Frequently Asked Questions

 

Next Steps
FAQs

Which protection techniques can I use? What should I use?

Whichever satisfies your business requirements. In IRI FieldShield (or the SortCL program in IRI CoSort), you can apply any of these techniques on a per-field/column basis:

  • Encryption
  • Masking
  • Hashing
  • Pseudonymization
  • Randomization
  • De-ID
  • Expression (calculation/function) logic
  • Substring and byte shifting
  • Data type conversion
  • Custom function

The decision criteria for which protection function to use for each datum are:

  1. Security - how strong (uncrackable) must the function be
  2. Reversability - whether that which was concealed must later be revealed
  3. Performance - how much computational overhead is associated with the algorithm
  4. Appearance - whether the data must retain its original format after being protected

IRI is happy to help you assess which functions best apply to your data. 

Note also that you can protect one or more fields with the same or different functions, or protect one or more records entirely ("wholerec"). In each case, the condition criteria and targets/layout parameters can also be customized, and combined with data transformation and reporting in the same job. And, in fit-for-purpose multi-table wizards, or through global data classification, DBAs and data stewards can apply these protections as rules to preserve consistency and referential integrity database or enterprise wide.

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.