The unauthorized use or misuse of our personally identifiable information (or PII) — such as name, social security number, date of birth, mother’s maiden name, place of birth, etc.
It is a common mistake to refer to data masking and data encryption interchangeably to mean the same things. While field-level encryption is considered one of many possible “data masking” functions, we define data masking and encryption as technically distinct processes below.
IRI FACT (Fast Extract) rapidly unloads huge tables in Oracle, Sybase, DB2 UDB, MySQL, SQL Server, Altibase, Greenplum, Teradata, and Tibero to flat files. FACT uses native drivers and parallelization technologies to unload up to 7X faster than other methods.
IRI NextForm converts, replicates, federates, and reports on data in multiple sources and targets. There are six editions that specialize on different migration goals: Lite Edition – basic file conversions, COBOL edition – migrates MF COBOL, MF-ISAM, Acucobol, DBMS edition – database migration, Legacy edition – extracts data from hundreds of legacy sources, Modern edition – addresses cloud, SaaS, and big data sources, and Premium edition – which customizes your migrations for any of these data types, sources, and targets.
IRI CoSort is the world’s #1 sort, and single-pass “super tool” for data transformation, reporting, and more. Use CoSort to migrate legacy sorts and data, accelerate BI, DB, and ETL tools, and replace SQL, shell scripts, and 3GL programs that can’t transform fast enough.
This demonstration shows how to use IRI FieldShield in Workbench to create a script to protect personally identifying information (PII) at the field level. Masking functions and encryption algorithms are applied to separate fields in a database in the same pass.
IRI CellShield EE (Enterprise Edition) is the full-featured, professional data masking package for Excel 2010 and later workbooks in your LAN, and MS repositories. Discover, report, protect, and audit PII in cells across multiple sheets at once using encryption, masking, and pseudonymization functions to comply with data privacy laws.