A red secure lock representing data security

Improve Your Reputation

Be confident data at rest is not data at risk. Apply the masking functions your business rules require. De-ID, encrypt, hash, pseudonymize, randomize, redact, etc.

Learn More


Two people working on an audit at a table verifying rule compliance

Pass Audits Faster

Easily satisfy EUDPD, HIPAA, PCI, POPI, and other data privacy regulations. Verify compliance with XML audit logs that track your data protections and changes.

Learn More


A shield image that is filtering data down into the protected packets stored in the database

Shrink Risk, Grow Control

Safeguard data throughout its lifecycle, and across the enterprise. Anonymize fields in DBs and files during data integration (ETL), migration, outsourcing, and reporting.

Learn More

IRI AuditHub Use Cases

Payment Card Industry Data (PCI)

Royal Bank of Scotland Logo

"FieldShield decrypts and re-encrypts fields in our credit card migration and test files, and easily generates and manages encryption keys."

personally identifiable information (PII)

Accenture Logo

"We use the FieldShield GUI to design and run our Oracle data masking jobs on Linux. Eclipse is familiar to us already so we didn’t need any help."

Protected Health Information (PHI)

MedicX Digital Logo

"FieldShield’s de-identification and hashing functions help our geo-medical consumer health databases exceed HIPAA requirements."

Complete Data Masking

Every Protection

  • Encryption & Decryption
  • De- & Re-Identification
  • Encoding & Decoding
  • Pseudonymization
  • Character Masking
  • Randomization
  • Hashing
  • Expressions
  • String Manipulations
  • Tokenization
  • Row/Column Removal
  • Custom Functions

Every Source

  • Flat Files
  • Database Tables
  • Semi-structured Files
  • Unstructured Text

Every Deployment

  • Command Line
  • Eclipse GUI
  • Batch/Shell Scripts
  • System/API Library Call
  • In situ/SQL Procedures

Click Here to

Learn More

about IRI AuditHub

Consider IRI AuditHub

  • Are you spending time and money encrypting non-sensitive data, or using multiple tools?
  • Are you safe from data breaches? Would your data still be safe if it were exposed or taken?
  • Does your department comply with data privacy regulations? Can you prove it?
  • Do you protect only the data at risk, so you can see and use non-sensitive data?
  • Can you easily protect different data elements with different protection methods?
  • Does the protected data look real enough? Is it referentially correct?
  • Can you use existing metadata during protection? Is that metadata for data and jobs portable?
  • Can you protect data in real-time or DB applications dynamically?
  • Can you seamlessly combine data masking with data transformation, migration and reporting?
  • How long does it take for you to learn, implement, modify, or optimize your data masking jobs?

What Others Are Reading

A masked criminal trying to hack data but cannot get in because it is encrypted

Data Masking vs. Data Encryption

Do you know the technical differences between them? Learn more about these two popular forms of data obfuscation and when to use them.

A padlock through a credit card showing that the credit card information is secure

Format Preserving Encryption

Format-preserving encryption allows the output data to stay in the same format as the input. This is ideal for credit card, social security, and other alphanumeric identification formats.

A diagram showing how PCI Tokenization works

PCI Tokenization in FieldShield

The Payment Card Industry Data Security Standard, or PCI DSS, requires encryption or tokenization of primary account number (PAN) data. FieldShield supports both, and more.

Request More Information

* indicates a required field.
IRI does NOT share your information.