New Search

If you are not happy with the results below please do another search

1 search result for:

1

Comparing enterprise data anonymization techniques

There comes a time when data needs to be shared — whether to evaluate a matter for research purposes, to test the functionality of a new application, or for an infinite number of other business purposes. To protect sensitivity or confidentiality of shared data, it often needs to be sanitized before it can be distributed and analyzed.