{"id":9554,"date":"2010-01-01T00:00:41","date_gmt":"2010-01-01T05:00:41","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=9554"},"modified":"2026-01-09T16:00:26","modified_gmt":"2026-01-09T21:00:26","slug":"fieldshield-data-masking-software-demonstration","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/","title":{"rendered":"FieldShield Data Masking Software Demonstration [video]"},"content":{"rendered":"<p><a href=\"https:\/\/www.iri.com\/products\/fieldshield\">IRI FieldShield<\/a> is a proven, best-in-class data-centric security package for classifying, finding, and masking personally identifying information (PII) and other sensitive data in database columns and flat-file fields. FieldShield &#8220;shields fields&#8221; with the industry&#8217;s largest array of <a href=\"https:\/\/www.ir.com\/solutions\/data-masking\">data masking functions<\/a>, including of course encryption, pseudonymization, and redaction, and many other reversible and non-reversible de-identification functions that you choose according to your business rules.<\/p>\n<p>FieldShield static (and dynamic) data masking technology is used in multiple industries and use cases, including data breach prevention and nullification, to data privacy law compliance (e.g., HIPAA and GDPR), to test data provisioning. Its masking functions are also folded into the <a href=\"https:\/\/www.iri.com\/products\/voracity\">IRI Voracity<\/a> data management platform operations, to seamlessly combine data masking with ETL, reorg\/load, DB\/data migration, DB subsetting, reporting, and wrangling\/analytic operations.<\/p>\n<p>This video snippet below was recorded in early 2019 and shows only a\u00a0<em>very limited <\/em>view of the\u00a0FieldShield static data masking front-end in the free<a href=\"https:\/\/www.iri.com\/products\/workbench\"> IRI Workbench<\/a> job design and deployment GUI, built on Eclipse. It shows some simple ad hoc masking functions applied to a single Oracle table. The video <strong>does not show<\/strong> FieldShield&#8217;s capabilities in data classification or discovery, multi-table or file masking, re-ID risk determination, or job auditing. Newer features (like the DB data class data masking wizard) available in the Eclipse SimRel version are also not shown. See the latest and get questions about your use case answered by registering for a <a href=\"https:\/\/www.iri.com\/products\/go\/live-demo\">live-demo<\/a>.<\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/rQqQVzd2jug\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IRI FieldShield is a proven, best-in-class data-centric security package for classifying, finding, and masking personally identifying information (PII) and other sensitive data in database columns and flat-file fields. FieldShield &#8220;shields fields&#8221; with the industry&#8217;s largest array of data masking functions, including of course encryption, pseudonymization, and redaction, and many other reversible and non-reversible de-identification functions<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/\" title=\"FieldShield Data Masking Software Demonstration [video]\">Read More<\/a><\/div>\n","protected":false},"author":9,"featured_media":11755,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,1030,2255],"tags":[],"class_list":["post-9554","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-vlog","category-archived-articles"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>FieldShield Data Masking Software Demonstration [video] - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"FieldShield Data Masking Software Demonstration [video]\" \/>\n<meta property=\"og:description\" content=\"IRI FieldShield is a proven, best-in-class data-centric security package for classifying, finding, and masking personally identifying information (PII) and other sensitive data in database columns and flat-file fields. FieldShield &#8220;shields fields&#8221; with the industry&#8217;s largest array of data masking functions, including of course encryption, pseudonymization, and redaction, and many other reversible and non-reversible de-identification functionsRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2010-01-01T05:00:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-09T21:00:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"860\" \/>\n\t<meta property=\"og:image:height\" content=\"461\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Rob Howard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob Howard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/\"},\"author\":{\"name\":\"Rob Howard\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/2b9e439554aaae94b5d95f2a60960b24\"},\"headline\":\"FieldShield Data Masking Software Demonstration [video]\",\"datePublished\":\"2010-01-01T05:00:41+00:00\",\"dateModified\":\"2026-01-09T21:00:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/\"},\"wordCount\":246,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png\",\"articleSection\":[\"Data Masking\/Protection\",\"VLOG\",\"Archived Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/\",\"name\":\"FieldShield Data Masking Software Demonstration [video] - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png\",\"datePublished\":\"2010-01-01T05:00:41+00:00\",\"dateModified\":\"2026-01-09T21:00:26+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png\",\"width\":860,\"height\":461},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"FieldShield Data Masking Software Demonstration [video]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/2b9e439554aaae94b5d95f2a60960b24\",\"name\":\"Rob Howard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ecbf077139a1916a46ef758d91956312?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ecbf077139a1916a46ef758d91956312?s=96&d=blank&r=g\",\"caption\":\"Rob Howard\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/robh\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"FieldShield Data Masking Software Demonstration [video] - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/","og_locale":"en_US","og_type":"article","og_title":"FieldShield Data Masking Software Demonstration [video]","og_description":"IRI FieldShield is a proven, best-in-class data-centric security package for classifying, finding, and masking personally identifying information (PII) and other sensitive data in database columns and flat-file fields. FieldShield &#8220;shields fields&#8221; with the industry&#8217;s largest array of data masking functions, including of course encryption, pseudonymization, and redaction, and many other reversible and non-reversible de-identification functionsRead More","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/","og_site_name":"IRI","article_published_time":"2010-01-01T05:00:41+00:00","article_modified_time":"2026-01-09T21:00:26+00:00","og_image":[{"width":860,"height":461,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png","type":"image\/png"}],"author":"Rob Howard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rob Howard","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/"},"author":{"name":"Rob Howard","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/2b9e439554aaae94b5d95f2a60960b24"},"headline":"FieldShield Data Masking Software Demonstration [video]","datePublished":"2010-01-01T05:00:41+00:00","dateModified":"2026-01-09T21:00:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/"},"wordCount":246,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png","articleSection":["Data Masking\/Protection","VLOG","Archived Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/","name":"FieldShield Data Masking Software Demonstration [video] - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png","datePublished":"2010-01-01T05:00:41+00:00","dateModified":"2026-01-09T21:00:26+00:00","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png","width":860,"height":461},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/fieldshield-data-masking-software-demonstration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"FieldShield Data Masking Software Demonstration [video]"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/2b9e439554aaae94b5d95f2a60960b24","name":"Rob Howard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ecbf077139a1916a46ef758d91956312?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ecbf077139a1916a46ef758d91956312?s=96&d=blank&r=g","caption":"Rob Howard"},"url":"https:\/\/www.iri.com\/blog\/author\/robh\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2010\/01\/fieldshield-data-masking-demo.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9554"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=9554"}],"version-history":[{"count":14,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9554\/revisions"}],"predecessor-version":[{"id":12887,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9554\/revisions\/12887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/11755"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=9554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=9554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=9554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}