
Restoring Masked Values with IRI DarkShield
IRI DarkShield data masking software focuses on discovering and masking sensitive data in a wide variety of sources, including unstructured and semi-structured files, documents, and databases. Read More
IRI DarkShield data masking software focuses on discovering and masking sensitive data in a wide variety of sources, including unstructured and semi-structured files, documents, and databases. Read More
SortCL, the IRI language of structured data definition and manipulation, has long had the ability to draw replacement values from external set files containing two or more columns of values. Read More
Abstract: It is common practice to mask sensitive production data for non-production purposes. Creating realistic values presents the challenge of handling new values introduced into production data sources and the risk of re-identification. Read More
Applying a Pseudonym Rule in the IRI Workbench GUI for FieldShield or Voracity
To create pseudonym values that will be consistent across tables — and keep up with changing data in those tables — the IRI Workbench GUI for FieldShield and Voracity now includes a Flow Diagram Palette item for Pseudonymization. Read More
This is an introduction to IRI CellShield. Subsequent blogs will demonstrate the different functions in CellShield: data masking, encryption, and pseudonymization. If you’re interested in finding, classifying, or masking PII in databases or flat files, check out IRI FieldShield. Read More
This is the last in a four-part series to introduce IRI CellShield. An overview is found here. The following parts demonstrate how to use the other functions in CellShield: data masking and encryption. Read More
This is the third in a four-part series describing IRI CellShield data masking software for Excel, and its format-preserving encryption function in particular; the series overview starts here. Read More
This is the second in a four-part series to introduce IRI CellShield. An overview is found here. The other parts demonstrate how to use more functions in CellShield like encryption and pseudonymization. Read More
This article is third in a 3-part series on CLF and ELF web log data. We first introduced CLF and ELF web log formats, then introduced IRI solutions for processing web log data, and here we conclude by masking private data in web log files. Read More
Hashing and encryption are distinct disciplines, but due to their nature they find harmony in cryptography. This article describes hashing, its synergy with encryption, and uses in IRI FieldShield for enhancing data protection. Read More