Accutive Security
Accutive ADM Platform
Data Masking / Test Data Management · Category 16. DLP · Tier 2
CL Listed — Visible
Methodology v3.5 · OLIR Schema
Mars 2026
Evaluation Tier:
Visible (Listed)
→
Verified (CAE)
→
Enterprise (EEE)
Layer 1-2 only · Documentary assessment · All capabilities vendor-claimed
⚡ Executive Summary 30 seconds
What it is
Static data masking platform that permanently replaces sensitive data (PII, PCI, PHI) with realistic fictitious values in non-production environments. Enables safe test data for development, QA, and third-party sharing.
Best for
GDPR pseudonymisation (Art. 32 — explicitly named), HIPAA de-identification (Safe Harbor 18 identifiers), PCI PAN masking (Req. 3.4 non-production). Strong fit for CI/CD test data pipelines.
What it does NOT do
No dynamic masking (real-time), no encryption, no IAM/access control, no DLP, no network security, no threat detection. Not a primary DORA/NIS2 solution — covers only 6-8% of obligations as supporting control.
CL Recommendation
ADM is integral to GDPR/HIPAA/PCI privacy and de-identification requirements. It is a supporting control for DORA/NIS2 data protection. For comprehensive DORA compliance, combine with IAM (Cat. 1), Encryption (Cat. 15), Network Security (Cat. 6), and SecOps (Cat. 12). Gartner Peer Insights highest rated in category. Performance claims (240K+ ops/sec) are vendor-stated, not independently validated.
⚖ Regulatory Fit Per regulation verdict
GDPR
~15% of articles
✔ Strong — Pseudonymisation (Art. 25, 32)
HIPAA
~18% of provisions
✔ Strong — Safe Harbor de-identification
PCI DSS v4.0
~12% of requirements
● Moderate — Req. 3 (non-prod PAN)
NIS2
~8% of Art. 21
△ Supporting only — Secure dev (Art. 21(2)(e))
DORA
~6% of obligations
△ Supporting only — Art. 8(4), 9(3)
CCPA/CPRA
~12%
● Moderate — Consumer data protection
▼ Show detailed regulatory mapping (OLIR format)DORA (OPEN_GOV)
| Focal | Obligation | OLIR Rel. | Hub Ref | Rationale |
|---|
| Art. 8(4) | Secure ICT dev lifecycle | Contributing | SA-15 / PR.PS-06 | Semantic |
| Art. 9(3)(a) | Confidentiality mechanisms | Contributing | SC-28 / PR.DS-01 | Semantic |
| Art. 9(3)(b) | Data protection mechanisms | Direct | SC-28 / PR.DS-01 | Functional |
| Art. 28(3) | Third-party ICT risk | Contributing | GV.SC-05 / SA-9 | Semantic |
GDPR (OPEN_GOV)
| Focal | Obligation | OLIR Rel. | Hub Ref | Rationale |
|---|
| Art. 25(1) | Technical measures DPbD | Contributing | PT-3 / PR.DS-01 | Semantic |
| Art. 25(2) | Data minimisation | Direct | PM-25 / PR.DS-01 | Functional |
| Art. 32(1)(a) | Pseudonymisation | Equivalent | PT-6 / PR.DS-01 | Syntactic |
| Art. 89(1) | Safeguards research | Contributing | PM-25 / PR.DS-01 | Semantic |
HIPAA (OPEN_GOV)
| Focal | Obligation | OLIR Rel. | Hub Ref | Rationale |
|---|
| §164.514(b) | Safe Harbor 18 identifiers | Direct | PM-25 / PT-6 | Syntactic |
| §164.312(b) | Audit controls | Direct | AU-2 / DE.CM-09 | Functional |
PCI DSS v4.0 (PROPRIETARY)
| Focal | Obligation | OLIR Rel. | Hub Ref | Rationale |
|---|
| Req. 3.4 | PAN unreadable (paraphrased) | Direct | SC-28 / PR.DS-01 | Functional |
| Req. 6.5 | Secure dev (paraphrased) | Contributing | SA-15 / PR.PS-06 | Semantic |
Articles without contribution omitted. Full OLIR mapping available in Audit Pack export.
