Transformation

Transform origin data values in to a masked or independent values


Customise events in real-time using Joule OOTB transformation processors.

Example use cases

  • Mask Personal Identifiable Information (PII)

  • Tokenise a data value in to component parts i.e. IMEI to a TAC and device serial Id

  • Encrypt sensitive data for endpoint consumption

  • Basic bucketing for statitical processing


Available transformation implementations

Tokenisation

Tokenise attribute values in to component parts

Encryption

Apply RSA encryption techniques along with AES symmetric encryption

Masking

Mask sensitive field values while retaining the formatting criteria

Bucketing

Apply individual variance tolerances to protect the identity of the originating data

Redaction

Eliminate sensitive event field data by either nullifying or replacing with a blank value

Last updated