Compare the Top Data Masking Software in China as of February 2026

What is Data Masking Software in China?

Data masking software is designed to protect sensitive information by replacing real data with anonymized, scrambled, or fictionalized values while maintaining usability for testing, development, or analytics. It ensures that personally identifiable information (PII), financial details, healthcare records, or other confidential data remain secure when shared outside of production environments. These tools apply techniques such as substitution, shuffling, encryption, and tokenization to preserve data format and integrity without exposing the original content. By safeguarding sensitive fields, data masking software helps organizations comply with privacy regulations like GDPR, HIPAA, and PCI DSS. It is widely used in industries such as banking, healthcare, retail, and government where strict data protection is required. Compare and read user reviews of the best Data Masking software in China currently available using the table below. This list is updated regularly.

  • 1
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 2
    Imperva Data Security Fabric
    Protect data at scale with an enterprise-class, multicloud, hybrid security solution for all data types. Extend data security across multicloud, hybrid, and on-premises environments. Discover and classify structured, semi-structured, & unstructured. Prioritize data risk for both incident context and additional data capabilities. Centralize data management via a single data service or dashboard. Protect against data exposure and avoid breaches. Simplify data-centric security, compliance, and governance. Unify the view and gain insights to at-risk data and users. Supervise Zero Trust posture and policy enforcement. Save time and money with automation and workflows. Support for hundreds of file shares and data repositories including public, private, datacenter and third-party cloud services. Cover both your immediate needs & future integrations as you transform and extend use cases in the cloud.
  • 3
    K2View

    K2View

    K2View

    At K2View, we believe that every enterprise should be able to leverage its data to become as disruptive and agile as the best companies in its industry. We make this possible through our patented Data Product Platform, which creates and manages a complete and compliant dataset for every business entity – on demand, and in real time. The dataset is always in sync with its underlying sources, adapts to changes in the source structures, and is instantly accessible to any authorized data consumer. Data Product Platform fuels many operational use cases, including customer 360, data masking and tokenization, test data management, data migration, legacy application modernization, data pipelining and more – to deliver business outcomes in less than half the time, and at half the cost, of any other alternative. The platform inherently supports modern data architectures – data mesh, data fabric, and data hub – and deploys in cloud, on-premise, or hybrid environments.
  • 4
    LiveRamp

    LiveRamp

    LiveRamp

    Everything we do centers on making data safe and easy for businesses to use. Our Safe Haven platform powers customer intelligence, engages customers at scale, and creates breakthrough opportunities for business growth. Our platform offers the modern enterprise full control of how data can be accessed and used with industry leading software solutions for identity, activation, and data collaboration. Build access to data, develop valuable business insights and drive revenue while maintaining full control over access and use of data at all times. Accurately address your specific audiences at scale across any channel, platform, publisher or network and safely translate data between identity spaces to improve results. Protect your customer data with leading privacy-preserving technologies and advanced techniques to minimize data movement while still enabling insight generation.
  • 5
    IRI DarkShield

    IRI DarkShield

    IRI, The CoSort Company

    IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.
    Starting Price: $5000
  • 6
    IRI CoSort

    IRI CoSort

    IRI, The CoSort Company

    What is CoSort? IRI CoSort® is a fast, affordable, and easy-to-use sort/merge/report utility, and a full-featured data transformation and preparation package. The world's first sort product off the mainframe, CoSort continues to deliver maximum price-performance and functional versatility for the manipulation and blending of big data sources. CoSort also powers the IRI Voracity data management platform and many third-party tools. What does CoSort do? CoSort runs multi-threaded sort/merge jobs AND many other high-volume (big data) manipulations separately, or in combination. It can also cleanse, mask, convert, and report at the same time. Self-documenting 4GL scripts supported in Eclipse™ help you speed or leave legacy: sort, ETL and BI tools; COBOL and SQL programs, plus Hadoop, Perl, Python, and other batch jobs. Use CoSort to sort, join, aggregate, and load 2-20X faster than data wrangling and BI tools, 10x faster than SQL transforms, and 6x faster than most ETL tools.
    Starting Price: $4,000 perpetual use
  • 7
    Accelario

