
Fabricating PII
What is the Identity Fabrication Rule?The identity fabrication rule is a deterministic but non-reversible data masking rule that can help you create realistic test PII for a whole record from just one original value. Read More
The identity fabrication rule is a deterministic but non-reversible data masking rule that can help you create realistic test PII for a whole record from just one original value. Read More
Version 6 of the IRI DarkShield data masking tool now features a self-hosted (on-premise) REST API for PII (Personally Identifiable Information) data masking in structured, semi-structured, and unstructured data sources. Read More
A data masking tool can be an effective, if not essential, way to protect sensitive information stored in files and databases. As the numbers of data breaches, lawsuits, and data privacy laws continue to grow, companies must find ways to anonymize production and test data without sacrificing its utility for analytics, research, marketing, or development. Read More
Threats of data breaches and cyberattacks have intensified over the years. In 2025 alone, the total damage cost is already forecast to reach up to $10.5 trillion. Read More
Abstract: This article describes how IRI DarkShield users can access files in SharePoint Online for searching and masking PII. It documents the setup steps you will take to use Microsoft Entra ID (formerly Azure Active Directory) for authorization, and configure DarkShield jobs in the IRI Workbench graphical IDE, built on Eclipse. Read More
This article demonstrates the Voracity user’s ability to join values in a flat-file file to those in an RDB (Relational Database) table to provide meaningful information. Read More
This article demonstrates the use of the “format preserving scramble” (FPS) function available in IRI Voracity data masking and test data synthesis tools . FPS obfuscates numeric and alphabetic data in a random way but preserves the format and original widths of the characters (including upper- and lower-case letters). Read More
To configure both JDBC and ODBC to support the Transport Layer Security (TLS) protocol, there are additional configuration steps that are needed when compared to this previous article. Read More
First released in 2011, the IRI FieldShield database data masking tool helps you classify, find, and de-identify personally identifiable information (PII) or other sensitive data in structured relational database (RDB) sources. Read More
The “New Masking Job…” wizard in the IRI Workbench GUI for FieldShield creates a single IRI FieldShield job (.fcl) script for masking data usually for just one source – like a flat file or table – where data classes and masking rules for multi-target consistency are not required. Read More