10 Best Data Masking Tools and Software In 2021

List and comparison of the Best open source free Data Masking Tools Available in the Market:

Data Masking is a process that is used to hide data.

In Data masking, actual data is masked by random characters. It protects the confidential information from those who don’t have the authorization to sight it.

The main purpose of data masking is to shield complex and private data in conditions where the data might be noticeable to someone without their permission.

Best Data Masking Tools

Why Mask Data?

Data Masking shields PII data or other confidential information of the organization.

It secures the file transferring process from one location to another. It also helps to secure application development, testing, or CRM applications. It allows its users to access dummy data for testing or training purposes.

How is Data Masking Done?

Data Masking can be done either statically or dynamically.

In order to achieve data masking, it is essential to create a copy of a database that is matching to the original one. Data masking shields private data in real-time. When a query is directed to a database, the records are replaced with dummy data and then masking procedures are applied to it accordingly.

Static Data Masking

Data Masking

Dynamic Data Masking

dyanimc DM

[image source]

Features of Data Mask Tools

Enlisted below are the various features of these Tools:

  • Masking Procedures present on-demand for data.
  • Data privacy law helps to track compliance.
  • Codeless masking rules are available.
  • Access to data stored in various databases.
  • Accurate but imaginary data is accessible for testing.
  • Format-preserving encryption conversion.

What are the Best Data Masking Tools?

Data Masking Tools are protecting tools that avoid any misuse of complex information.

Data Masking Tools eliminate complex data with false data. They may be used throughout application development or testing where end-user inputs the data.

Here, in this article, we have discussed a list of tools that will prevent the data from being misused. These are the top as well most common tools for masking data for small, large and mid-size enterprises.

Data Masking process

[image source]

=> Contact us to suggest a listing here.

List of The Best Data Masking Tools

Mentioned below are the most popular Data Masking tools that are available in the market.

Top Data Masking Software Comparison

Tool NameRatingsPlatform ConnectivitySupported Technology
DATPROF Data Masking Tool5/5Oracle, SQL Server, PostgreSQL, IBM DB2, EDB Postgres, MySQL and MariaDB.Synthetic test data, GDPR, synchronization template, CISO, ERD, TDM, CI/CD, Runtime API, Deterministic masking
IRI FieldShield (Profile/Mask/Test)5/5All RDBMS & Top NoSQL DBs, Mainframe, flat and JSON files, Unix, Linux, MacOS.SDM, DDM, ERD, FPE, API, Synthetic data generation, DB Subsetting, Data Virtualization with SDM, Tokenization.
Accutive Data Discovery & Masking5/5Oracle, SQL Server, DB2, MySQL, Flat Files, Excel, Java based platforms, Azure SQL Database, Linux, Windows, Mac.SDM, Database Subsetting, ETL, REST API.
IRI DarkShield (Unstructured Data Masking)4.7/5Semi and unstructured text files, MS & PDF documents, image files, faces, relational & NoSQL DBs. Linux, Mac, Windows.PII Classification, Discovery and Reporting; SDM, GDPR Delete/Deliver/Rectity, Audit.
IRI CellShield EE (Excel Data Masking)4.4/5Excel spreadsheets (LAN & Office 365). Windows.PII Classification, Discovery and Reporting; SDM, GDPR Delete/Deliver/Rectity, Audit.
Oracle - Data Masking and Subsetting4/5Cloud Platforms, Linux, Mac, Windows.SDM, DDM, Data Virtualization with SDM, Tokenization.
IBM InfoSphere Optim Data Privacy4.9/5Big data platforms, Mainframe files, Windows, Linux, MacSDM, DDM, Synthetic data generation, Data Virtualization with SDM.
Delphix3.5/5Linux, Mac, Windows, Relational DB.SDM, Data Virtualization with SDM, FPE (Format-Preserving encryption).
Informatica Persistent Data Masking4.2/5Linux, Mac, Windows, Relational DB, Cloud Platforms.SDM, DDM
Microsoft SQL Server Data Masking3.9/5T-Query, Windows, Linux, Mac, cloud.DDM

Let’s Explore!!