    Accelario

    Accelario

    Take the load off of DevOps and eliminate privacy concerns by giving your teams full data autonomy and independence via an easy-to-use self-service portal. Simplify access, eliminate data roadblocks and speed up provisioning for dev, testing, data analysts and more. Accelario Continuous DataOps Platform is a one-stop-shop for handling all of your data needs. Eliminate DevOps bottlenecks and give your teams the high-quality, privacy-compliant data they need. The platform’s four distinct modules are available as stand-alone solutions or as a holistic, comprehensive DataOps management platform. Existing data provisioning solutions can’t keep up with agile demands for continuous, independent access to fresh, privacy-compliant data in autonomous environments. Teams can meet agile demands for fast, frequent deliveries with a comprehensive, one-stop-shop for self-provisioning privacy-compliant high-quality data in their very own environments.
    Starting Price: $0 Free Forever Up to 10GB
  • 8
    Wizuda

    Wizuda

    Wizuda

    Powerful Solutions to revolutionize how your organization shares data internally and externally. Designed with security, compliance and efficiency at its core, Wizuda MFT enables IT to manage the movement of critical data within your organization and with external parties, from one centralized solution. Wizuda MFT scales with your business and provides full end-to-end accountability of all file transfer operations. Provide people in your organization and clients with an easy, secure and compliant way to share sensitive data. With no file size limitations and encryption by default, using insecure alternatives such as USBs can be a thing of the past. Users have the added flexibility of sending emails with Wizuda either straight from their Outlook email or the secure web portal. Wizuda Virtual Data Rooms provide your business with a secure online repository for document storage, collaboration and distribution. Built with ‘privacy by design’, Wizuda VDRs can be set up in minutes.
    Starting Price: $9.99/month/user
  • 9
    Satori

    Satori

    Satori

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.
  • 10
    IRI FieldShield

    IRI FieldShield

    IRI, The CoSort Company

    IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones.
  • 11
    TestBench for IBM i

    TestBench for IBM i

    Original Software

    Testing and test data management for IBM i, IBM iSeries, AS/400. Complex IBM i applications must be checked from top to bottom, right into the data, wherever it is. TestBench IBM i is a comprehensive, proven test data management, verification and unit testing solution that integrates with other solutions for total application quality. Stop copying the entire live database and hone in on the data you really need. Select or sample data with full referential integrity preserved. Simply decide which fields need to be protected and use a variety of obfuscation methods to protect your data. Track every insert, update and delete including intervening data states. Create rules so that data failures are flagged to you automatically. Avoid the painful save/restores and stop attempting to explain bad test results based on poor initial data. Comparing outputs is a well proven method to verify your test results but it can be laborious and prone to error. This unique solution can save hours.
    Starting Price: $1,200 per user per year
  • 12
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
    Starting Price: $159 per month
  • 13
    Querona

    Querona

    YouNeedIT

    We make BI & Big Data analytics work easier and faster. Our goal is to empower business users and make always-busy business and heavily loaded BI specialists less dependent on each other when solving data-driven business problems. If you have ever experienced a lack of data you needed, time to consuming report generation or long queue to your BI expert, consider Querona. Querona uses a built-in Big Data engine to handle growing data volumes. Repeatable queries can be cached or calculated in advance. Optimization needs less effort as Querona automatically suggests query improvements. Querona empowers business analysts and data scientists by putting self-service in their hands. They can easily discover and prototype data models, add new data sources, experiment with query optimization and dig in raw data. Less IT is needed. Now users can get live data no matter where it is stored. If databases are too busy to be queried live, Querona will cache the data.
  • 14
    HushHush Data Masking
    Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms.
  • 15
    DATPROF