🎯 Buyer Guidance Decision support
✔ Consider When
- + GDPR pseudonymisation for dev/test environments
- + HIPAA Safe Harbor de-identification (18 identifiers)
- + PCI PAN masking for non-production systems
- + CI/CD pipeline needs realistic but safe test data
- + Third-party data sharing (mask before sending)
- + Need audit trail of all masking operations
❌ Avoid When
- − Need real-time dynamic masking at query time
- − Need production data encryption at rest
- − Need IAM / access control / privileged access
- − Need DLP for data exfiltration prevention
- − Want a primary DORA/NIS2 compliance tool (only 6-8%)
- − Need APAC deployment with local support
⚙ Capabilities 40 claimed · 5 groups · DR-2 Quality Tiers + Config Modifiers
Data Discovery 9✓ 0● 0✗▼
✓Automated PII detection (AI-powered)
GDPR 25, HIPAA 514, PCI 3.4
Specific Obl.Out-of-Box
✓PCI data identification
PCI 3.3, 3.4, 3.5
Specific Obl.Out-of-Box
✓PHI data identification
HIPAA 514(b) Safe Harbor
Specific Obl.Out-of-Box
✓Custom sensitive data rules
Programmable patterns
Control FamilyConfig Change
✓Cross-database discovery
Oracle, SQL Server, MySQL, PostgreSQL
Control FamilyOut-of-Box
✓File-based discovery (CSV, XML, JSON)
Flat file scanning
Control FamilyOut-of-Box
✓Cloud data source support
AWS, Azure, GCP connectors
Control FamilyConfig Change
✓Discovery scheduling
Cron-based periodic scans
Generic ControlOut-of-Box
✓Discovery reporting
Compliance-ready reports
Specific Obl.Out-of-Box
Data Masking & Transformation 10✓ 0● 2✗▼
✓Static data masking (irreversible)
GDPR 32(1)(a), HIPAA 514(b)
Specific Obl.Out-of-Box
✓Format-preserving masking
Maintains data format/length
Specific Obl.Out-of-Box
✓Referential integrity (cross-table)
Cross-DB consistency
Specific Obl.Out-of-Box
✓PCI masking (cards)
Valid format, invalid numbers
Specific Obl.Out-of-Box
✓SSN/SIN masking
Valid format patterns
Specific Obl.Out-of-Box
✓Smart address/name generation
Culturally appropriate
Control FamilyOut-of-Box
✓Email/phone masking
Functional fictitious values
Control FamilyOut-of-Box
✓Custom masking rules (Groovy)
Programmable logic
Control FamilyConfig Change
✓Conditional masking logic
Business rule-based
Control FamilyConfig Change
✓Derived multi-field masking
Related fields consistent
Specific Obl.Out-of-Box
✗Dynamic data masking
NOT SUPPORTED — static only
Specific Obl.N/A
✗Tokenization with vault
NOT SUPPORTED
Control FamilyN/A
Data Subsetting 4✓ 0● 1✗▼
✓Intelligent subsetting
Representative selection
Control FamilyConfig Change
✓Referential integrity in subsets
Maintains relationships
Specific Obl.Out-of-Box
✓Size/criteria-based subsetting
% or row count or rules
Generic ControlOut-of-Box
✓Subset + mask combined
Single workflow
Control FamilyOut-of-Box
✗Virtual data copies
NOT SUPPORTED — see Delphix
Control FamilyN/A
Integration & DevSecOps 6✓ 0● 0✗▼
✓REST API
Full API coverage
Control FamilyOut-of-Box
✓CI/CD pipeline integration
Jenkins, GitLab, etc.
