Data Privacy & Governance


Next Steps
Overview BI Analyst DBA CIO/IT Manager ETL/Solution Architect Compliance Officer Programmer & ISV

The categories below are broadly named in the interest of space. Please explore the Solutions section of this website and, in particular, Data Governance and Data Masking for more information.

Security & Governance

Data represents risk. What are you doing to protect the personally identifiable information (PII) and master data in your databases and files? Are your security practices cumbersome or heavy-handed? Are you laboriously trying to strip out sensitive data or cutting off access to entire files, databases or disks, just to protect one or more field values like a social security number? How separate, costly, or time-consuming are these tasks?

With IRI FieldShield and IRI RowGen software, you can mask production data, and generate safe test data, to protect PII. And with the larger IRI CoSort package or IRI Voracity platform for 'total data management', the same security techniques can be built into data transformation, replication and reporting operations:

Voracity Solutions Diagram

Read more about IRI's integrated, targeted, and auditable security functions for data at rest, and in motion, here:

In addition to field-level privacy protections, IRI tools can help you create safe, referentially correct test data for databases and flat files, as well as reports in custom formats. Read more about rapidly creating test data with the appearance and intelligence of production data, but without any of the risks:

Either way -- through the protection of real data or the generation of realistic data -- you can render data in tables and files safe for compliance and outsourcing.

Effective data governance goes far beyond the security aspects of data stewardship. See these links if you are interested in how IRI software addresses:

Listen to The Data Warehouse Institute (TDWI) interview to understand how IRI has protected data at risk during big data integration for years, starting wtih CoSort.

Audit Requirements

It's not enough that your software and systems can map, transform, report, and protect your data. You may need to examine or prove what was done, when it was done, where it was done, and by whom. See how CoSort and FieldShield can help you with:

Data Processing Forensics

Dramatic changes in data values or record counts can be red flags that need to be caught automatically. CoSort SortCL job scripts, output reports, and log files can help you filter, capture, display, and record data changes during batch runs through large files. For specifics, see:

IRI's white paper, called "Making Data Safe for Outsourcing and Compliance," also describes the challenges and solutions on this page, and lists how IRI tools map to 24 of COBIT's 34 control objectives for good IT governance. Ask for it.

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.