“DataStealth’s unique product design is very smart and adaptable. We have been able to use DataStealth for numerous cybersecurity use cases within our large enterprise across newer and older technology platforms alike, with great ease and speed of integration. The Datex team is extremely customer focused and possesses tremendous technical cybersecurity expertise, which has supported our successful DataStealth rollouts.”
“It was a breath of fresh air to go from learning about DataStealth, to deploying the solution within 30 days. With our initial use case met, we’ve challenged our organization to find other technology deployment opportunities. It’s rare that a solution is net-cash positive to our budgeting process, so we happily continue to expand the footprint and find new DataStealth use cases.”
“The DataStealth approach to securing sensitive data and preventing breaches is unlike most other cybersecurity solutions we have seen. When we were first introduced to DataStealth, it sounded like a unique and innovative solution, so we decided to put it to the test. After extensive due diligence, we confirmed that it works as advertised. DataStealth is extremely innovative, powerful, flexible, and scalable – and is supported by their team's deep technical expertise. DataStealth has worked well for us.”
“Datex’s DataStealth is a difficult product to classify. It resembles data loss prevention (DLP) and privacy software but doesn’t fit neatly in either category.
By focusing on data obfuscation, DataStealth uses a novel approach aimed at limiting sensitive-data acquisition in the first place (i.e., with the logic that “you can’t lose what you don’t have”). Traditional DLP solutions often resemble action heroes: they swoop in the last second to prevent some kind of catastrophic loss (assuming they were configured correctly, of course).
DataStealth, however, works by removing sensitive data from files and replacing it with placeholder “dummy” data, effectively converting such data into something far more innocuous. That is, it’s data you don’t need to fear losing. The software can be used for incoming and outgoing data, which is a particularly nice feature to have when documents containing sensitive data must be shared with third parties. Because the personally identifiable information or other sensitive data has been removed, so has any liability that might exist if the third party is compromised.
This simple but effective approach to data protection and privacy has caught the attention of those in government, finance, and healthcare. But any organization that holds sensitive data could find a lot of value in DataStealth.”
“As the guardian of our stakeholders’ Personally Identifiable Information (PII), our organization is responsible for ensuring that this sensitive data remains safe and secure. Hardly a day goes by without seeing an article about a serious breach involving the largescale theft of PII.
When we were introduced to DataStealth, they claimed they could protect all of the sensitive PII in our IT environment so that if a breach were to occur, there would be no PII for the intruders to find and steal. We were understandably skeptical. However, significant testing proved DataStealth could protect our sensitive data without business interruption and be speedily deployed.”
“Like all healthcare organizations, we were struggling to find a solution to the dilemma imposed by modern privacy regulations and the technical challenges to meet the healthcare requirements of the 21st century.
The solution we discovered to meet these complex and seemingly contradictory technical requirements was DataStealth. It sounded too good to be true, so we really did our due diligence. We compared DataStealth to other data security offerings and they came out on top. We checked their references and were blown away by how highly their clients thought of them. Even then, we insisted that Datex prove to us that DataStealth would actually work to protect Personal Health Information (PHI) in our specific computer environment. Their data security experts are really knowledgeable and did all of the heavy lifting for the entire implementation process. DataStealth is the real deal and made believers out of skeptics.”
"My company transmits millions of customer payment cards through our computer systems. That makes us a target for hackers. DataStealth put an end to the threat of payment card theft once and for all by automatically intercepting data before it ever enters our systems. Now, if a data breach were to ever occur, no credit card data could be stolen because there is no credit card data in our computer systems to steal. I no longer stay up at night worrying. DataStealth is an awesome solution – unlike anything else out there.”
“DataStealth is the only technology I am aware of that could automatically obfuscate Personally Identifiable Information (PII) before it crosses a country border on its way to a Cloud application or repository such as Salesforce, Microsoft Azure, Amazon, and many others. DataStealth can process millions of transactions without ever legally or physically exposing any sensitive customer information outside of your country.”
"The need for my company to pass the annual PCI (Payment Card Industry) compliance audit is necessary in order to continue to be allowed to accept credit card payments. This audit is a complete drag on our precious resources and stifles our ability to focus on our core business.
Prior to learning about DataStealth, we spent a ton of time and effort ensuring our software systems and IT environment met the rigorous standards required for PCI compliance. Since our DataStealth implementation, we've managed to reduce that effort by nearly 95% allowing our technology resources to focus on innovating our core products. The best part is we didn't have to go through a lengthy implementation process or modify our existing software systems to take advantage of DataStealth.
There are very few times in technology when you're able to find a silver bullet solution to solve a complex problem, but I can honestly say DataStealth is one of them."
“At first, we expected Datex to treat us like every other vendor – one that lavishes attention on us when we are a prospect but ignoring us the day after we become a client. That’s not what occurred.
Our DataStealth deployment clearly demonstrated that Datex is not your typical software vendor. We quickly developed a strong relationship with the entire team during the initial phases of our deployment, and that has remained the case throughout the entire project and thereafter. We learned to became confident that any challenges encountered during our rollout would be resolved quickly and without any fanfare.
The team at Datex has become a trusted advisor to our organization, both with their technology and the advice they provide to us about other cybersecurity projects that we have underway.”
“DataStealth has some incredibly unique attributes that allow organizations to bring themselves into legal compliance with the myriad requirements of data privacy legislation – quickly, easily, and inexpensively. It is an innovative solution that addresses this vital legal obligation.”
“Every data security solution we evaluated for our legacy mainframe systems required us to either modify code, install an agent or widget, or integrate with an API, all of which were a non-starter for us. DataStealth claimed to be able to secure the data stored inside our legacy applications by putting DataStealth in front of and behind our environment, applying tokenization and encryption to our data on the way in, and detokenization and decryption to our data on the way out, without touching any of our technology in the middle.
There was a grand total of zero people on our team that believed that this was possible. So, we engaged Datex for a Proof of Concept and challenged them to prove their claims. Our expectation was that this would fail, and that it would fail fast. Incredibly, our expectations were completely incorrect. DataStealth was able to do exactly what they said it could do, exactly in the way they said it would do it. I think there are still a few jaws on the table in our office.”
“As a large and regulated organization with many decades of customer data, sprawling across hundreds of systems in our many data centers, cybersecurity is one of our highest and most challenging priorities.
One of the challenges for an organization of our size and complexity is understanding what sensitive data resides in our computer network, where it is located, and who has access to it – as a crucial first step in securing our sensitive data.
Data discovery and data classification is the foundation for any successful data security initiative, yet it is also one of the most time-consuming and error-prone aspects of the overall process. Scanning for simple pattern matches often leads to unexpected results in the form of false positives and false negatives. These inaccuracies lead to long manual investigations that are prone to many errors and inaccuracies.
DataStealth allows us to quickly uncover sensitive data in our environment, whether the data is in structured, semi-structured, or unstructured format – in file servers, disparate data repositories, databases, or endpoint devices. By using DataStealth’s sophisticated confidence/validity scoring, false positives are reduced, and accuracy is increased.
DataStealth is an extremely flexible and robust solution that helps us locate and protect sensitive data in a wide variety of systems – from our legacy mainframes to our latest cloud-based apps.
We constantly evaluate a large number of cybersecurity solutions to identify new capabilities. We carefully validate the claims made by vendors to see if they are in fact accurate. Every once in a while, we come across a technology that is totally different than anything else and that delivers exactly what is promised. DataStealth is one of those rare technologies. Their innovative ideas and passion for making things work is truly commendable.”