Software Alternatives, Accelerators & Startups

BreachLock VS Imperva Data Masking

Compare BreachLock VS Imperva Data Masking and see what are their differences

BreachLock logo BreachLock

BreachLock is a versatile platform that provides scalable and smooth penetration testing services for vulnerabilities.

Imperva Data Masking logo Imperva Data Masking

Protect sensitive data from exposure in non-production environments. Imperva pseudonymizes and anonymizes sensitive data via data masking.
  • BreachLock Landing page
    Landing page //
    2023-07-11
  • Imperva Data Masking Landing page
    Landing page //
    2023-05-22

BreachLock videos

How to review web scan findings in your BreachLock account?

More videos:

  • Review - BreachLock client testimonial series - Fond
  • Tutorial - How to review audit logs in your BreachLock account?
  • Review - BreachLock Pen Testing as a Service Makes Cyberspace a Safer Place

Imperva Data Masking videos

Demonstrating Imperva Data Masking Discovering Data to Mask

Category Popularity

0-100% (relative to BreachLock and Imperva Data Masking)
Security & Privacy
79 79%
21% 21
Monitoring Tools
100 100%
0% 0
Databases
0 0%
100% 100
Security
100 100%
0% 0

User comments

Share your experience with using BreachLock and Imperva Data Masking. For example, how are they different and which one is better?
Log in or Post with

Reviews

These are some of the external sources and on-site user reviews we've used to compare BreachLock and Imperva Data Masking

BreachLock Reviews

  1. Excellent service for the right price

    The team at BreachLock is awesome - we've had a few pen tests that were required to be completed on time for our partner, and BreachLock delivers every time. We get expert pen testers, prompt customer service, and a report that is easy to share with auditors and partners.

    🏁 Competitors: pentesting tools
    👍 Pros:    Perfect + fast service/help
    👎 Cons:    None

Imperva Data Masking Reviews

We have no reviews of Imperva Data Masking yet.
Be the first one to post

Social recommendations and mentions

Based on our record, BreachLock seems to be more popular. It has been mentiond 1 time since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

BreachLock mentions (1)

  • Has anyone used Breachlock (breachlock.com) penetration testing solution? Do they use nessus, nmap and burpsuite to run scans or have their proprietary scanner?
    Has anyone used Breachlock (breachlock.com) penetration testing solution? Do they use nessus, nmap and burpsuite to run scans or have their proprietary scanner? Source: almost 3 years ago

Imperva Data Masking mentions (0)

We have not tracked any mentions of Imperva Data Masking yet. Tracking of Imperva Data Masking recommendations started around Mar 2021.

What are some alternatives?

When comparing BreachLock and Imperva Data Masking, you can also consider the following products

Tenable.io - Tenable.io Cyber Exposure platform helps to protect any asset on any computing platform and eliminate blind spots.

Oracle Advanced Security - Stop would-be attackers and reduce risk of unauthorized data exposure with advanced security database technologies from Oracle. Together, encryption and redaction form the foundation of defense-in-depth, multilayered database security solutions.

Qualys - Qualys helps your business automate the full spectrum of auditing, compliance and protection of your IT systems and web applications.

Forcepoint SimShield - Filter and disguise data in secure training and testing environments, cut redundancies, and reduce testing cycle time with Forcepoint WebShield

Digital Defense - Protect your online data & learn more about DDI, the security industry’s award-winning & most effective vulnerability & risk management network solution.

Informatica Persistent Data Masking - Learn about Persistent Data Masking & enhance data security & privacy by de-sensitizing & de-identifying sensitive data.