+1-855-55-DATEX    I    info@datex.ca  I
Tech Bulb



The New Standard



DataStealth is a paradigm-shifting approach to data and document protection.

Operating in real-time, at the network layer, DataStealth removes private/confidential/regulated/sensitive information from within data and documents on the way to endpoints, including applications databases and storage, both on premise and in the Cloud.

Using extremely flexible and easily configurable data policies, organizations can decide what information should be protected based on their specific needs and business rules.

When you need to access protected data or documents, DataStealth restores the original information into the datastream on the fly, but only for authorized users and only for authorized use cases.

DataStealth provides organizations with an enhanced level of security and privacy for both structured and unstructured data and documents, helping to ease the burden of risk mitigation and regulatory compliance requirements.





The Paradigm Shift



  • Plug and Play
  • No application development
  • No software to install
  • No databases, agents, APIs, or browser plugins
  • No key management
  • Transparent to users


  • Connect the power and LAN
  • Configure the data protection policy
  • Relax!


  • Works with any application
  • Works with any browser
  • Works with any OS
  • Works with any device
  • Works with any Cloud app or Cloud storage


  • Physical or Virtual hardware
  • On-Premise, Hosted, or Cloud deployment
  • Managed Service or self-managed




Featured Use Cases



DataStealth decreases the scope of your annual PCI Compliance audit by up to 95% by removing all payment card information from data and documents BEFORE it enters your network. Tokenization options include random, repeatable, sequential, order preserving, format preserving and more.

Download the Whitepaper HERE


CASB (Cloud Access Service Broker)

DataStealth enables the use of Cloud Apps and Cloud Storage without exposing any private/confidential/regulated information beyond your organization’s IT perimeter. Only obfuscated information is sent to the Cloud.

Download the Whitepaper HERE


TDM (Test Data Management)

When moving data from a production environment to a development environment, DataStealth removes regulated and/or restricted information, in real time, as the data flows across the network.  Developers, analysts, and researchers are able to work with fully obfuscated data, which may be re-identified later if required, but only by authorized users and for authorized use cases.


DLP (Data Loss Prevention)

DataStealth allows connections to sanctioned Cloud services, for authorized users, and limits or blocks the use of unknown or unsanctioned Cloud services. This keeps your data under your control, at all times.


Data and Document Privacy (Data Masking)

DataStealth applies policy driven data masking to data and documents in real-time, on the way to a user. Data Masking options include full and partial masking, suppression, rounding, offset, shuffling and more.

Download the Whitepaper HERE


Data and Document Residency (GDPR / PIPEDA)

DataStealth controls what data and documents can leave a geo-location, and controls when and where the actual data and documents can be viewed. 

Download the Whitepaper HERE


Identity / Authentication

DataStealth decreases the risk of stolen credentials and phishing attacks by adding MFA/MSA/2FA to any application, website, or file server. This forces users to authenticate not only with something they know (username and password), but also with something they have (mobile phone, etc.) 




Unlike Everything Else



No False Positives

Most solutions in the market today use regular expression (REGEX) and/or pattern matching to detect candidate data for protection. Anyone who has tried to deploy data loss prevention (DLP) tools will understand the obvious limitations of a DLP, where results are often fraught with inaccurate detections and false positives. Without solid confidence in your DLP detection accuracy, these tools can often introduce more bad than good.

Using a combination of state of the art technologies (including machine learning, artificial intelligence, and other advanced techniques), DataStealth identifies data elements and evaluates them to determine and assign a confidence and validity score. This assigned level of confidence is combined with positive validation results to determine whether or not candidate data matches a protection policy. Once a valid policy match has been determined, candidate data is immediately protected BEFORE leaving the DataStealth environment ... on the fly ... in real-time.


Why choose, when you can have it all

Vendors offer either encryption, tokenization, or de-identification as a means for protecting data.  Each methodology has its pros and cons. What may be the right choice for one use case, could be completely ineffective for another. So why choose only one? Why not have them all at your fingertips?

DataStealth allows users to select and employ all of the different data protection methodologies for individual data elements, based on their specific requirements. 

Tokenization: non-mathematical replacement of original values with benign substitute values. 

De-identification: similar to tokenization, but not reversible. 

Encryption: mathematical translation of values to unreadable values designed to conceal information.


Secure Storage

DataStealth does not rely on an Enterprise database with encrypted fields, nor any other storage methodology that relies on vulnerable key management solutions. Instead, we adopted a well-documented, well tested, but not readily deployed storage technique to provide DataStealth users with a combination of security, resiliency, redundancy, performance, and high availability.

Our storage technique has been described as ‘computationally infeasible to breach’, and although we prefer to keep the details confidential, we are always happy to dig-in with our customers should they desire or require more transparency.




Featured Deployments





Cloud Apps





Payment Processors