Data Masking/Protection Database Subsetting – How to in IRI Voracity by Claudia Irvine and Tylor Quinley Once a database exceeds a certain size, it becomes expensive — and risky from a security perspective — to provide full-size copies for development, testing, and training. Read More