Data Encryption and Data Masking

Data Encryption and Data Masking

For the Actian Database products, Actian X, Actian Vector v6.0 and Actian Avalanche, data can be encrypted at the database level, column level and data can also be masked. In this video we introduce each method.

About this course

At the end of this course you will be able to:

You will have an understanding of how to apply encryption functionality across the Actian database products Actian X, Vector v6.0 and Actian Avalanche.  Data can be encrypted at any of the following levels or a combination of levels to suit your use case:

  • DBMS Level (Data at Rest) Encryption
    • Full Database Encryption
    • Individual Column Encryption
  • Application Level / Function-Based Encryption
    • AES_ENCRYPT_IV / AES_DECRYPT_IV
    • Column Masking

Course Style:

This course provides the insight you require to get you started with data encryption techniques provided within the Actian database product set.

Audience:

This course is for administrators, developers and advanced users whose job it is to ensure that the corporate data remains safe and secure.

 

Prerequisites:

The video assumes you have access to an Actian database and that you are an administrator of that database.

Curriculum15 min

  • DBMS Level Encryption 2 min
  • Column Level Encryption 2 min
  • Application Level Encryption 2 min
  • Column Masking 2 min
  • Documentation
  • Data Encryption 5 min
  • Feedback
  • Take Course Survey

About this course

At the end of this course you will be able to:

You will have an understanding of how to apply encryption functionality across the Actian database products Actian X, Vector v6.0 and Actian Avalanche.  Data can be encrypted at any of the following levels or a combination of levels to suit your use case:

  • DBMS Level (Data at Rest) Encryption
    • Full Database Encryption
    • Individual Column Encryption
  • Application Level / Function-Based Encryption
    • AES_ENCRYPT_IV / AES_DECRYPT_IV
    • Column Masking

Course Style:

This course provides the insight you require to get you started with data encryption techniques provided within the Actian database product set.

Audience:

This course is for administrators, developers and advanced users whose job it is to ensure that the corporate data remains safe and secure.

 

Prerequisites:

The video assumes you have access to an Actian database and that you are an administrator of that database.

Curriculum15 min

  • DBMS Level Encryption 2 min
  • Column Level Encryption 2 min
  • Application Level Encryption 2 min
  • Column Masking 2 min
  • Documentation
  • Data Encryption 5 min
  • Feedback
  • Take Course Survey