Load Balancing & Authenticating DarkShield via NGINX
This article demonstrates methods for balancing work loads and authenticating users of the IRI DarkShield API using free, easily deployed reverse proxy server software from NGINX. Read More
This article demonstrates methods for balancing work loads and authenticating users of the IRI DarkShield API using free, easily deployed reverse proxy server software from NGINX. Read More
Data Masking/Protection
Optical Character Recognition (OCR) software is technology that recognizes text within a digital image. OCR is used by IRI DarkShield software to recognize text in standalone or embedded images during PII searching and masking operations. Read More
Abstract: This article covers the use of the IRI DarkShield API for automatically locating and de-identifying PII or other sensitive data in the three major cloud provider NoSQL databases — Google BigTable, MS CosmosDB in Azure, and Amazon DynamoDB. Read More
Data Masking/Protection
This article demonstrates how to automate the execution of IRI DarkShield data masking jobs from SSH commands run from within the AWS CodePipeline to produce fit-for-purpose test data in the DevOps process. Read More
Data Masking/Protection
Abstract: With hundreds of thousands of medical imaging devices in use, DICOM is one of the most widely deployed healthcare messaging standards in the world; billions of DICOM images are currently in use for clinical care. Read More
Data Masking/Protection
Editors Note: This article demonstrates the discovery and de-identification of Protected Health Information (PHI) in EDI files using the DarkShield API for Files. If you are interested in using the fit-for-purpose search/mask graphical wizards in DarkShield instead, see this article on HL7 masking, this article on X12 masking, or this article on FHIR masking. Read More
Data Masking/Protection
Among the PII data profiling and data discovery tools in the IRI FieldShield data masking product is an interactive data visualization panel, or dashboard, for PII search results. Read More
Abstract: Now that XLS and XLSX files are now also directly supported in IRI FieldShield by virtue of their new /PROCESS (format) support in the CoSort 10.5 SortCL program, IRI Voracity data management platform and standalone data masking users have three different ways to “shield” sensitive data in their spreadsheets. Read More
Business Intelligence (BI)
The names of IRI software products and how they run have at times been a source of mystery, or even confusion, to the uninitiated. This article spells out the pieces and clarifies their interplay, providing a quick primer for prospective users, partners, and new industry analysts. Read More
Data Masking/Protection
Abstract: It is common practice to mask sensitive production data for non-production purposes. Creating realistic values presents the challenge of handling new values introduced into production data sources and the risk of re-identification. Read More