{"id":13851,"date":"2020-07-01T15:16:56","date_gmt":"2020-07-01T19:16:56","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=13851"},"modified":"2026-02-23T18:03:18","modified_gmt":"2026-02-23T23:03:18","slug":"darkshield-introduction","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/","title":{"rendered":"Introduction to IRI DarkShield"},"content":{"rendered":"<h5><b><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">What is DarkShield?<\/span><\/span><\/b><\/h5>\n<p><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><i><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">IRI DarkShield<\/span><\/span><\/span><\/i><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> is a data masking tool for classifying, searching, and de-identifying Personally Identifiable Information (PII) and other sensitive data in structured, semi-structured and unstructured sources. <\/span><span style=\"vertical-align: inherit;\">You can define and run DarkShield jobs via a GUI, CLI or API.\u00a0<\/span><\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">DarkShield supports data on-premise or in the cloud. <\/span><span style=\"vertical-align: inherit;\">Sources include <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-rpc-api\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">free-floating text<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-files-rpc-api\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">files and documents<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-darkshield-nosql-rpc-api\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">various NoSQL DBs<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , and any <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-darkshield-rdb-rpc-api\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">relational database<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> connected through a JDBC driver.\u00a0<\/span><\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">One of several data masking tools in the <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/products\/voracity\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">IRI Voracity<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> platform and <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/products\/iri-data-protector\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">IRI Data Protector Suite<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , DarkShield supports most data formats and silos.<span id='easy-footnote-1-13851' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#easy-footnote-bottom-1-13851' title='Consider your use case. IRI FieldShield or RowGen may be a better fit for your &lt;a href=&quot;https:\/\/www.iri.com\/solutions\/test-data&quot;&gt;relational database test data&lt;\/a&gt; requirements. IRI CellShield EE may be easier for your &lt;a href=&quot;https:\/\/www.iri.com\/blog\/data-protection\/iri-data-masking-tools-for-excel\/&quot;&gt;Excel&lt;\/a&gt; users to operate. See the tool comparison &lt;a href=&quot;https:\/\/tinyurl.com\/WhichIRIshield&quot;&gt;matrix&lt;\/a&gt;.'><sup>1<\/sup><\/a><\/span><\/span><\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">The data classes and masking functions you define for DarkShield jobs are the same ones used in IRI FieldShield and IRI CellShield EE. <\/span><span style=\"vertical-align: inherit;\">This allows you to secure data consistently across disparate silos and formats.<\/span><\/span><\/span><\/p>\n<h5><b><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">How Does It Work?<\/span><\/span><\/b><b><\/b><\/h5>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Most DarkShield jobs can be configured, run, and shared through the IRI Workbench GUI, built on Eclipse. <\/span><span style=\"vertical-align: inherit;\">See this section for more information on the front end:<\/span><\/span><\/span><\/p>\n<p><a href=\"https:\/\/www.iri.com\/products\/workbench\/darkshield-gui\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">https:\/\/www.iri.com\/products\/workbench\/darkshield-gui<\/span><\/span><\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Under the hood, DarkShield runs one or more Remote Procedure Call (RPC) API engines \u2013 depending on your data source(s) \u2013 that perform the searching and masking work. <\/span><span style=\"vertical-align: inherit;\">These engines run through a server in your infrastructure (called Plankton Server) which accepts HTTP(S) requests containing your PII searching and masking instructions.<\/span><\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\">You host the DarkShield API server either on-premise or in a cloud server you manage. IRI does not maintain or manage these services, and at no time would PII leave your environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The methods DarkShield uses to search for PII are provided in instructional JSON payloads to the applicable DarkShield API as<\/span><i><span style=\"font-weight: 400;\"> Search Contexts<\/span><\/i><span style=\"font-weight: 400;\">. These are instructions for masking PII found during a search or contained in instructions called <\/span><i><span style=\"font-weight: 400;\">Mask Contexts<\/span><\/i><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Inside IRI Workbench, Search Contexts are derived from <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\"><span style=\"font-weight: 400;\">Data Classes<\/span><\/a><span style=\"font-weight: 400;\"> that contain <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/data-matchers\/\"><span style=\"font-weight: 400;\">Data Matchers<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/location-matchers\/\"><span style=\"font-weight: 400;\">Location Matchers<\/span><\/a><span style=\"font-weight: 400;\">. Mask Contexts, in turn, are created from Masking Rules that are paired to Data Classes. Again, the consistent application of deterministic <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\"><span style=\"font-weight: 400;\">data masking function<\/span><\/a><span style=\"font-weight: 400;\"> rules will preserve data or referential integrity across all your target silos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Provided alongside the search and mask contexts are some additional contexts that provide instructions on where to read data from (FileSearchContext, NoSqlSearchContext, RdbSearchContext) and where to write masked data to (FileMaskContext, NoSqlMaskContext, RdbMaskContext).