{"id":6237,"date":"2014-08-12T10:38:10","date_gmt":"2014-08-12T14:38:10","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=6237"},"modified":"2020-07-27T13:56:11","modified_gmt":"2020-07-27T17:56:11","slug":"encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/","title":{"rendered":"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video]"},"content":{"rendered":"<p><em>This is the third in a four-part series describing\u00a0<a title=\"CellShield Product Page\" href=\"http:\/\/www.iri.com\/products\/cellshield\" target=\"_blank\" rel=\"noopener\">IRI CellShield<\/a>\u00a0data masking software for Excel, and its format-preserving encryption function in particular; the series overview starts\u00a0<a title=\"IRI CellShield Secures Sensitive Data in Excel Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/\" target=\"_blank\" rel=\"noopener\">here<\/a>. Other articles in the series demonstrate how to use CellShield&#8217;s\u00a0<a title=\"CellShield Masks Sensitive Data in Your Excel Spreadsheets Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/protect-sensitive-data-excel-spreadsheets-cellshield\/\" target=\"_blank\" rel=\"noopener\">redaction and<\/a>\u00a0<a title=\"Pseudonymize Your Sensitive Excel Data with CellShield Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\" target=\"_blank\" rel=\"noopener\">pseudonymization\u00a0<\/a>functions. If you&#8217;re interested in finding, classifying, or masking PII in <strong>databases<\/strong><strong>\u00a0or flat files<\/strong>, look into\u00a0<a href=\"https:\/\/www.iri.com\/products\/fieldshield\">IRI FieldShield<\/a>. For <strong>unstructured<\/strong> text, document, or image files, examine\u00a0<a href=\"https:\/\/www.iri.com\/products\/darkshield\">IRI DarkShield<\/a>.<\/em><\/p>\n<p>IRI CellShield secures personally identifiable information (PII) in spreadsheets. CellShield is offered in two product formats: an inexpensive Personal Edition (<a href=\"https:\/\/www.iri.com\/products\/cellshield\/cellshield-addin\">PE<\/a>) add-in, or an Enterprise Edition (<a href=\"https:\/\/www.iri.com\/products\/cellshield\/cellshield-ee\">EE<\/a>) for LAN-wide PII classification and discovery, automatic multi-sheet data masking, and audit logging. Both versions perform\u00a0full or partial\u00a0redaction, encryption (including format-preserving) and decryption, and pseudonymization:<\/p>\n<div style=\"display: inline-block; float: left; margin: 1% 3% 1% 3%;\"><iframe loading=\"lazy\" width=\"200\" height=\"113\" src=\"https:\/\/www.youtube.com\/embed\/gH2kLu3wlIc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n<p>Users can select a range of cells to protect, and then click the function they want to apply. CellShield offers an easy-to-use interface, and it does its work quickly &#8211; even on very large data sets.<\/p>\n<p>For encryption purposes, the user establishes an appropriate passphrase to protect each applicable data set. CellShield will decrypt the protected content when the correct passphrase is entered. This allows only specific users to see the protected information, but allows others to work in the same spreadsheet without having access to that same information.<\/p>\n<p>The example below demonstrates how easy it is to use CellShield\u2019s &#8216;Encrypt &amp; Decrypt&#8217; feature to protect social security numbers in Excel. (Note: All information used in this example is fictional.)<\/p>\n<p>1. Open the sheet containing the data you want CellShield to encrypt. Note that only some of the encryption <a href=\"http:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/encryption\/algorithms\">routines<\/a> available in <a title=\"IRI FieldShield\" href=\"http:\/\/www.iri.com\/products\/fieldshield\" target=\"_blank\" rel=\"noopener\">IRI FieldShield<\/a>, including <a href=\"http:\/\/www.iri.com\/blog\/data-protection\/fieldshield-offers-format-preserving-encryption-fpe\/\" target=\"_blank\" rel=\"noopener\">format-preserving encryption<\/a>, are supported in CellShield.<\/p>\n<p>2. Select the range of cells to encrypt.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/preEncryptedData.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6973 size-full\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/preEncryptedData.png\" alt=\"preEncryptedData\" width=\"472\" height=\"658\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/preEncryptedData.png 472w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/preEncryptedData-215x300.png 215w\" sizes=\"(max-width: 472px) 100vw, 472px\" \/><\/a><br \/>\n3. Click on the CellShield tab in the Excel ribbon.<br \/>\n4. Click the &#8216;Encrypt &amp; Decrypt&#8217; button on the CellShield menu; then select &#8216;Encrypt&#8217; from the drop-down list.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/data_buttons.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6225\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/10\/data_buttons.jpg\" alt=\"data_buttons\" width=\"184\" height=\"87\" \/><\/a><\/p>\n<p>5. Fill in all required information on the user form that pops up for &#8216;Data Encryption&#8217; (passphrase is optional).