Send Message
Chengdu Shuwei Communication Technology Co., Ltd.
Chengdu Shuwei Communication Technology Co., Ltd.
products
Home /

products

Data Masking Technology Network Packet Generator And TAP From Cloud Data Protection

Product Details

Place of Origin: China

Brand Name: NetTAP®

Certification: CCC, CE, RoHS

Model Number: MATRIX-TCA-CG; NT-FTAP-32QCX

Payment & Shipping Terms

Minimum Order Quantity: 1 SET

Price: Can Discuss

Packaging Details: Outer Carton plus Inner Foam

Delivery Time: 1-3 Working Days

Payment Terms: L/C, D/A, D/P, T/T, Western Union, MoneyGram

Supply Ability: 100 sets per month

Get Best Price
Contact Now
Specifications
Highlight:

ethernet packet generator

,

multicast traffic generator

Data Masking:
Also Called Bleaching, Data Privacy Or Data Distortion
Value:
Avoid The Sensitive Data Leakage
Optimize:
Route The Right Traffic To Right Tools
VXLAN Headers:
Support Stripping VXLAN Headers Off
Applications:
Data Center Of Telecom, Broadcasting, Government, Etc
Security:
Data Protection, Prevent Leakage
Data Masking:
Also Called Bleaching, Data Privacy Or Data Distortion
Value:
Avoid The Sensitive Data Leakage
Optimize:
Route The Right Traffic To Right Tools
VXLAN Headers:
Support Stripping VXLAN Headers Off
Applications:
Data Center Of Telecom, Broadcasting, Government, Etc
Security:
Data Protection, Prevent Leakage
Description
Data Masking Technology Network Packet Generator And TAP From Cloud Data Protection

Data Masking Technology in Network Packet Broker and TAP for Packet Generator from Cloud
 
What is Data Masking?
Data Masking(Data desensitization), also called bleaching, Data Privacy or Data Distortion. Refers to the distortion of some sensitive information through desensitization rules to achieve reliable protection of sensitive privacy data.When customer security data or some commercially sensitive data are involved, real data should be modified and tested without violating system rules. Personal information such as ID card number, mobile phone number, card number and customer number should be desensitized.
There are many examples of data desensitization in our lives. For example, the most common train tickets and consignee addresses of E-commerce companies all deal with sensitive information. Even the beauty faces familiar to lesbians and the mosaics in some videos all belong to desensitization.
 
Why need data Masking?
It said above that the data should be modified "when customer security data or some commercially sensitive data are involved", indicating that the data to be modified is related to the security of user or enterprise data. Data Masking is actually encryption of these data to prevent leakage.
For the degree of data masking, generally, as long as the original information cannot be inferred, it will not cause information leakage. If there are too many modifications, it is easy to lose the original characteristics of the data.Therefore, in practice, it is necessary to select appropriate desensitization rules according to the actual scene.Change the name, ID number, address, mobile phone number, telephone number and other customer related fields.
 
How to mask data in NetTAP® Network Packet Brokers and Network Taps?
According to the desensitization rules, it can be divided into recoverable desensitization and non-recoverable desensitization.Recoverable desensitization means that after the conversion of data by desensitization rules, the original data can be restored again through some processing. On the contrary, after the non-recoverable desensitization of data, the original data cannot be restored. The two can be regarded as reversible encryption and irreversible encryption respectively.
Data Masking Technology Network Packet Generator And TAP From Cloud Data Protection 0
 
Privacy Data Masking Technology
Usually in the big data platform, data is stored in a structured format. Each table is composed of many rows, and each row of data is composed of many columns.According to the data properties of the column, the data column can generally be divided into the following types:
1- A column that identifies a person, such as an ID number, address, and name.
2- A single column does not identify an individual, but multiple columns of information can be used to potentially identify a person. These columns are called semi-identification columns, such as zip code, birth date, and gender.A us study says 87 percent of americans can be identified using only zip codes, birthdays and gender information.
3- Columns containing user sensitive information such as transaction amount, illness and income.
4- Other columns that do not contain user sensitive information.
The so-called privacy data leakage avoidance refers to the people who avoid using data (data analysts, BI engineers, etc.) to identify a row of data as someone's information.
Data to mask, and masking technology based on data such as recognition of removing columns, column transform half recognition, make the data using the people in the guarantee for # 2 (converted) identifying column, columns and other column # 4 # 3 sensitive information on the basis of data analysis, to a certain extent, ensure its not according to the data to identify the user, to ensure data security and maximize the value of the mining data balance.
 