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By pairing search methods with masking functions you get more granular control for masking. For example, you can configure a DarkShield job to redact any credit card numbers that are found, but use a (consistent) pseudonym replacement for names wherever those are found.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-17232 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2020\/07\/IRI-Darkshield-v5-244x300.png\" alt=\"\" width=\"442\" height=\"544\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/IRI-Darkshield-v5-244x300.png 244w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/IRI-Darkshield-v5.png 768w\" sizes=\"(max-width: 442px) 100vw, 442px\" \/><\/p>\n<h5><b>Getting Started<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">You can license DarkShield as a standalone product, or in a bundle with IRI FieldShield or IRI CellShield EE in the <\/span><a href=\"https:\/\/www.iri.com\/products\/voracity\"><i><span style=\"font-weight: 400;\">IRI Voracity<\/span><\/i><\/a><span style=\"font-weight: 400;\"> data management platform. Licensing and pricing options are on <\/span><a href=\"https:\/\/www.iri.com\/products\/darkshield\/platforms-pricing\"><span style=\"font-weight: 400;\">this<\/span><\/a><span style=\"font-weight: 400;\"> page. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">IRI will send you download and installation instructions under your evaluation or licensing agreement. At installation time, you will need to register a provided version of the IRI CoSort engine, <\/span><i><span style=\"font-weight: 400;\">sortcl<\/span><\/i><span style=\"font-weight: 400;\">, to enable masking jobs. <img loading=\"lazy\" decoding=\"async\" class=\" wp-image-17234 alignright\" src=\"\/blog\/wp-content\/uploads\/2020\/07\/Darkshield-API-208x300.png\" alt=\"\" width=\"300\" height=\"433\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Darkshield-API-208x300.png 208w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Darkshield-API.png 234w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">The DarkShield API is run on a web server called Plankton, listening for requests. These HTTP(S) payloads can contain either instructions on how to find PII and mask it in the form of Search Contexts and Mask Contexts, or instructions on where to access and read data from and where to write the masked result.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DarkShield can be installed either as the backend engine (API) only, or with an installation of the IRI Workbench (GUI). To run any jobs, you must first start your DarkShield server <span id='easy-footnote-2-13851' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#easy-footnote-bottom-2-13851' title='\u00a0If you are running DarkShield from Workbench, open the DarkShield API configuration dialog in preferences and paste the local or remote folder location of the DarkShield API distribution (e.g., C:\\IRI\\DarkShield\\API\\plankton-1.5.1). Click the &lt;i&gt;Start Server button&lt;\/i&gt;, and then &lt;i&gt;Apply (and Close)&lt;\/i&gt;. You should see startup messages for the API server in the Workbench console window confirming the DarkShield API is configured correctly for use and management in Workbench.'><sup>2<\/sup><\/a><\/span> <\/span><span style=\"font-weight: 400;\">via the:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">shell or batch startup script in the DarkShield API distribution <\/span><i><span style=\"font-weight: 400;\">bin <\/span><\/i><span style=\"font-weight: 400;\">directory;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Workbench <\/span><i><span style=\"font-weight: 400;\">Window &gt; Preferences &gt; IRI &gt; DarkShield<\/span><\/i><span style=\"font-weight: 400;\"> properties dialog; <\/span><b>or<\/b><span style=\"font-weight: 400;\">,\u00a0\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DarkShield API Status view in your workspace.\u00a0\u00a0<\/span><\/li>\n<\/ol>\n<h5><span style=\"font-weight: 400;\"><br \/>\n<\/span><b>Connecting to Different Sources<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Whether calling them directly or using them from Workbench, DarkShield uses different API plugins to access and manipulate different source types, including (streaming) text (strings), standalone or embedded files\/documents\/images, NoSQL databases, and relational databases.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For file sources, DarkShield supports several different formats, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">.doc, .docx, .xls, xlsx, .ppt<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">.csv, .tsv, fixed-length<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">JSON and XML<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DICOM, JPG, PNG GIF, TIF<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Parquet<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">HL7v2 and X12<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">DarkShield can reach files stored on the local machine or LAN, and from IRI Workbench, DarkShield can also reach files stored in cloud sources such as Azure Blob Storage, Google Cloud Storage, S3 Buckets, OneDrive, and SharePoint Online.