#1) DATPROF – Test Data Simplified


DATPROF provides a smart way of masking and generating data for testing the database. It has a patented algorithm for the subsetting database in a really simple and proven way.

The software is able to handle complex data relationship with an easy to use interface. It has a really smart way to temporarily bypass all triggers, constraints, and indexes so it is the best performing tool in the market.


  • Consistent over multiple applications and databases.
  • XML and CSV file support.
  • Built-in synthetic data generators.
  • HTML audit / GDPR reporting.
  • Test data automation with REST API.
  • Web Portal for easy provisioning.


  • High performance on large data sets.
  • Free trial version available.
  • Easy to install and use.
  • Native support for all major relational databases.


  • English documentation only.
  • Development of templates requires Windows.
  • Execution of templates can be done on Windows or Linux.

#2) IRI FieldShield

IRI Fieldshield

IRI is a US-based ISV founded in 1978 that’s best known for its CoSort fast data transformation, FieldShield/DarkShield/CellShield data masking, and RowGen test data generation and management offerings. IRI also bundles those and consolidates data discovery, integration, migration, governance, and analytics in a big data management platform called Voracity.

IRI FieldShield

IRI FieldShield is popular in the DB data masking and test data market due to its high speed, low cost, compliance features, and range of supported data sources. It is compatible with other IRI data masking, testing, ETL, data quality, and analytic jobs in Eclipse, SIEM tools, and erwin platform metadata.


  • Multi-source data profiling, discovery (search), and classification.
  • Broad array of masking functions (including FPE) to de-identify and anonymize PII.
  • Assures referential integrity across schema and multi-DB/file scenarios.
  • Built-in re-ID risk scoring and audit trails for GDPR, HIPAA, PCI DSS, etc.


  • High performance, without the need for a central server.
  • Simple metadata and multiple graphical job design options.
  • Works with DB subsetting, synthesis, reorg, migration and ETL jobs in Voracity, plus leading DB cloning, encryption key management, TDM portals and SIEM environments.
  • Fast support, and affordable (especially relative to IBM, Oracle, Informatica).


  • 1NF structured data support only; DarkShield needed for BLOBs, etc.
  • Free IRI Workbench IDE is a thick client Eclipse UI (not web-based).
  • DDM requires FieldShield API call, or premium proxy server option.

Pricing: Free trial & POC help. Low 5 figure cost for perpetual use or free in IRI Voracity.

#3) Accutive Data Discovery & Masking

Accutive Logo

Accutive’s Data Discovery and Data Masking solution, or ADM, provides the ability to discover and mask your critical sensitive data while ensuring the data properties and fields remain intact across any number of sources.

Data Discovery enables the efficient identification of sensitive databased on either pre-configured, editable compliance filters, or on user-defined search terms. You can leverage your Data Discovery findings into your Data Masking configuration, or you can define your own.

After being processed through the masking operation the data will still look real but will have become fictitious. The masked data will also remain consistent throughout all sources.

Masking production data for non-production environment uses will reduce the risk of data compromise while helping meet regulatory requirements.

Accutive Dashboard


  • Data Discovery – Enables the efficient identification of sensitive data that need to meet regulatory compliance standards such as GDPR, PCI-DSS, HIPAA, GLBA, OSFI/PIPEDA, and FERPA.
  • Mask Link Technology – Ability to consistently and repeatedly mask source data to the same value (i.e. Smith will always be masked to Jones) across multiple databases.
  • Multiple Data Sources and Destinations – Data can be moved from any major source type to any major destination type such as Oracle, DB2, MySQL and SQLServer (e.g. data can be moved from a Flat File to an Oracle Database).
  • API support – Include data masking in your data processing pipeline.


  • User- friendly, configurable interface.
  • Cost-effective solution with transparent pricing models.
  • Performs masking configurations rapidly with a built-in progress display.


  • Groovy scripting to customize application behavior requires some knowledge of programming.
  • Not currently available in languages other than English, French, Spanish, and German.

Pricing: Four packages are available dependent on customer needs. Contact them for more details.