    DATPROF

    DATPROF

    Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
  • 16
    Lenses

    Lenses

    Lenses.io

    Enable everyone to discover and observe streaming data. Sharing, documenting and cataloging your data can increase productivity by up to 95%. Then from data, build apps for production use cases. Apply a data-centric security model to cover all the gaps of open source technology, and address data privacy. Provide secure and low-code data pipeline capabilities. Eliminate all darkness and offer unparalleled observability in data and apps. Unify your data mesh and data technologies and be confident with open source in production. Lenses is the highest rated product for real-time stream analytics according to independent third party reviews. With feedback from our community and thousands of engineering hours invested, we've built features that ensure you can focus on what drives value from your real time data. Deploy and run SQL-based real time applications over any Kafka Connect or Kubernetes infrastructure including AWS EKS.
    Starting Price: $49 per month
  • 17
    Dataguise

    Dataguise

    Dataguise

    Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses,
  • 18
    PHEMI Health DataLab
    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden. PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools.
  • 19
    Informatica Persistent Data Masking
    Retain context, form, and integrity while preserving privacy. Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments. As a highly scalable, high-performance data masking solution, Informatica Persistent Data Masking shields confidential data—such as credit card numbers, addresses, and phone numbers—from unintended exposure by creating realistic, de-identified data that can be shared safely internally or externally. It also allows you to reduce the risk of data breaches in nonproduction environments, produce higher-quality test data and streamline development projects, and ensure compliance with data-privacy mandates and regulations.
  • 20
    TCS MasterCraft DataPlus

    TCS MasterCraft DataPlus

    Tata Consultancy Services

    The users of data management software are primarily from enterprise business teams. This requires the data management software to be highly user-friendly, automated and intelligent. Additionally, data management activities must adhere to various industry-specific and data protection related regulatory requirements. Further, data must be adequate, accurate, consistent, of high quality and securely accessible so that business teams can make informed and data-driven strategic business decisons. Enables an integrated approach for data privacy, data quality management, test data management, data analytics and data modeling. Efficiently addresses growing volumes of data efficiently, through service engine-based architecture. Handles niche data processing requirements, beyond out of box functionality, through a user-defined function framework and python adapter. Provides a lean layer of governance surrounding data privacy and data quality management.
  • 21
    IRI Voracity

    IRI Voracity

    IRI, The CoSort Company

    Voracity is the only high-performance, all-in-one data management platform accelerating AND consolidating the key activities of data discovery, integration, migration, governance, and analytics. Voracity helps you control your data in every stage of the lifecycle, and extract maximum value from it. Only in Voracity can you: 1) CLASSIFY, profile and diagram enterprise data sources 2) Speed or LEAVE legacy sort and ETL tools 3) MIGRATE data to modernize and WRANGLE data to analyze 4) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. Use Voracity to comply with data privacy laws, de-muck and govern the data lake, improve the reliability of your analytics, and create safe, smart test data
  • 22
    DOT Anonymizer

    DOT Anonymizer

    DOT Anonymizer

    Mask your personal data while ensuring it looks and acts like real data. Software development needs realistic test data. DOT Anonymizer masks your test data while ensuring its consistency, across all your data sources and DBMS. The use of personal or identifying data outside of production (development, testing, training, BI, external service providers, etc.) carries a major risk of data leak. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. Anonymization enables you to retain the original data format. Your teams work with fictional but realistic data. Manage all your data sources and maintain their usability. Invoke DOT Anonymizer functions from your own applications. Consistency of anonymizations across all DBMS and platforms. Preserve relations between tables to guarantee realistic data. Anonymize all database types and files like CSV, XML, JSON, etc.
    Starting Price: €488 per month
  • 23
    Randtronics DPM easyCipher
    Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database.
  • 24
    Doculayer