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read the articles on the <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-files-rpc-api\/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=darkshield-files-rpc-api\"><span style=\"font-weight: 400;\">DarkShield-Files plug-in<\/span><\/a><span style=\"font-weight: 400;\"> (RPC API for files) or the <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-pii-in-files-with-the-darkshield-files-wizard\/\"><span style=\"font-weight: 400;\">New File Search\/Masking Job \u2026 wizard<\/span><\/a><span style=\"font-weight: 400;\"> in IRI Workbench. You will learn how to find and mask the PII within many different file formats and silos all at once.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For NoSQL databases, the DarkShield NoSQL wizard currently supports these sources:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cassandra<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Elasticsearch<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">MongoDB<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Read the blog article on the <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-darkshield-nosql-rpc-api\/\"><span style=\"font-weight: 400;\">NoSQL plugin<\/span><\/a><span style=\"font-weight: 400;\"> or the <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-nosql-dbs-with-the-darkshield-gui\/\"><span style=\"font-weight: 400;\">NoSQL wizard<\/span><\/a><span style=\"font-weight: 400;\"> for DarkShield to learn more about setting up connections to those sources. It is also possible to use the DarkShield API with glue code to search and mask PII in at least 7 more NoSQL DBs; find the sample projects <\/span><a href=\"https:\/\/github.com\/TeamIRI\/darkshield-api-demos\"><span style=\"font-weight: 400;\">here<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For relational database sources, DarkShield will support any instance that can be accessed via a JDBC connection.<span id='easy-footnote-3-13851' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#easy-footnote-bottom-3-13851' title='\u00a0The JDBC driver(s) must be located in the API distribution \/lib subfolder, which happens automatically when running a DarkShield job.'><sup>3<\/sup><\/a><\/span><\/span><span style=\"font-weight: 400;\"> See the JDBC sections of <\/span><a href=\"https:\/\/www.iri.com\/services\/training\/courseware#db-connections\"><span style=\"font-weight: 400;\">these articles<\/span><\/a><span style=\"font-weight: 400;\"> for DB-specific connection advice, and the DarkShield <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-darkshield-rdb-rpc-api\/\"><span style=\"font-weight: 400;\">RDB plugin<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-pii-in-relational-databases-with-the-darkshield-rdb-wizard\/\"><span style=\"font-weight: 400;\">RDB wizard<\/span><\/a><span style=\"font-weight: 400;\"> article to learn about working with RDB sources.<\/span><\/p>\n<h5><b>Classifying PII<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Data classification refers to the act of defining and labeling specific types of data \u2013 like email addresses, ID numbers, and last names \u2013 into unique, abstract categories of data called Data Classes (or Data Class Groups), based on certain location attributes or data\/content traits.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">DarkShield requires that you classify data in IRI Workbench (usually just once) so that the data you\u2019re looking for can be found and masked. The Data Classification process begins when you create a project and elect to configure a Data Class and Rule Library (.dcrlib file).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This library is where the Data Classes you define \u2013 and the search methods and masking functions you assign to them \u2013 are held for (possibly <\/span><a href=\"https:\/\/www.iri.com\/blog\/iri\/iri-workbench\/sharing-iri-data-management-jobs-via-git\/\"><span style=\"font-weight: 400;\">shared<\/span><\/a><span style=\"font-weight: 400;\">) use in search and masking jobs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn more about the Data Classification process, please refer to this <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\"><span style=\"font-weight: 400;\">article<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h5><b>Applying Masking Functions<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">DarkShield applies masking functions through rules. Rules are created and stored for future use and modification in the Data Class and Rule Library, which resides in an IRI Project folder.