IRI Blog Articles

Diving Deeper into Data Management

 

 

According to Simson L. Garfinkel at the NIST Information Access Division’s Information Technology Laboratory, De-identification is not a single technique, but a collection of approaches, algorithms, and tools that can be applied to different kinds of data with differing levels of effectiveness. In general, privacy protection improves as more aggressive de-identification techniques are employed, but […]

{ 0 comments }

Detecting additions and updates to database tables for data replication, ETL, and other incremental data movement goals can be automated in IRI Voracity workflows designed and run in IRI Workbench (WB) GUI, built on Eclipse™. This article explains how to regularly check for changes in Oracle source tables to decide when to move data into […]

{ 0 comments }

Connecting Voracity to MapR

August 29, 2017 Big Data
Voracity MapReduce

This article, along with counterpart articles for Cloudera and HortonWorks, describes the simple 5-step process to connect the IRI Voracity big data management platform to any MapR distribution through the VGrid Gateway. After connecting,  data can be conveniently moved between HDFS and other systems. Furthermore, that data can be manipulated and masked in Hadoop via MR2, Spark, Spark Stream, […]

Read the full article →

Connecting Voracity to Cloudera

August 23, 2017 Big Data
Cloudera Dashboard

This article, along with counterpart articles for HortonWorks (Ambari) and MapR, describes the simple 3-step process to connect the IRI Voracity big data management platform to a Cloudera distribution through the VGrid Gateway. After connecting, data can be conveniently moved between HDFS and other systems. Furthermore, that data can be manipulated and transformed in Hadoop via MR2, Spark, Spark Stream, […]

Read the full article →

Connecting Voracity to HortonWorks

August 23, 2017 Big Data
Ambari Dashboard

This article, along with counterpart articles for Cloudera and MapR, describes the simple 3-step process to connect the IRI Voracity big data management platform to any Ambari distribution through the VGrid Gateway. After connecting, data can be conveniently moved between HDFS and other systems. Furthermore, that data can be manipulated and masked in Hadoop via MR2, Spark, Spark Stream, […]

Read the full article →

How to Mask Tables and Preserve Referential Integrity

August 14, 2017 Data Masking/Protection
Thumbnail image for How to Mask Tables and Preserve Referential Integrity

The Multi Table Protection Job wizard in IRI FieldShield can mask personally identifiable information (PII) in database columns that are part of a foreign key relationship, and thus preserve referential integrity between the tables. This ensures that the records remain linked even after they are de-identified. FieldShield users achieve this in the wizard by defining field-level […]

Read the full article →

How to Build Realistic but Fake PII

June 13, 2017 Data Masking/Protection
Thumbnail image for How to Build Realistic but Fake PII

There are times when it is necessary to test with or share data that has elements of personally identifiable information (PII). To comply with data privacy laws and prevent a data breach, you may need to provide data that reflects, and sometimes imparts, critical information, but still protects the PII. This article shows how you […]

Read the full article →

Process and Protect HL7 Data with Voracity

June 12, 2017 Data Masking/Protection
Thumbnail image for Process and Protect HL7 Data with Voracity

This article shows how you can use IRI Voracity to rapidly integrate and mask sensitive healthcare data in the HL7 file standard we introduced here. The process begins as HL7 messages are converted into a relational format using Flexter Data Liberator software from Sonra. The output of that process will be an Oracle database — […]

Read the full article →

Unmasking the HL7 Data Standard

May 16, 2017 Business Intelligence (BI)
Thumbnail image for Unmasking the HL7 Data Standard

In this series of articles, we will describe the semi-structured HL7 file format used in many healthcare industry data storage and processing settings, and show how you can rapidly transform and mask large volumes of HL7 XML messages without writing code. This first article introduces the HL7 standard and explains how HL7 messages are structured […]

Read the full article →

🎥 IRI Chakra Max Setup Video

March 19, 2017 Data Masking/Protection
Thumbnail image for 🎥 IRI Chakra Max Setup Video

Learn how to set up IRI Chakra Max and get the most protection out of your DB firewall with this instructional video. Additional videos on the configuration and use of Chakra Max for database activity monitoring, audit, and protection are available from IRI on request.

Read the full article →

The Formidable but Imperative Task of IoT Security

February 28, 2017 Big Data
Thumbnail image for The Formidable but Imperative Task of IoT Security

The Internet of Things (IoT) continues to grow at an unbelievable rate, and creates tremendous benefits and opportunities for society. With it grows the demand for products and services that control, manage, and protect the massive amounts of data streaming from all those network-connected devices.  But as they provide more and more advantages, and even […]

Read the full article →