Specific Obl.Config Change
✓Automated scheduling
Cron-based execution
Generic ControlOut-of-Box
✓Multi-database support
Oracle, SQL Server, MySQL, PG, cloud
Control FamilyOut-of-Box
✓Cloud platform integration
Major cloud providers
Control FamilyConfig Change
✓Embedded scripting (Groovy)
Custom logic
Data SurfacedConfig Change
Compliance & Audit 4✓ 2● 2✗▼
✓Audit logging
All ops logged
Specific Obl.Out-of-Box
✓Compliance reporting
Pre-built templates
Specific Obl.Out-of-Box
✓GDPR/HIPAA/PCI/CCPA templates
Pre-configured rules
Specific Obl.Out-of-Box
✓SOX/GLBA compliance support
Financial data
Control FamilyOut-of-Box
✗Automated GRC export (SIEM/SOAR)
CSV manual export only
Specific Obl.N/A
●JSON/CSV export for GRC tools
Manual, no automated feed
Generic ControlOut-of-Box
●Tamper-proof audit trail
Logging exists, tamper-proofing unknown
Specific Obl.Config Change
✗Real-time compliance dashboard
NOT SUPPORTED
Control FamilyN/A
🛡 MITRE ATT&CK Mapping Layer 4 — Derived via SP 800-53
M1041
Encrypt Sensitive Info
Full (claimed)
M1057
Data Loss Prevention
Full (claimed)
M1022
Restrict Permissions
Partial (claimed)
M1051
Update Software
Full (claimed)
Score: 4.5 / 5.0 (90%) — All vendor-claimed. Techniques addressed: T1005, T1039, T1119, T1552, T1213 (data collection family).
▼ Show ATT&CK techniques detail| Technique | Name | How Addressed | Provenance |
|---|
| T1005 | Data from Local System | Masked data has no intelligence value | DERIVED via M1041 |
| T1039 | Data from Network Shared Drive | Shared test data contains no real PII | DERIVED via M1057 |
| T1119 | Automated Collection | Collected test data is fictitious | DERIVED via M1057 |
| T1552 | Unsecured Credentials | Test credentials are masked/fake | DERIVED via M1041 |
| T1213 | Data from Info Repositories | Repository data is anonymized | DERIVED via M1041 |
📄 Evidence Pack DR-2 §5.1 — Proof of value
✔Compliance reports
Pre-built templates GDPR, HIPAA, PCI. PDF/CSV export.
✔Discovery scan results
Dashboard + CSV export of sensitive data inventory.
✔Audit logs
All masking operations logged. Export available.
✔REST API documentation
Public API reference for integration verification.
⚠Masking config export
JSON/XML. Vendor-provided format, not standardized.
⚠Performance benchmarks
240K+ ops/sec — vendor-published, not independently validated.
❌Independent pen test / SOC 2
Vendor security posture not independently verified.
❌SBOM (Software Bill of Materials)
Not publicly available. Supply chain transparency gap.
Evidence level: Documentary review only (CL Listed). For verified evidence, upgrade to CAE (Examine + Interview) or EEE (+ Test).
⏱ Operational Metrics & Anti-Hype DR-2 §5.1 + §9.2
| Metric | Starter (Free) | Professional ($9,890+) | Enterprise (Custom) |
|---|
| Implementation | 1-2 weeks | 2-4 weeks | 4-12 weeks |
| FTE Required | 0.1 FTE | 0.25 FTE | 0.5-1 FTE |
| Time to first scan | Day 1-3 (requires DB connectivity) |
| Time to production | Month 1-3 (all DBs connected, rules validated, CI/CD integrated) |
Anti-Hype: Marketing vs. Reality
240K+ operations/second
Vendor-published benchmark, not independently verified. Request POC with your datasets.
Unverified
AI-powered discovery
Pre-configured regex + ML patterns. Custom rules require Groovy scripting knowledge.
Verified
Easy CI/CD integration
Requires REST API setup, pipeline scripting, credential management. Dev effort needed.
Partial
Multi-database support
Broad DB support confirmed. Cloud connectors may need additional configuration.
Verified
Compliance-ready reports
Pre-built templates available. Custom regulatory mapping requires configuration.