Data Masking Network Packet Broker
Common methods:
1. Substitution: if female user name is replaced with F, this method is more like "smoke screen", which can completely maintain information integrity for internal personnel, but easy to crack.
2. Rearrangement: the serial number 12345 is rearranged into 54321, which is scrambled in a certain order. It is similar to "replace", which is convenient to restore information when needed, but also easy to crack.
3. Encryption: the number 12345 is 23456. The degree of security depends on which encryption algorithm is adopted and generally depends on the actual situation.
4. Truncation: 13811001111 truncated to 138, giving up necessary information to ensure the ambiguity of data, is a common desensitization method, but it is often not friendly to production.(missing field length)
5. Mask: 123456-> 1xxxx6, which preserves part of the information and ensures the invariable length of the information, making it easier to identify the information holder, such as the identity information on the train ticket.(common methods)
6. Date offset is rounded: 20130520 12:30:45-> 20130520 12:00:00. Precision is sacrificed to ensure the security of the original data.
 
What kind Network Packet Broker and Network Taps support Data Masking?
With the acceleration of carrier broadband construction and the rapid development of 3G, 4G, and 5G networks, and with the popularity and development of big data and cloud computing technologies, data traffic is growing, and the bandwidth requirements for backbone networks and core networks are increasing. Since 2013, the major operators have begun to gradually upgrade the backbone network. The core backbone network transmission link media starts to be expanded from 10GPOS and 40GPOS links to 100G Ethernet links. It will inevitably lead to the continuous updating of big data collection and analysis technology. In the face of 100GE link environment with high bandwidth capacity, how to effectively meet the requirements of various national security, network security monitoring, operator intelligent pipeline DPI data collection and analysis will become a hot spot in the field of data acquisition and analysis.
Chengdu Shuwei Communication is following the development direction of the Internet and develop the MATRIX-TCA-CG Traffic Acquisition(Traffic Capture) Visibility System, and dedicated to the traffic collection and visual analysis application requirements on 1GE, 10GE, 10G/40G POS, 40GE and 100GE links. The MATRIX-TCA-CG integrates free-steering output functions such as network flow collection/acquisition, aggregation, filtering, forwarding/distribution, and load balancing and provides an efficient solution for the flow analysis.
 
Matrix-TCA-CG is a network data visualization control device for high density and large flow of 10G/40G/100G.
Matrix-TCA-CG is specially designed for the data collection of 10GE 40GE and 100GE links distributed intensively in operators mobile Internet export, IDC export, provincial network and backbone.
Based on ATCA standard architecture, MATRIX-TCA-CG has high carrier-level reliability and strong expansibility which can smoothly configure the functional board CARDS to cope with port demand scenarios of various specifications and sizes.
Data Masking Technology Network Packet Generator And TAP From Cloud Data Protection 1
  
 
 
Data Masking Technology Network Packet Generator And TAP From Cloud Data Protection 2
 
Network Packet Broker Specification and Module Type

Component typeProduct ModelBasic ParameterRemarks
ChassisNTCA-CHS-7U7S-DCHeight:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage DC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modularMust choose one
NTCA-CHS-7U7S-ACHeight:7U,7 slots, ATCA Chassis, double star 100G backplane, 3 high voltage AC(240VDC~280VDC) input,3* 2+1 redundant 3000W power modular
Service cardNT-TCA-SCG10100G exchange card,10*QSFP28 interfaceChoose according to actual business needs
NT-TCA-CG10100G service card,10*QSFP28 interface
NT-TCA-XG2410G service card,24*SFP+ interface
NT-TCA-RTM-CG10100G RTM card,10*QSFP28 interface
NT-TCA-RTM-EXG2410G RTM card,24*SFP+ interface
  
TCA Visibility Embedded software systemNT-TCA-SOFT-PKG must

 
Data Masking Technology Network Packet Generator And TAP From Cloud Data Protection 3 NT-FTAP-32QCX Network TAP NPB.pdf

Send your inquiry
Please send us your request and we will reply to you as soon as possible.
Send
Google Analytics -->