Request Info
Overview Data Masking Data Quality Safe Testing Data Forensics RBAC Stewardship Compliance COBIT

While data governance deals with the policies around data, stewardship deals with their enforcement


In data warehouse and related activities, operational data undergoes frequent manipulation and change. For example, records may be added, dropped, or modified. Records and fields that appear in one set of reports may not appear in another file where they should (or vice versa), or the fields may have different attributes or values.

To protect privacy, sensitive data, need-to-know recipients, and access rights, data asset users and activities must be identified and monitored. Data governance officials and the IT staff they rely on need to manage and track these data issues. Many of the tools and systems designed to do this today are complex, expensive, and stand apart from production data processing operations.


IRI software helps you implement and persist data governance rules in a wide range of data management lifecycle operations, including data integration, data masking, and everyday database transactions.

In static environments, this starts with the data discovery and classification tools built into the IRI Voracity data management platform.The logged data processing, protection, presentation and prototyping functions in Voracity or its constituent products (like IRI CoSort or IRI FieldShield) all support data issue analysis and stewardship efforts from the same Eclipse GUI, IRI Workbench.

Capabilities like:

  • data discovery, classification and profiling
  • data validation and cleansing
  • data masking and encryption
  • data transformation and reporting
  • filtering data and change data capture
  • metadata and master data management
  • runtime audits and version control

can all be integral aspects of IRI jobs. Cleanse and secure data as you transform and visualize it. Audit and manage jobs in the same graphical IDE where you design and run them.

In real-time environments where database log-ins and SQL execution (or injection) attempts are made, IRI ChakraMax data-centric audit and protection (DCAP) software can monitor and block unauthorized users and commands in a multiple ways, across multiple databases at once, and log everything so data stewards can review their policies and role-based access controls (RBAC). IRI ChakraMax and FieldShield users can also use various dynamic data masking (DDM) techniques to redact, encrypt, or otherwise protect data in motion.

IRI software makes it easy for data and information stewards to work with DBAs, ETL architects, business users, and report designers. But more interestingly, it allows data stewardship to be built into your processes, and for you to apply RBACs at various levels. Click here for more information on setting and enforcing RBACs in IRI environments.

See also:

Request More Information

* indicates a required field.
IRI does NOT share your information.