In this demonstration, the Multi-Table Protect Job Wizard in the IRI Workbench GUI for Fieldshield and Voracity is used to define a rule for data in multiple Oracle tables.
Introduction: This example demonstrates an older method of using IRI FieldShield to protect sensitive data prior to indexing the data in Splunk. As you will read, FieldShield would process the data outside of Splunk and create a CSV file for Splunk’s ingestion.
According to Trent Henry of the Burton Group,
Data protection needs to take into account both internal and external threats, including those against critical database and application resources.
Encryption key management is one of the most important “basics” for an organization dealing with security and privacy protection. Major data losses and regulatory compliance requirements have prompted a dramatic increase in the use of encryption within corporate data centers.
It is a common mistake to refer to data masking and data encryption interchangeably to mean the same things. While field-level encryption is considered one of many possible “data masking” functions, we define data masking and encryption as technically distinct processes below.
This demonstration shows how to use IRI FieldShield in Workbench to create a script to protect personally identifying information (PII) at the field level. Masking functions and encryption algorithms are applied to separate fields in a database in the same pass.
This video is a demonstration of using IRI Workbench to apply format preserving encryption (FPE) and pseudonymization to select fields in a data file to protect personally identifiable information (PII) and protected health information (PHI).