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Rules can be paired to Data Classes when defining a DarkShield job in any of the DarkShield masking wizards. <\/span><span style=\"vertical-align: inherit;\">Masking Rules can support masking PII using <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">various techniques<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> such as:<\/span><\/span><\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">NSA Suite B and FIPS-compliant encryption and decryption algorithms, including format-preserving encryption<\/span><\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">MD5, SHA-1 and SHA-2 hashing<\/span><\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Deletion\/removal<\/span><\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Full or partial string <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/redact\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">editing<\/span><\/span><\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/pseudonymize\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Pseudonymization<\/span><\/span><\/span><\/a><\/li>\n<\/ol>\n<h5><b><br \/>\n<\/b><b><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Auditing jobs<\/span><\/span><\/b><\/h5>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">After running a search-only, search and mask, or mask-only job, DarkShield produces a number of artifacts for use in PII discovery, compliance auditing, and operational monitoring. <\/span><span style=\"vertical-align: inherit;\">Search and masking logs are produced in machine-readable delimited <span id='easy-footnote-4-13851' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#easy-footnote-bottom-4-13851' title='The delimited log file is for file-related search results only. JSON logs cover all sources plus masking.'><sup>4<\/sup><\/a><\/span> <\/span><\/span><\/span><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">and JSON formats suitable for reporting or exporting to analytic tools like <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/ftp9\/pdf\/DarkShield\/DelmitedDarkShieldSearchLogSample.pdf\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Excel<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/blog\/business-intelligence\/datadog-security-analytics-darkshield\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Datadog<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-splunk-es\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Splunk ES<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , and <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/splunk-phantom-playbook-masking\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Phantom<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> playbooks.<\/span><\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">DarkShield also produces interactive, aggregate dashboard charts to visualize and take action on without the use of a SIEM tool, like this \u201cheat map\u201d:<\/span><\/span><\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-17235 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2020\/07\/DS-Aggregrate-Result-300x208.png\" alt=\"\" width=\"470\" height=\"326\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/DS-Aggregrate-Result-300x208.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/DS-Aggregrate-Result.png 512w\" sizes=\"(max-width: 470px) 100vw, 470px\" \/><\/p>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">See <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\/darkshield-gui\/audit-logs\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">this article<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> for details on the HTML5 charts you can customize from IRI Workbench.<\/span><\/span><\/span><\/p>\n<h5><b><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Advanced Topics<\/span><\/span><\/b><\/h5>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Here are some additional articles related to DarkShield:<\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Video: <\/span><\/span><\/span><a href=\"https:\/\/www.youtube.com\/watch?v=FZtZ7dV5U24&amp;list=PL7nHBVSFkLEBsSYTQ_BLETXyUbB6Pe_2O&amp;index=4&amp;ab_channel=IRITheCoSortCo\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">PDF configuration options<\/span><\/span><\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/named-entity-recognition-ner-in-iri-darkshield\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Named Entity Recognition (NER)<\/span><\/span><\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">DarkShield Wizards<\/span><\/span><\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Files wizard <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-pii-in-files-with-the-darkshield-files-wizard\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">article<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> and <\/span><\/span><\/span><a href=\"https:\/\/www.youtube.com\/watch?v=-feeDkpalmw&amp;list=PL7nHBVSFkLEBsSYTQ_BLETXyUbB6Pe_2O&amp;ab_channel=IRITheCoSortCo\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">video<\/span><\/span><\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">NoSQL wizard <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-nosql-dbs-with-the-darkshield-gui\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">article<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> and <\/span><\/span><\/span><a href=\"https:\/\/www.youtube.com\/watch?v=-p6PzR0r-Cc&amp;list=PL7nHBVSFkLEBsSYTQ_BLETXyUbB6Pe_2O&amp;index=2&amp;ab_channel=IRITheCoSortCo\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">video<\/span><\/span><\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">RDB wizard <\/span><\/span><\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/finding-and-masking-pii-in-relational-databases-with-the-darkshield-rdb-wizard\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">article<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> and <\/span><\/span><\/span><a href=\"https:\/\/www.youtube.com\/watch?v=m4BI0UQbpzI&amp;list=PL7nHBVSFkLEBsSYTQ_BLETXyUbB6Pe_2O&amp;index=3&amp;ab_channel=IRITheCoSortCo\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">video<\/span><\/span><\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">DarkShield RPC API calls<\/span><\/span><\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-rpc-api\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Base API<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> (for text)<\/span><\/span><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-files-rpc-api\/?