IRI Data Protector Suite


Next Steps
Overview IRI Voracity (Platform) IRI Data Manager (Suite) IRI Data Protector (Suite)

Award-Winning Data-Centric Security

The IRI Data Protector suite contains renowned software to find, classify, and protect personally identifiable information (PII) and other "data at risk." Comply with CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, SOC2, etc., and international data privacy laws like the GDPR, KVKK, LOPD, and POPI. Prevent or nullify data breaches through auditing and protection.

Link to the products and use cases below, and schedule a free online demonstration here.

Static Data Masking

FieldShield locates, categorizes, de-identifies, risk-scores, and audits PII in databases and files.

Learn More

Dark Data Masking

DarkShield discovers, delivers, and deletes PII in unstructured file formats.

Learn More

Excel® Data Masking

CellShield finds, reports on, masks, and audits changes to PII in Excel sheets.

Learn More


Chakra Max monitors, blocks, dynamically masks, and audits users/activity in high traffic databases.

Learn More

Learn More

Understand the capabilities of IRI Data Protector suite tools from the product feature-matrix, and the slide deck and article on startpoint security, linked (click) below.

Data Protector Suite Overview

Data Protector Suite PDF Cover

Secure Data at its Startpoints

Cybersecurity Sourcebook 2018

IRI Defines Startpoint Security | Outlook Series Listen Now

More Data Security Solutions

Data Masking as a Service

Let IRI experts handle your data masking needs. Regardless of their format or location, we can help you sift through your data sources to find and secure the PII in them.

Learn More

Test Data Management

Use IRI's proven shield tools above, the IRI RowGen package, or the IRI Voracity platform to subset, create, or virtualize safe, intelligent test data for DBs, file and report targets, or DevOps.

Learn More

Use Cases

The IRI Data Protector suite's constituent products address:

These data-centric security solutions are also critical complements to device and perimeter (network) security solutions which cannot address insider misuse. Licensing costs depend on which tools, and how many hostname or DB instance licenses, you need.

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.