in the security solutions market in the recent decade. McAfee reported that according to recent Verizon Data Breach Investigations report, more than 92% of records breached involved a database. Annual research by the Computer Emergency Response Team indicates that up to half of those breaches are caused by internal users. In this research article the researchers explored the details of data masking, complications related with masking, Challenges, Benefits of Data Masking, comprehensive data privacy solution. Top Keywords Encryption, key management, reporting, workflow and identity and access management. Top |