DOT logo
Ressources2024-03-12T14:00:14+01:00

Ressources

Gestion des données de test, explorez nos ressources !

Fiches techniques

The NIS 2 Directive

Find out how the NIS 2 directive aims to enhance infrastructure security and reduce the impact of cyberattacks on entities through preventive measures and risk assessment.

White papers

The NIS 2 Directive

Find out how the NIS 2 directive aims to enhance infrastructure security and reduce the impact of cyberattacks on entities through preventive measures and risk assessment.

Témoignages clients

The NIS 2 Directive

Find out how the NIS 2 directive aims to enhance infrastructure security and reduce the impact of cyberattacks on entities through preventive measures and risk assessment.

Guide

The NIS 2 Directive

Find out how the NIS 2 directive aims to enhance infrastructure security and reduce the impact of cyberattacks on entities through preventive measures and risk assessment.

Actualité

Cyber Resilience Act (CRA)

The Cyber Resilience Act (CRA) is intended to reinforce the security of digital products by imposing cybersecurity standards, obligations on manufacturers and fines for non-compliance.

The NIS 2 Directive

Find out how the NIS 2 directive aims to enhance infrastructure security and reduce the impact of cyberattacks on entities through preventive measures and risk assessment.

PCI-DSS standard

PCI-DSS defines security standards to protect credit card transactions and prevent data leakage and online fraud.

Case Study – SFIL

SFIL has reached compliance with the GDPR thanks to a successful implementation of the anonymization of personal data in non-production environments.

[Webinar] Guarantee the Protection of IBM i Data

In this webinar, Alan Ashley, ARCAD’s DevSecOps expert will demonstrate how to secure ALL your databases – both IBM i and non-IBM i - while maintaining integrity within and between each DBMS.

DOT Extract Datasheet

Learn how DOT Extract works and the benefits of extracting realistic and consistent data for testing purposes.

Protecting your PII data in Testing

Nearly every company has a test or development environment that is often less secure than production, and many of those have a failed audit to show for it.

An introduction to Data Masking – Infographic

Data grows continuously, and data breaches concern all enterprises. So Regulations are emerging by focusing on data protection & privacy. Check out our infographic to discover how Data Masking can solve these challenges.

DOT Anonymizer Datasheet

GDPR, PCI, HIPAA? Protect your personal data fast. Use DOT Anonymizer datasheet to discover, report & anonymize personal data, across any DBMS.

Data Masking and Anonymization

GDPR: Learn concepts & use cases for data masking & anonymization. Explore new technologies for discovery & anonymization of personal data.

Case Studies – ADIS

ADIS complies with GDPR, improving efficiency and reliability of data anonymization using DOT Anonymizer

Infographie

The NIS 2 Directive

Find out how the NIS 2 directive aims to enhance infrastructure security and reduce the impact of cyberattacks on entities through preventive measures and risk assessment.

Vidéo

Pauline Magne : 3 Erreurs à Éviter en Test Data Management

Découvrez dans cette courte vidéo les erreurs fréquentes en Test Data Management et comment les éviter pour rendre vos projets plus performants.

VERSION D’ESSAI / DEMO

Réservez une version d’essai ou une session dans notre sandbox !

Version d’essai

Test Data Management Expert

Essayez maintenant !

Réservez une version d’essai

Démo

Test Data Management Expert

Démo personnalisée

Sollicitez nos experts en Gestion de données de test