Targeted, Auditable Protections for Data at Risk
IRI's new data-centric security product FieldShield, and its renown data manipulation package CoSort, both include multiple techniques (and the ability for you to add more of your own) to
secure sensitive information in database tables and flat files -- down to the
You can now make confidential, personally-identifiable
information (PII) safe for compliance or outsourcing and still available for processing and presentation. In fact, with
CoSort, you can do it all together - protect, transform, and report.
FieldShield and CoSort support these targeted (field or column level) security actions in files and ODBC-connected tables:
So, you can use FieldShield for standalone security, or CoSort to add security directly
into big data manipulations. For example, you could use CoSort to simultaneously
encrypt and sort data for safe, bulk loads into an on-line database, or
use CoSort to produce a delta report (with joins) with de-identified fields.
FieldShield and CoSort deliver on the promise of data-centric security by:
• Exploiting multiple field-level protection
techniques per table or file. Your governance, privacy, and security experts
can choose the technique that's right for each field, according to their
• Protecting only data that's sensitive .
You can continue to allow access to, and use of, the rest of the data for processing, reporting, outsourcing, etc.
• Masking data in ways that make it look real
(e.g. format-preserving encryption, pseudonymization, test data generation, bit manipulation). You can share the
output, and still obfuscate the sensitive data in it with realism.
• Mixing built-in 256-bit AES functions with
your own encryption libraries. FieldShield and CoSort ship with NIST-confirming, NSA (suite B) algorithms, but also let you use your own functions to encrypt
and decrypt your private data, one or more fields (or columns) at at time.
• Crossing platforms. The products' data definitions, job scripts, and security functions work the same way across all Unix, Linux and Windows environments, and all ODBC sources
• Verifying compliance. FieldShield and CoSort provides an XML audit trail on jobs that detail the who, what, when and how of data protection and manipulation.
• Generating safe test data in one or
more randomly-generated or randomly selected fields. Data masking functionality
exists in FieldShield and CoSort, and you can use the metadata-compatible test data generation
to create test fields in any sequential or relational format.
Read on for more information on how to use FieldShield or CoSort to protect sensitive data
at rest or in motion -- your tables and files at risk -- through:
• Superior Algorithms
• Format-Preserving Encryption (FPE)
• Field-Level Masking
• Field-Level Filtering/Redaction
• Field-Level De/Re-Identification
• Field-Level Pseudonymization
Simultaneous Transforms and Reports,
Only the CoSort package (and its SortCL tool in particular) gives you the power to combine
field-level protections with simultaneous, high-performance transformations,
reports, and hand-offs. That's because CoSort's masking functions
are just additions to its other data manipulation capabilities -- all of which can run
together in one job script and I/O pass. Multiple files
and formats, input and output. No size limits. Scalable performance.
If you just want to protect your data, but process, store, or display it elsewhere, you can. With integrated field-level security options, CoSort gives you that choice.
Click below for details on additional security solutions
• Synthesize Safe Test Data in Real File Formats
Audits (Verification) and Data Forensics
Blog > Data Protection
FAQ > Data Privacy
Solutions > Data Transformation
Customers / Industry Roles > Programmer / ISV
Products > FieldShield
Products > FieldShield GUI
Products > CoSort > SortCL
Products > RowGen (Test Data)
Thank you for sending us a request for information. We will get back to you shortly.