#4) IRI DarkShield

IRI DarkShield

IRI DarkShield will discover and de-identify sensitive data in multiple “dark data” sources all at once. Use the DarkShield GUI in Eclipse to classify, find, and mask PII “hidden” in free-form text and C/BLOB DB columns, complex JSON, XML, EDI, and web/app log files, Microsoft and PDF documents, images, NoSQL DB collections, etc. (on-premise or in the cloud).

The DarkShield RPC API for application and web service calls expose the same search and mask functionality, with unlimited data source and job orchestration flexibility.

IRI DarkShield Dashboard


  • Built-in data classification and simultaneous ability to search, mask, and report.
  • Multiple search methods and masking functions, including fuzzy match and NER.
  • Deletion function for GDPR (and similar) right to be forgotten laws.
  • Integrates with SIEM/DOC environments and multiple logging conventions for audit.


  • High speed, multi-source, no need to mask in cloud or compromise control of data.
  • Consistent ciphertex assures referential integrity in structured and unstructured data.
  • Shares data classes, masking functions, engine, and job design GUI with FieldShield.
  • Proven worldwide, but still affordable (or free with FieldShield in Voracity subscriptions).


  • Standalone and embedded image capabilities limited by OCR, may need tweaking.
  • API requires custom ‘glue code’ for cloud, DB, and big data sources.
  • Price options may seem complex in mixed data source and use case scenarios.

Pricing: Free trial & POC help. Low 4-5 figure cost for perpetual use or free in IRI Voracity.

#5) IRI CellShield EE

IRI CellShield Logo

IRI CellShield EE – The Enterprise Edition of IRI CellShield can locate and then de-identify sensitive data in one or hundreds of Excel sheets on a LAN or in Office 365 at once. CellShield EE can use the data classification and discovery features of IRI Workbench, as well as the same encryption, pseudonymization, and redaction functions as FieldShield or DarkShield.

Pattern and intra-cell searches can also run Excel-side, along with point-and-click value (and formula) range selection, full-sheet, and multi-sheet masking operations.

IRI CellShield


  • Wide range of ergonomic PII searching and masking methods.
  • Supports formulas and multi-byte character sets.
  • Leverages data classes, top masking functions, and search parameters of DarkShield GUI.
  • Excel charts intelligently display discovered and masked data across multiple sheets.


  • High-performance masking of very large and/or multiple sheets at once.
  • Consistent ciphertex assures referential integrity in sheets and other data sources.
  • Search and mask audit column results, plus log exports to email, Splunk, and Datadog.
  • Documented in-app and online. Easily upgradable from low-cost Personal Edition.


  • Only compatible with MS Excel 2007 or higher (not other sheet apps).
  • Sharepoint and macro support is still in development.
  • Free trial is only for Enterprise Edition (EE), not low-cost Personal Edition (PE).

Pricing: Free trial & POC help. Low 4-5 figure cost for perpetual use or free in IRI Voracity.

#6) Oracle Data Masking and Subsetting

Oracle Data Masking and Subsetting

Oracle Data Masking and Subsetting benefits database clients to advance security, quicken submission, and cut IT prices.

It helps in removing the duplicates for testing data, development, and other actions by removing redundant data and files. This tool suggests data plotting and uses a masking description. It comes up with encoded guidelines for HIPAA, PCI DSS, and PII.


  • Discovers Complex Data and its relationships automatically.
  • Wide Masking Plan Library and enhanced Application Models.
  • Revolutions of complete data masking.
  • Fast, Secure and Assorted.


  • It proposes various customs for masking data.
  • It supports non-oracle databases as well.
  • It takes less time to run.


  • High-cost.
  • Less secured for development and testing environments.

Pricing: Contact for Pricing.

URL: Oracle Data Masking and Subsetting

#7) Delphix


Delphix is a fast as well as secure data masking tool for masking data across the company. It comes up with encoded rules for HIPAA, PCI DSS, and the SOX.

The Delphix Masking Engine is combined with a Delphix data virtualization platform to save and store data loading. DDM exists through a partnership company with HexaTier.


  • End-to-end data masking and creates reports for the same.
  • Masking Combined with data virtualization to progress transport of the data.
  • Easy in use as no training is required to mask data.
  • It migrates data steadily across sites, on-premises or in the cloud.


  • Easy and in-time regaining of records.
  • Virtualization of databases.
  • Data refreshing is fast.


