
Connecting to, and Masking Data, in Salesforce
IRI Workbench users can connect to and manipulate the data in the underlying database in Salesforce using the DataDirect JDBC and ODBC drivers from Progress Software.
Read MoreIRI Workbench users can connect to and manipulate the data in the underlying database in Salesforce using the DataDirect JDBC and ODBC drivers from Progress Software.
Read MoreOne of the primary uses of IRI FieldShield is to encrypt and decrypt sensitive data in database or flat-file columns. FieldShield relies on a passphrase to derive a symmetrical encryption key used at encryption and decryption time.
Read MoreThe Directory Data Class Search wizard in IRI Workbench (WB) matches data in structured files within one or more directories to configured data classes. The search process compares the matchers in the data classes with the data in those files to determine the best match, if any.
Read MoreSplunk Phantom is an orchestration, automation, and response technology for running “Playbooks” to respond to various conditions. Phantom connects to Splunk Enterprise using the Phantom App for Splunk, so that actions can be taken on knowledge derived from data indexed in Splunk.
Read MoreFinding and masking personally identifiable information (PII) in Snowflake® data warehouses works the same way in IRI FieldShield® or Voracity® installations as it does for other relational database sources.
Read MoreThe Schema Data Class Search wizard in IRI Workbench (WB) can be used to match data in entire schemas to configured data classes. The search process compares the matchers in the data classes with the data to determine the best match, if any.
Read More“Have you stopped speeding?” You could probably object to a leading question like this in court, but what happens when an important question with only a yes or no answer is solicited on a mandatory form, and the response becomes part of an actionable database record?
Read MoreAdding ‘random noise’ to data through blurring or perturbation is a data common anonymization requirement for researchers and marketers of protected health information (PHI) seeking to comply with the HIPAA Expert Determination Method security rule.
Read MoreNote: This article covers the third available IRI customer method for statically masking or encrypting PII in structured MongoDB collections through the IRI FieldShield product or IRI Voracity platform (both powered by IRI CoSort v10 and its support of the native MongoDB driver).
Read MoreThis article demonstrates the manipulation of a CSV file using an IRI Workbench wizard. In fact, this example shows how PII can be masked from almost any IRI job wizard.
Read More