Compliant Data Masking

 

Next Steps
Overview DLP GDPR HIPAA PCI DSS DMaaS SDM DDM DCAP De-Identification

Data = Risk


data masking facts and risks of not protecting data

In the post-SOX compliance era, companies and government agencies risk financial liability and brand damage from privacy law violations and data breaches. Consumers, patients, scientists, soldiers, and students need and demand confidentiality. The data at risk includes:

Both national data privacy laws and internal regulations mandate the protection of this data. Compliance is not only required ... it must also be verifiable.

What's Your Approach?

Are you using a home-grown solution, and is it robust and easy to maintain? Is your encryption solution protecting everything ham-handedly with a single point of failure? Or do you use a data masking tool that only covers one data source or offers too few functions?

Is data masking tightly integrated into your data management lifecycle and infrastructure? Can you mask data while manipulating or reporting on it, easily modify those jobs, and automatically log them to prove compliance?

The Solutions


Address these and related challenges with proven software like IRI FieldShield for static data masking, the IRI Chakra Max DB firewall for dynamic data masking, or the IRI Voracity total data management platform.[1]

All of IRI's "startpoint security" products include cost-effective PII discovery, classification, de-identification, and auditing. They leverage the same, free Eclipse GUI to connect and apply a wide array of targeted, field-level protection functions to a multiple data sources. Learn more about how you can do things like:

Read More in the Data Masking White Paper

Each IRI data masking solution also produces audit logs that you can secure and query to document and verify compliance with data privacy laws.

If you need safe test data, masking production data is one way to go. But in Voracity, you can also subset and mask database tables, or use its built-in IRI RowGen functions to generate safe, referentially correct test data for multiple targets from scratch!

Role Based Access Controls (RBAC)

Choose a masking function each field based on your our own business rules regarding: authorization (RBAC), security strength, reversibility, and appearance.

Define static or dynamic data masking jobs and rules based on who can see which columns. Keep original data unchanged and preserve referential integrity.

Mask PII in files and reports, too. Set field or job level controls for different recipients.

IRI solutions for data masking problems

Bottom Line

Data masking is the best way to comply with data privacy laws, nullify the effects of a data breach, and support the risk and controls framework of your enterprise.

Satisfy the PII identification, protection and verification requirements of information stewardship, regulatory compliance, and data loss prevention programs.

Perform data masking standalone, or directly within BI, DB, ETL and other applications.


[1] Use IRI FieldShield as a standalone product, or within the IRI Voracity platform for data discovery, integration, migration, governance, and analytics. FieldShield data and job definitions also share the same metadata syntax and Eclipse GUI with other Voracity component products (IRI CoSort, IRI NextForm, and IRI RowGen) to further facilitate integration of data masking operations into the enterprise information management (EIM) lifecycle.

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.