  • High cost.
  • SQL Server databases are slow and limited.
  • Reliant on NFS old protocols.

Pricing: Contact for pricing.

URL: Delphix

#8) Informatica Persistent Data Masking

Informatica Persistent Data Masking

Informatica Persistent Data Masking is an accessible data masking tool that helps an IT organization to access and manage their most complex data.

It delivers enterprise scalability, toughness, and integrity to a large volume of databases. It creates a reliable data masking rule across the industry with a single audit track. It allows to trail actions for securing sensitive data via complete audit logs and records.


  • Supports Robust Data Masking.
  • Creates and integrates the masking process from a single location.
  • Features to handle a large volume of databases.
  • It has wide connectivity and customized Application Support.


  • Decreases the risk of Data Break via a single audit trail.
  • Advances the Quality of Development, Testing and Training events.
  • Easy deployment in the workstations.

Cons: Need to work more on UI.

Pricing: A 30-day free trial is available.

URL: Informatica Persistent Data Masking

#9) Microsoft SQL Server Data Masking

Microsoft SQL Server Data Masking

Dynamic Data Masking is a new safety feature announced in SQL Server 2016 and it controls unlicensed users to access complex data.

It is a very easy, simple, and a protective tool that can be created using a T-SQL query. This data security procedure determines complex data, through the field.


  • Simplification in designing and coding for application by securing data.
  • It doesn’t change or transform the stored data in the database.
  • It permits the data manager to choose the level of complex data to expose with a lesser effect on the application.


  • End operators are prohibited from visualizing complex data.
  • Generating a mask on a column field doesn’t avoid updates.
  • Changes to applications are not essential to read data.


  • Data is fully accessible while querying tables as a privileged user.
  • Masking can be unmasked via CAST command by executing an ad-hoc query.
  • Masking cannot be applied for the columns like Encrypted, FILESTREAM, or COLUMN_SET.

Pricing: Free trial is available for 12 months.

URL: Dynamic Data Masking

#10) IBM InfoSphere Optim Data Privacy

IBM InfoSphere Optim Data Privacy

IBM InfoSphere Optim Data Privacy proposes data mapping and uses a masking report with a masking asset. It has predetermined reports for PCI DSS and HIPAA.

It offers wide abilities to efficiently mask complex data across non-production environments. To secure private data, this tool will substitute the delicate info with truthful, and completely useful masked data.


  • Mask private data on request.
  • Decrease risk by locking data.
  • Fasten data privacy application.
  • A secure environment for application testing.


  • Easily abstracts data with no-coding.
  • Advanced Data Masking Feature.
  • Smart filtering abilities.


  • Need to work on UI.
  • Complex architecture.

Pricing: Contact for Pricing.

URL: IBM InfoSphere Optim Data Privacy

#11) CA Test Data Manager

CA Test Data Manager

CA Test Data Manager helps in data privacy and compliance problems as it comes with General Data Protection Regulation GDPR and other laws.

This tool bids data mapping, data movement, and functional masking. It has a universal file reporting and metadata. It has SDM expertise for complex and large environments with consistent databases.


  • Creates Synthetic test data for data testing.
  • Creates future test scenarios and unexpected outcomes.
  • Stores data for reuse.
  • Creates virtual copies of test data.


  • Different filters and templates are present to mask data.
  • No additional permission is required to access the production data.
  • Very fast tools to mask data.


  • Works only on Windows.
  • Complex User Interface.
  • Automating everything is not easy.

Pricing: A Free trial is available.

URL: CA Test Data Manager

#12) Compuware Test Data Privacy

Compuware Test Data Privacy

Compuware Test Data Privacy helps in the mapping of data and generic masking reports.

This tool mainly works on the mainframe platform and supports hybrid non-mainframe settings. Their solution offers Topaz for Enterprise Data for reliability, conversant and security.

It has two essential areas to perform test data privacy solutions for securing test data i.e. data breach prevention and compliance with data privacy laws.


  • Decreases the difficulty by codeless masking.
  • Completes data normalization into and out of the masking process.
  • Dynamic Privacy Rules with complex test data essentials such as account numbers, card numbers, etc.
  • Allows to discover and mask data within a greater field.


