Improve Your Reputation
Be confident data at rest is not data at risk. Apply the masking functions your business rules require. De-ID, encrypt, hash, pseudonymize, randomize, redact, etc.
Pass Audits Faster
Easily satisfy EUDPD, HIPAA, PCI, POPI, and other data privacy regulations. Verify compliance with XML audit logs that track your data protections and changes.
Shrink Risk, Grow Control
Safeguard data throughout its lifecycle, and across the enterprise. Anonymize fields in DBs and files during data integration (ETL), migration, outsourcing, and reporting.
IRI AuditHub Use Cases
Payment Card Industry Data (PCI)
"FieldShield decrypts and re-encrypts fields in our credit card migration and test files, and easily generates and manages encryption keys."
personally identifiable information (PII)
"We use the FieldShield GUI to design and run our Oracle data masking jobs on Linux. Eclipse is familiar to us already so we didn’t need any help."
Protected Health Information (PHI)
"FieldShield’s de-identification and hashing functions help our geo-medical consumer health databases exceed HIPAA requirements."
Complete Data Masking
- Encryption & Decryption
- De- & Re-Identification
- Encoding & Decoding
- Character Masking
- String Manipulations
- Row/Column Removal
- Custom Functions
- Flat Files
- Database Tables
- Semi-structured Files
- Unstructured Text
- Command Line
- Eclipse GUI
- Batch/Shell Scripts
- System/API Library Call
- In situ/SQL Procedures
Click Here to
about IRI AuditHub
Consider IRI AuditHub
- Are you spending time and money encrypting non-sensitive data, or using multiple tools?
- Are you safe from data breaches? Would your data still be safe if it were exposed or taken?
- Does your department comply with data privacy regulations? Can you prove it?
- Do you protect only the data at risk, so you can see and use non-sensitive data?
- Can you easily protect different data elements with different protection methods?
- Does the protected data look real enough? Is it referentially correct?
- Can you use existing metadata during protection? Is that metadata for data and jobs portable?
- Can you protect data in real-time or DB applications dynamically?
- Can you seamlessly combine data masking with data transformation, migration and reporting?
- How long does it take for you to learn, implement, modify, or optimize your data masking jobs?
What Others Are Reading
Do you know the technical differences between them? Learn more about these two popular forms of data obfuscation and when to use them.
Format-preserving encryption allows the output data to stay in the same format as the input. This is ideal for credit card, social security, and other alphanumeric identification formats.
The Payment Card Industry Data Security Standard, or PCI DSS, requires encryption or tokenization of primary account number (PAN) data. FieldShield supports both, and more.