![Complete Scratch flow diagram](https://www.iri.com/blog/wp-content/uploads/2016/07/7-Complete-Scratch-flow-diagram.png)
Creating a Voracity Flow from the Palette (Part 2…
This is the second of two articles on creating a new IRI Voracity® ETL job flow from the job design Palette in the IRI Workbench, built on Eclipse. Read More
This is the second of two articles on creating a new IRI Voracity® ETL job flow from the job design Palette in the IRI Workbench, built on Eclipse. Read More
In this demonstration, the Multi-Table Protect Job Wizard in the IRI Workbench GUI for Fieldshield and Voracity is used to define a rule for data in multiple Oracle tables. Read More
EDITOR’S NOTE: The information documented in this article applies to IRI Workbench versions released prior to Q4, 2023. For more recent information, please refer instead to this article. Read More
This is the first of two articles showing how to create and use job flows in the IRI Workbench GUI for Voracity. It follows two other series on creating flows automatically using new job wizards. Read More
Editor’s Note: This article was writen in 2016. But since 2023, there are even more robust PII discovery capabilities for data in structured, semi-structured, and unstructured (RDB, NoSQL DB, file, document, and image) sources using IRI DarkShield, including Named Entity Recognition (NER) model matchers. Read More
Applying a Pseudonym Rule in the IRI Workbench GUI for FieldShield or Voracity
To create pseudonym values that will be consistent across tables — and keep up with changing data in those tables — the IRI Workbench GUI for FieldShield and Voracity now includes a Flow Diagram Palette item for Pseudonymization. Read More
IRI CellShield™ Enterprise Edition now offers an Intra-Cell Search feature that finds and protects sensitive data in unstructured cell contents with masking, encryption, or pseudonymization. Just as with full-cell values, you can now identify and mask the ‘floating’ sensitive data in Microsoft Excel® spreadsheets with only a few mouse clicks. Read More
Once a database exceeds a certain size, it becomes expensive — and risky from a security perspective — to provide full-size copies for development, testing, and training. Read More
Note: This example demonstrates a more direct method of using IRI FieldShield or IRI Voracity to statically mask PII within structured MongoDB collections. Our older how-to-article on indirect data masking of MongoDB through export/mask/import from 2015 is here, and a newer method through MongoDB’s native driver support in CoSort v10 from 2018 is here. Read More
IRI is now also delivering fuzzy search functions, both in its free database and flat-file profiling tools, and as available field-function libraries in IRI CoSort, FieldShield, and Voracity to augment data quality, security, and MDM capabilities. Read More
IRI provides a software development kit (SDK) to help FieldShield users apply column-level encryption, decryption, hashing, and redaction algorithms in Java and .NET projects for more in-situ or dynamic data masking requirements. Read More