Best Data Masking Software for Splunk Cloud Platform

Compare the Top Data Masking Software that integrates with Splunk Cloud Platform as of September 2025

This a list of Data Masking software that integrates with Splunk Cloud Platform. Use the filters on the left to add additional filters for products that have integrations with Splunk Cloud Platform. View the products that work with Splunk Cloud Platform in the table below.

What is Data Masking Software for Splunk Cloud Platform?

Data masking software is designed to protect sensitive information by replacing real data with anonymized, scrambled, or fictionalized values while maintaining usability for testing, development, or analytics. It ensures that personally identifiable information (PII), financial details, healthcare records, or other confidential data remain secure when shared outside of production environments. These tools apply techniques such as substitution, shuffling, encryption, and tokenization to preserve data format and integrity without exposing the original content. By safeguarding sensitive fields, data masking software helps organizations comply with privacy regulations like GDPR, HIPAA, and PCI DSS. It is widely used in industries such as banking, healthcare, retail, and government where strict data protection is required. Compare and read user reviews of the best Data Masking software for Splunk Cloud Platform currently available using the table below. This list is updated regularly.

  • 1
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
    Starting Price: $1000 per day
  • 2
    Assure Security
    Assure Compliance Monitoring is a bundle of Assure Security features. Together, they can quickly identify security and compliance issues by producing alerts and reports on IBM i system activity, database changes and views of Db2 data. The bundle includes two features which are also available separately. Assure Monitoring and Reporting seamlessly extracts insights from IBM i journal data and delivers alerts and reports on security incidents and compliance deviations. System and database monitoring capabilities are available separately or together. Or, choose to send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. Assure Db2 Data Monitor is a unique, innovative solution that monitors views of highly confidential Db2 data and optionally blocks records from view. Assure Security delivers market-leading IBM i security capabilities that help your organization successfully comply with cybersecurity regulations.
  • 3
    Forcepoint SimShield
    Secure data transfer for training and testing environments. Included on the U.S. NCDSMO Baseline for SABI environments (since 2009) with native support for DIS, HLA, TENA, RTP and MPEG2-TS, and meets NSA Raise the Bar and NIST guidelines. Evaluated by the High Performance Computing Modernization Program Office (HPCMPO) for connection to Defense Research & Engineering Network (DREN) and Secure Defense Research & Engineering Network (SDREN). SimShield enables fully automated, predictable, controlled, and audited two-way communication and sanitization of events across segmented, air-gapped security domains. Always have the latest features without additional cost, vs. Government-Off-The-Shelf (GOTS) solutions. Train multiple national agencies or coalition forces at the same time in a single, real-world environment. Sanitized information sharing for faster detection and correction of issues and errors during Research, Development, Test & Evaluation (RDT&E).
  • 4
    Okera

    Okera

    Okera

    Okera, the Universal Data Authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and demonstrate regulatory compliance. The Okera Dynamic Access Platform automatically enforces universal fine-grained access control policies. This allows employees, customers, and partners to use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives. Okera began development in 2016 and now dynamically authorizes access to hundreds of petabytes of sensitive data for the world’s most demanding F100 companies and regulatory agencies. The company is headquartered in San Francisco.
  • Previous
  • You're on page 1
  • Next