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=darkshield-files-rpc-api\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Files API<\/span><\/span><\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-darkshield-nosql-rpc-api\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">NoSQL API<\/span><\/span><\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"3\"><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-darkshield-rdb-rpc-api\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">RDB API<\/span><\/span><\/span><\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/load-balancing-authenticating-darkshield-via-nginx\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Load Balancing &amp; User Authentication<\/span><\/span><\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.iri.com\/blog\/test-data\/generating-test-data-in-pdf-and-images\/\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Putting Test Data in Images and PDFs<\/span><\/span><\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">In general, you can find resources like these at: <\/span><\/span><\/span><span style=\"vertical-align: inherit;\"><a href=\"https:\/\/www.iri.com\/services\/training\/courseware#iri-darkshield\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\">https:\/\/www.iri.com\/services\/training\/courseware#iri-darkshield<\/span><\/span><\/a><\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">If you have any questions about IRI DarkShield or other IRI data masking tools or are interested in a demonstration or free trial, please email <\/span><\/span><\/span><a href=\"mailto:info@iri.com\"><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">info@iri.com<\/span><\/span><\/span><\/a><span style=\"font-weight: 400;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> .<\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is DarkShield? IRI DarkShield is a data masking tool for classifying, searching, and de-identifying Personally Identifiable Information (PII) and other sensitive data in structured, semi-structured and unstructured sources. You can define and run DarkShield jobs via a GUI, CLI or API.\u00a0 DarkShield supports data on-premise or in the cloud. Sources include free-floating text ,<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/\" title=\"Introduction to IRI DarkShield\">Read More<\/a><\/div>\n","protected":false},"author":112,"featured_media":17240,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,91,29,2255],"tags":[1433,1081,14,546,1388,520,850,149],"class_list":["post-13851","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-iri-workbench","category-test-data","category-archived-articles","tag-dark-data-masking","tag-data-classification","tag-data-masking","tag-iri-cosort","tag-iri-darkshield","tag-iri-fieldshield","tag-iri-workbench","tag-pii"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introduction to IRI DarkShield - IRI<\/title>\n<meta name=\"description\" content=\"What is DarkShield? IRI DarkShield is a data masking tool for classifying, searching, and de-identifying Personally Identifiable Information (PII) and other sensitive data in structured, semi-structured and unstructured sources. You can define and run DarkShield jobs via a GUI, CLI or API.\u00a0DarkShield supports data on-premise or in the cloud. Sources include free-floating text , files and documents , various NoSQL DBs , and any relational database connected through a JDBC driver.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introduction to IRI DarkShield\" \/>\n<meta property=\"og:description\" content=\"What is DarkShield? IRI DarkShield is a data masking tool for classifying, searching, and de-identifying Personally Identifiable Information (PII) and other sensitive data in structured, semi-structured and unstructured sources. You can define and run DarkShield jobs via a GUI, CLI or API.\u00a0DarkShield supports data on-premise or in the cloud. Sources include free-floating text , files and documents , various NoSQL DBs , and any relational database connected through a JDBC driver.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-01T19:16:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-23T23:03:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"368\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dmitry Kulakov and Adam Lewis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dmitry Kulakov and Adam Lewis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/\"},\"author\":{\"name\":\"Dmitry Kulakov and Adam Lewis\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/6434d748d01ce766d6a2ff576d747cfb\"},\"headline\":\"Introduction to IRI DarkShield\",\"datePublished\":\"2020-07-01T19:16:56+00:00\",\"dateModified\":\"2026-02-23T23:03:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/\"},\"wordCount\":1451,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png\",\"keywords\":[\"dark data masking\",\"data classification\",\"data masking\",\"IRI CoSort\",\"IRI DarkShield\",\"IRI FieldShield\",\"IRI Workbench\",\"PII\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Workbench\",\"Test Data\",\"Archived Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/\",\"name\":\"Introduction to IRI DarkShield - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png\",\"datePublished\":\"2020-07-01T19:16:56+00:00\",\"dateModified\":\"2026-02-23T23:03:18+00:00\",\"description\":\"What is DarkShield? IRI DarkShield is a data masking tool for classifying, searching, and de-identifying Personally Identifiable Information (PII) and other sensitive data in structured, semi-structured and unstructured sources. You can define and run DarkShield jobs via a GUI, CLI or API.