<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6975 size-full\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png\" alt=\"DataEncryptAlpha\" width=\"462\" height=\"677\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png 462w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha-205x300.png 205w\" sizes=\"(max-width: 462px) 100vw, 462px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>6. Then click the &#8216;Encrypt&#8217; button on the form to populate the results in the desired location (either into a new spreadsheet or within the selected range).<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/AfterEncryptAlpha.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6974\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/AfterEncryptAlpha.png\" alt=\"AfterEncryptAlpha\" width=\"464\" height=\"685\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/AfterEncryptAlpha.png 464w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/AfterEncryptAlpha-203x300.png 203w\" sizes=\"(max-width: 464px) 100vw, 464px\" \/><\/a><\/p>\n<p>In this case, the selected range was encrypted with a format-preserving encryption routine so that the cell values appear to be credit card numbers, but are protected. The original values can be restored only with the corresponding decryption routine and passphrase (encryption key) in <a href=\"http:\/\/www.iri.com\/products\/cellshield\" target=\"_blank\" rel=\"noopener\">IRI CellShield<\/a> or <a href=\"http:\/\/www.iri.com\" target=\"_blank\" rel=\"noopener\">IRI FieldShield<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>UPDATE: In CellShield version 2.0, encryption (excluding format-preserving encryption) of non-ASCII UTF-8 characters is possible. For example, it is now possible to take this:<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/cap1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13810\" src=\"\/blog\/wp-content\/uploads\/2014\/08\/cap1-300x72.png\" alt=\"\" width=\"558\" height=\"134\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/cap1-300x72.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/cap1.png 614w\" sizes=\"(max-width: 558px) 100vw, 558px\" \/><\/a><\/p>\n<p>into this:<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/Cap2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13811\" src=\"\/blog\/wp-content\/uploads\/2014\/08\/Cap2-300x52.png\" alt=\"\" width=\"611\" height=\"106\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/Cap2-300x52.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/Cap2.png 693w\" sizes=\"(max-width: 611px) 100vw, 611px\" \/><\/a><\/p>\n<p>and back to the original text:<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/result.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13812\" src=\"\/blog\/wp-content\/uploads\/2014\/08\/result-241x300.png\" alt=\"\" width=\"499\" height=\"621\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/result-241x300.png 241w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/result.png 689w\" sizes=\"(max-width: 499px) 100vw, 499px\" \/><\/a><\/p>\n<p>Additionally, encryption and decryption of formulas is available in CellShield version 2.0.<\/p>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/fprotect2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13942\" src=\"\/blog\/wp-content\/uploads\/2014\/08\/fprotect2-300x217.png\" alt=\"Formula Encryption and Decryption\" width=\"535\" height=\"387\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/fprotect2-300x217.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/fprotect2-768x554.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/fprotect2.png 798w\" sizes=\"(max-width: 535px) 100vw, 535px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Read this <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/cellshield-version-2\/\">article<\/a> for more information on what is new in CellShield 2.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is the third in a four-part series describing\u00a0IRI CellShield\u00a0data masking software for Excel, and its format-preserving encryption function in particular; the series overview starts\u00a0here. Other articles in the series demonstrate how to use CellShield&#8217;s\u00a0redaction and\u00a0pseudonymization\u00a0functions. If you&#8217;re interested in finding, classifying, or masking PII in databases\u00a0or flat files, look into\u00a0IRI FieldShield. For unstructured text,<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\" title=\"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video]\">Read More<\/a><\/div>\n","protected":false},"author":32,"featured_media":6975,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,29,1030],"tags":[14,203,645,644,596,22,642,643,152,620],"class_list":["post-6237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-test-data","category-vlog","tag-data-masking","tag-encryption","tag-excel-add-in","tag-excel-spreadsheet","tag-iri-cellshield","tag-pseudonymization","tag-pseudonymize","tag-restore","tag-sensitive-data","tag-xls"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video] - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video]\" \/>\n<meta property=\"og:description\" content=\"This is the third in a four-part series describing\u00a0IRI CellShield\u00a0data masking software for Excel, and its format-preserving encryption function in particular; the series overview starts\u00a0here. Other articles in the series demonstrate how to use CellShield&#8217;s\u00a0redaction and\u00a0pseudonymization\u00a0functions. If you&#8217;re interested in finding, classifying, or masking PII in databases\u00a0or flat