Masking PII in Fedwire Files
Abstract: This article discusses the content and obfuscation of historically used banking industry files using the IRI FieldShield data masking tool on proprietary tag-based formats (e.g., Read More
Abstract: This article discusses the content and obfuscation of historically used banking industry files using the IRI FieldShield data masking tool on proprietary tag-based formats (e.g., Read More
Abstract: This article covers the necessary JDBC and ODBC connectivity steps to reach Azure Databricks Delta tables from IRI Workbench and the CoSort SortCL engine used in structured data management operations in the Voracity platform ecosystem, especially IRI FieldShield data classification and masking jobs. Read More
Data Classification in the IRI Workbench GUI is used to name and find specific kinds of data – usually Personally Identifiable Information (PII) – and to consistently apply chosen functions (e.g., Read More
This article demonstrates how you can run SortCL-compatible jobs configured in your local Linux IRI Workbench on a remote Linux machine with a licensed CoSort SortCL executable. Read More
Healthcare providers, medical researchers, and other “business associates” collect and process sensitive data on patients, which HIPAA law classifies as protected health information (PHI). Because PHI is stored and shared in databases, clinical notes, imaging studies, treatment forms, and EDI (claim) formats – both on-premise and in the cloud – safeguarding it by finding and de-identifying it can be a complex, time-consuming challenge. Read More
A data masking tool can be an effective, if not essential, way to protect sensitive information stored in files and databases. As the numbers of data breaches, lawsuits, and data privacy laws continue to grow, companies must find ways to anonymize production and test data without sacrificing its utility for analytics, research, marketing, or development. Read More
The Banking, Financial Services, and Insurance (BFSI) industry handles huge amounts of personally identifiable information (PII) and sensitive financial data each day. This data ranges from NID, account information and credit scores to financial transactions and loan documents. Read More
Threats of data breaches and cyberattacks have intensified over the years. In 2025 alone, the total damage cost is already forecast to reach up to $10.5 trillion. Read More
Abstract: Adopting a data mesh approach represents a contemporary solution to the challenges faced by traditional centralized data management systems. This article summarizes what data mesh architecture is about, and how you can leverage its key benefits using the IRI Voracity platform. Read More
This article demonstrates the Voracity user’s ability to join values in a flat-file file to those in an RDB (Relational Database) table to provide meaningful information. Read More
To configure both JDBC and ODBC to support the Transport Layer Security (TLS) protocol, there are additional configuration steps that are needed when compared to this previous article. Read More