  • Easy to use and is fast.
  • Secures test data against breaks.
  • Apply test data privacy to test data, so that it will be more secure.


  • Complex user Interface.

Pricing: Contact for Pricing.

URL: Compuware Test Data Privacy

#13) NextLabs Data Masking

NextLabs Data Masking

NextLabs Data Masking offers an established software that can shield data and guarantee compliance in the cross-platform.

The essential part of NextLabs data masking is its Dynamic Authorization technology with Attribute-Based Access Control. It secures all the critical business data and applications.


  • Helps in classifying and sorting data.
  • Monitors data movement and its usage.
  • It prevents access for precise data.
  • Notifications on risky actions and irregularities.


  • Can be installed easily in each workstation.
  • Evades data breaking.
  • Data Safety across CAD, PLM, and email is good.


  • Software compatibility problems with PLM software.
  • Execution is tough at times for the suppliers and vendors.

Pricing: Contact them for pricing.

URL: NextLabs Data Masking

#14) Hush-Hush

Hush hush

Hush-Hush shield helps in recognizing data against internal risk.

It de-identifies the establishment’s complex data. HushHush elements are out-of-the-box procedures that are built for elements such as credit cards, addresses, contacts, etc.

This data masking software de-identifies data in folders, records, emails, etc., through API. Its custom code can be planned and ad-hocked.


  • Less time and Easy installation.
  • Supple, Robustness and takes less time to create workflows.
  • Easy and Robust Combination into SQL server, Biztalk etc.
  • Custom SSIS agenda to mask data.


  • Speed up development.
  • No learning curves.
  • Create data by just “INSERT” command.


  • In startups the growth is fast but the progress slows down in developed industries.
  • Limited control of data.

Pricing: You may request for free use and contact them for final pricing.

URL: Hush-Hush

Additional Tools For Data Masking

#15) HPE Secure Data

HPE Secure Data offers an end to end method to secure the organization data. This tool shields data to its complete development cycle that is deprived of revealing live data to risk.

It has database integrity features enabled and compliance reporting like PCI, DSS, HIPPA etc. Technology supported by HPE is DDM, Tokenization etc.

URL: HPE Secure Data

#16) Imperva Camouflage

Imperva Camouflage Data Masking decreases the risk of data break by substituting complex data with real data.

This tool will support and confirm compliance with rules and international plans. It has reporting and managing capabilities with database integrity. It supports SDM, DDM and generates synthetic data.

URL: Imperva Camouflage Data Masking

#17) Net2000 – Data Masker Data Bee

Net2000 offers all the tools that help to scramble, change or complicate the test data.

It succeeds in the risk of complex data re-identification. It has the feature of database integrity. It supports SDM and Tokenization technology. It is useful for all platforms like Windows, Linux, Mac etc.

URL: Net2000 – Data Masker Data Bee

#18) Mentis Data Masking

Mentis offers the most influential masking and monitoring solutions. It has in-built suppleness that modifies data security according to the environment.

It has SDM, DDM, and Tokenization enabled features. It offers prevention of data loss and database security options. It supports almost all platforms like Windows, Mac, cloud, Linux etc.

URL: Mentis Data Masking

#19) JumbleDB

JumbleDB is a wide-ranging data masking tool that secures complex data in non-production surroundings. JumbleDB transmits a quick and smart auto-discovery engine based on out-of-the-box templates.

It has multiple assorted support of cross-database platforms. It detects complex data and its relationship between referential integrity. Notifications are raised on data abnormalities or fluctuations.

URL: JumbleDB


In this article, we have discussed the Top Data Masking Tools that are available in the market.

The above-discussed tools are the most popular and secure ones, and their features & technology is as per the industrial requirements.

These tools are available free of cost and have a simple user interface and easy installations as well. You can choose any tools based on your requirements.

From our research, we can conclude that DATPROF and FieldShield are best for large, mid-size as well as small businesses. Informatica Data Privacy Tool and IBM Infosphere Optim Data privacy are best for Large Enterprises, Oracle Data Masking and Subsetting are best for Med-Size Enterprises and Delphix is good for Small Enterprises.

=> Contact us to suggest a listing here.