files, look into\u00a0IRI FieldShield. For unstructured text,Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2014-08-12T14:38:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-27T17:56:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png\" \/>\n\t<meta property=\"og:image:width\" content=\"462\" \/>\n\t<meta property=\"og:image:height\" content=\"677\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jackie Sabbagh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jackie Sabbagh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\"},\"author\":{\"name\":\"Jackie Sabbagh\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/a77b509c111f25f8888fe7bd0c73fa9e\"},\"headline\":\"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video]\",\"datePublished\":\"2014-08-12T14:38:10+00:00\",\"dateModified\":\"2020-07-27T17:56:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\"},\"wordCount\":487,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png\",\"keywords\":[\"data masking\",\"encryption\",\"Excel add-in\",\"Excel spreadsheet\",\"IRI CellShield\",\"pseudonymization\",\"pseudonymize\",\"restore\",\"sensitive data\",\"xls\"],\"articleSection\":[\"Data Masking\/Protection\",\"Test Data\",\"VLOG\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\",\"name\":\"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video] - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png\",\"datePublished\":\"2014-08-12T14:38:10+00:00\",\"dateModified\":\"2020-07-27T17:56:11+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png\",\"width\":462,\"height\":677},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/a77b509c111f25f8888fe7bd0c73fa9e\",\"name\":\"Jackie Sabbagh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e8797c735e92e5e8a11c74ddeb2c919b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e8797c735e92e5e8a11c74ddeb2c919b?s=96&d=blank&r=g\",\"caption\":\"Jackie Sabbagh\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/jackies\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video] - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/","og_locale":"en_US","og_type":"article","og_title":"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video]","og_description":"This is the third in a four-part series describing\u00a0IRI CellShield\u00a0data masking software for Excel, and its format-preserving encryption function in particular; the series overview starts\u00a0here. Other articles in the series demonstrate how to use CellShield&#8217;s\u00a0redaction and\u00a0pseudonymization\u00a0functions. If you&#8217;re interested in finding, classifying, or masking PII in databases\u00a0or flat files, look into\u00a0IRI FieldShield. For unstructured text,Read More","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/","og_site_name":"IRI","article_published_time":"2014-08-12T14:38:10+00:00","article_modified_time":"2020-07-27T17:56:11+00:00","og_image":[{"width":462,"height":677,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png","type":"image\/png"}],"author":"Jackie Sabbagh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jackie Sabbagh","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/"},"author":{"name":"Jackie Sabbagh","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/a77b509c111f25f8888fe7bd0c73fa9e"},"headline":"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video]","datePublished":"2014-08-12T14:38:10+00:00","dateModified":"2020-07-27T17:56:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/"},"wordCount":487,"commentCount":2,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png","keywords":["data masking","encryption","Excel add-in","Excel spreadsheet","IRI CellShield","pseudonymization","pseudonymize","restore","sensitive data","xls"],"articleSection":["Data Masking\/Protection","Test Data","VLOG"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/","name":"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video] - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png","datePublished":"2014-08-12T14:38:10+00:00","dateModified":"2020-07-27T17:56:11+00:00","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png","width":462,"height":677},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Encrypt \/ Decrypt Sensitive Data in Excel Spreadsheets Using CellShield [video]"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/a77b509c111f25f8888fe7bd0c73fa9e","name":"Jackie Sabbagh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e8797c735e92e5e8a11c74ddeb2c919b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e8797c735e92e5e8a11c74ddeb2c919b?s=96&d=blank&r=g","caption":"Jackie Sabbagh"},"url":"https:\/\/www.iri.com\/blog\/author\/jackies\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2014\/08\/DataEncryptAlpha.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/6237"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=6237"}],"version-history":[{"count":49,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/6237\/revisions"}],"predecessor-version":[{"id":13998,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/6237\/revisions\/13998"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/6975"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=6237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=6237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=6237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}