Joule
Search
K

Transformation

Transform origin data values in to a masked or independent values

Customise events in real-time using Joule OOTB transformation processors.

Example use cases

  • Mask Personal Identifiable Information (PII)
  • Tokenise a data value in to component parts i.e. IMEI to a TAC and device serial Id
  • Encrypt sensitive data for endpoint consumption
  • Basic bucketing for statitical processing

Available transformation implementations

Tokenisation
Tokenise attribute values in to component parts
Encryption
Apply RSA encryption techniques along with AES symmetric encryption
Masking
Mask sensitive field values while retaining the formatting criteria
Bucketing
Apply individual variance tolerances to protect the identity of the originating data
Redaction
Eliminate sensitive event field data by either nullifying or replacing with a blank value