\u00a0DarkShield supports data on-premise or in the cloud. Sources include free-floating text , files and documents , various NoSQL DBs , and any relational database connected through a JDBC driver.\u00a0\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png\",\"width\":768,\"height\":368},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introduction to IRI DarkShield\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},[{\"@type\":[\"Person\"],\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/6434d748d01ce766d6a2ff576d747cfb\",\"name\":\"Dmitry Kulakov\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"inLanguage\":\"en_US\",\"url\":\"\",\"caption\":\"Dmitry Kulakov\"}},{\"@type\":[\"Person\"],\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/6434d748d01ce766d6a2ff576d747cfb\",\"name\":\"Adam Lewis\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"inLanguage\":\"en_US\",\"url\":\"\",\"caption\":\"Adam Lewis\"}}]]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Introduction to IRI DarkShield - IRI","description":"What is DarkShield? IRI DarkShield is a data masking tool for classifying, searching, and de-identifying Personally Identifiable Information (PII) and other sensitive data in structured, semi-structured and unstructured sources. You can define and run DarkShield jobs via a GUI, CLI or API.\u00a0DarkShield supports data on-premise or in the cloud. Sources include free-floating text , files and documents , various NoSQL DBs , and any relational database connected through a JDBC driver.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/","og_locale":"en_US","og_type":"article","og_title":"Introduction to IRI DarkShield","og_description":"What is DarkShield? IRI DarkShield is a data masking tool for classifying, searching, and de-identifying Personally Identifiable Information (PII) and other sensitive data in structured, semi-structured and unstructured sources. You can define and run DarkShield jobs via a GUI, CLI or API.\u00a0DarkShield supports data on-premise or in the cloud. Sources include free-floating text , files and documents , various NoSQL DBs , and any relational database connected through a JDBC driver.\u00a0","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/","og_site_name":"IRI","article_published_time":"2020-07-01T19:16:56+00:00","article_modified_time":"2026-02-23T23:03:18+00:00","og_image":[{"width":768,"height":368,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png","type":"image\/png"}],"author":"Dmitry Kulakov and Adam Lewis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dmitry Kulakov and Adam Lewis","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/"},"author":{"name":"Dmitry Kulakov and Adam Lewis","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/6434d748d01ce766d6a2ff576d747cfb"},"headline":"Introduction to IRI DarkShield","datePublished":"2020-07-01T19:16:56+00:00","dateModified":"2026-02-23T23:03:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/"},"wordCount":1451,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png","keywords":["dark data masking","data classification","data masking","IRI CoSort","IRI DarkShield","IRI FieldShield","IRI Workbench","PII"],"articleSection":["Data Masking\/Protection","IRI Workbench","Test Data","Archived Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/","name":"Introduction to IRI DarkShield - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png","datePublished":"2020-07-01T19:16:56+00:00","dateModified":"2026-02-23T23:03:18+00:00","description":"What is DarkShield? IRI DarkShield is a data masking tool for classifying, searching, and de-identifying Personally Identifiable Information (PII) and other sensitive data in structured, semi-structured and unstructured sources. You can define and run DarkShield jobs via a GUI, CLI or API.\u00a0DarkShield supports data on-premise or in the cloud. Sources include free-floating text , files and documents , various NoSQL DBs , and any relational database connected through a JDBC driver.\u00a0","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png","width":768,"height":368},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/darkshield-introduction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Introduction to IRI DarkShield"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},[{"@type":["Person"],"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/6434d748d01ce766d6a2ff576d747cfb","name":"Dmitry Kulakov","image":{"@type":"ImageObject","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","inLanguage":"en_US","url":"","caption":"Dmitry Kulakov"}},{"@type":["Person"],"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/6434d748d01ce766d6a2ff576d747cfb","name":"Adam Lewis","image":{"@type":"ImageObject","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","inLanguage":"en_US","url":"","caption":"Adam Lewis"}}]]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2020\/07\/Introduction-to-IRI-DarkShield.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13851"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=13851"}],"version-history":[{"count":23,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13851\/revisions"}],"predecessor-version":[{"id":17239,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/13851\/revisions\/17239"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/17240"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=13851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=13851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=13851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}