Verified
⚖ Strengths & Cautions
✔ Strengths
- + 240K+ ops/sec (vendor), terabyte-scale
- + Multi-DB: Oracle, SQL Server, MySQL, PG, cloud
- + CI/CD via REST API + cron scheduling
- + Pre-built GDPR/HIPAA/PCI/CCPA templates
- + Referential integrity cross-table/cross-DB
- + Gartner Peer Insights highest rated in category
- + Free 6-month trial available
⚠ Cautions
- ! Static masking ONLY — no dynamic/real-time
- ! SSDF/CRA vendor security not verified
- ! No SBOM publicly available
- ! No APAC presence / No Windows deployment
- ! Performance claims not independently validated
- ! Custom rules require Groovy scripting
- ! All capabilities VENDOR-CLAIMED (no CL testing)
📈 Competitive Positioning Category 16 — Data Masking
| Capability | Accutive ADM | Delphix | Informatica | IBM Optim |
|---|
| Static masking | ✔ | ✔ | ✔ | ✔ |
| Dynamic masking | ✗ | ✗ | ✔ | ✔ |
| Virtual data copies | ✗ | ✔ | ✗ | ✗ |
| Data discovery (AI) | ✔ | ● | ✔ | ● |
| CI/CD API | ✔ | ✔ | ● | ✗ |
| Mainframe support | ✗ | ● | ✔ | ✔ |
| Pricing entry | Free trial | Enterprise only | Enterprise only | Enterprise only |
Competitive data based on public information. CL has not evaluated these alternatives — for detailed assessment, see individual CL Listings.
📑 Framework Views Hub: CSF 2.0 + 800-53r5 + ISO 27001
▼ Show NIST SP 800-53, CSF 2.0, ISO 27001 mapping tablesNIST SP 800-53 Rev 5
| Control | Name | Contribution | Provenance |
|---|
| SC-28 | Protection of Information at Rest | direct | DERIVED via GDPR Art. 32 |
| SA-15 | Development Process & Tools | direct | DERIVED via DORA Art. 8(4) |
| PM-25 | Minimization of PII in Testing | direct | DERIVED via HIPAA 164.514 |
| PT-3 | PII Minimization in Testing | direct | DERIVED via GDPR Art. 25(2) |
| PT-6 | System of Records Masking | Equivalent | DERIVED via GDPR Art. 32 |
| AU-2 | Audit Events | contributing | DERIVED via HIPAA 164.312(b) |
| SI-12 | Info Management & Retention | contributing | CL-ORIGINAL |
| MP-6 | Media Sanitization | contributing | CL-ORIGINAL |
NIST CSF 2.0
| Function | Subcategory | Contribution | Provenance |
|---|
| PROTECT | PR.DS-01 Data-at-rest confidentiality | direct | DERIVED via SC-28 |
| PROTECT | PR.PS-06 Secure software dev | direct | DERIVED via SA-15 |
| IDENTIFY | ID.AM-07 Data inventory | direct | CL-ORIGINAL |
| GOVERN | GV.SC-05 Supply chain risk | contributing | CL-ORIGINAL |
ISO 27001:2022 Annex A
| Control | Name | Contribution | Provenance |
|---|
| A.8.11 | Data masking | Equivalent | OFFICIAL via ENISA |
| A.8.12 | Data leakage prevention | direct | DERIVED via NIS2-ISO |
| A.8.31 | Separation dev/test/prod | direct | DERIVED via NIS2-ISO |
| A.5.34 | Privacy & PII protection | direct | DERIVED via GDPR-ISO |
▼ Show Vendor Security Practices (SSDF / CRA)| SSDF ID | Practice | Status |
|---|
| PW.1 | Risk-based secure design | Claimed |
| RV.2 | Timely vuln remediation | Claimed |
| PO.5 | Secure dev environment | Unknown |
| PS.3 | SBOM available | Not stated |
| RV.1 | Vulnerability disclosure | Unknown |
| PS.2 | Code signing | Unknown |
Compliance Labs · Software Listing v3.5 · OLIR Schema
Hub: CSF 2.0 ↔ 800-53r5 ↔ ISO 27001 · Mars 2026