    Doculayer

    Doculayer

    Forget about manual content classification and data entry. Doculayer.ai offers a configurable pipeline with document processing services like OCR, document type classification, topic classification, data extraction and data masking. Doculayer.ai puts business users in the driver's seat by making training/learning easy via an intuitive user interface for labeling of documents and data. With our hybrid data extraction approach machine learning models can be combined with rules, patterns and library scripts to obtain better results with less training data in less time. For the protection of sensitive data within documents, data masking can be anonymized or pseudonymized. Doculayer.ai adds document intelligence to your Content Services Platform, Business Process Management systems, and RPA solutions. Supercharge your existing IT environment for document processing with machine learning, natural language processing, and computer vision technologies.
  • 25
    Apache Atlas

    Apache Atlas

    Apache Software Foundation

    Atlas is a scalable and extensible set of core foundational governance services – enabling enterprises to effectively and efficiently meet their compliance requirements within Hadoop and allows integration with the whole enterprise data ecosystem. Apache Atlas provides open metadata management and governance capabilities for organizations to build a catalog of their data assets, classify and govern these assets and provide collaboration capabilities around these data assets for data scientists, analysts and the data governance team. Pre-defined types for various Hadoop and non-Hadoop metadata. Ability to define new types for the metadata to be managed. Types can have primitive attributes, complex attributes, object references; can inherit from other types. Instances of types, called entities, capture metadata object details and their relationships. REST APIs to work with types and instances allow easier integration.
  • 26
    Privacera

    Privacera

    Privacera

    At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™.
  • 27
    Assure Security
    Assure Compliance Monitoring is a bundle of Assure Security features. Together, they can quickly identify security and compliance issues by producing alerts and reports on IBM i system activity, database changes and views of Db2 data. The bundle includes two features which are also available separately. Assure Monitoring and Reporting seamlessly extracts insights from IBM i journal data and delivers alerts and reports on security incidents and compliance deviations. System and database monitoring capabilities are available separately or together. Or, choose to send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. Assure Db2 Data Monitor is a unique, innovative solution that monitors views of highly confidential Db2 data and optionally blocks records from view. Assure Security delivers market-leading IBM i security capabilities that help your organization successfully comply with cybersecurity regulations.
  • 28
    Okera

    Okera

    Okera

    Okera, the Universal Data Authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and demonstrate regulatory compliance. The Okera Dynamic Access Platform automatically enforces universal fine-grained access control policies. This allows employees, customers, and partners to use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives. Okera began development in 2016 and now dynamically authorizes access to hundreds of petabytes of sensitive data for the world’s most demanding F100 companies and regulatory agencies. The company is headquartered in San Francisco.
  • 29
    Solix EDMS

    Solix EDMS

    Solix Technologies

    The Solix Enterprise Data Management Suite (Solix EDMS) brings together all the tools for an effective Information Lifecycle Management (ILM) program. From a single web-based console, the platform offers industry-leading database archiving, test data management, data masking, and application retirement solutions. Solix EDMS is designed to control costs, boost application performance and availability, and meet compliance objectives. It offers universal access to all archived data for business users through full-text search, structured SQL queries, forms & reports. Solix EDMS helps you quickly identify infrequently accessed historic data from your production applications, and ‘move’ it to a secure archive with data integrity and access preserved. Retention management holds the archived data for a given period of time, and purges the data automatically, or manually when the data retention policy meets its criteria.
  • 30
    Pathlock

    Pathlock

    Pathlock

    Pathlock brings simplicity to customers who are facing the security, risk, and compliance complexities of a digitally transformed organization. New applications, new threats, and new compliance requirements have outpaced disparate, legacy solutions. Pathlock provides a single platform to unify access governance, automate audit and compliance processes, and fortify application security. With Pathlock, some of the largest and most complex organizations in the world can confidently handle the security and compliance requirements in their core ERP and beyond. Whether it’s minimizing risk exposure and improving threat detection, handling SoD with ease, or unlocking IAM process efficiencies – Pathlock provides the fastest path towards strengthening your ERP security & compliance posture.
  • Previous
  • You're on page 1
  • 2
  • Next