Why DarkShield Is Better

 

Next Steps
DarkShield Overview Features & Benefits Technical Details Why It's Better Platforms & Pricing Resources

Why is IRI DarkShield the best choice for protecting personally identifiable information (PII) hidden in unstructured sources? Click through these nine reasons for the detail, and peruse the other pages in this section to learn more.


Capability
Coverage
Capacity
Compliance
Compatibility
Collaboration
Comfort
Cost
Credibility
X

Capability

DarkShield provides a unique form of content-aware DLP through the simultaneous searching and masking of PII in a wide range of data sources and formats. In addition to the rich dark data discovery wizard, DarkShield shares data classes with, and its users can leverage other discovery wizards for, PII in structured (flat) files and databases, too. If you use DarkShield through your IRI Voracity platform subscription, you also have access to IRI FieldShield and IRI CellShield EE, too, plus an extensive range of data management functions like data integration, cleansing, conversion, reporting, and more.

In terms of just masking functions, DarkShield provides a uniquely wide range for unstructured files, as well as NoSQL DBs like MongoDB and Cassandra, and facial images. For PII in unstructured text and document files in particular, you can use functions in seven different data masking categories, ranging from encryption and pseudonymization to hashing and redaction, to math and string logic.

Runtime capability, for both searching and masking operations, is not only a question of separate or together, but where. You can launch DarkShield jobs from IRI Workbench (Eclipse IDE), or from your own application through an available CLI.

Coverage

Consider the ever-growing range of supported file formats for search and masking operations with DarkShield, as well as the possibility of searching and masking data in a number of cloud, NoSQL DB and application environments on request. See the technical details page for the current list of supported data formats and sources.


Capacity

DarkShield performance scales linearly in volume and does not require Hadoop, elastic computing, or very large memory architectures to power through multiple documents. DarkShield natively exploits multiple search threads, state-of-the-art machine learning algorithms, streaming data, and task consolidation to maximize the definition and speed of complex, high-volume data discovery and de-identification operations. 


Compliance

DarkShield uses encryption algorithms that comply with NSA, FIPS, etc., and its wide range of masking functions supports key de-identification requirements of HIPAA HITECH, GPDR (including the right to erasure through search and delete, plus data portability and rectification through value location and extraction), plus many other US and international data privacy laws.

DarkShield data masking and obfuscation functions are either difficult, or impossible, to reverse. They can also be applied differentially; i.e., you can apply a function to a class of data on a global basis, or more narrowly to address specific subsets or even individual values; your choice. All these options further enhance security by creating more obstacles to revealing all the sensitive data with a single crack.

DarkShield jobs, data definitions, audit files, and related assets all run on premise so your data does not require a third-party API or cloud service to be masked. That said, DarkShield can still operate on data in the cloud where resident on those systems or when data like DropBox are locally mounted, or through custom adapters on request. You can also (easily) share DarkShield projects and metadata assets in the cloud (if you want to) through a distributed metadata management hub compliant with SSH security layers like Git.


Compatibility

DarkShield uses the same data classes, search methods and masking functions as FieldShield and CellShield EE, and runs on all Windows, Linux, or MacOS systems on premise or in the cloud.


Collaboration

DarkShield developers work with, or otherwise follow the advice of, top security consultants, industry analysts, and enterprise CISOs or compliance officers, in both feature development and custom solution implementations.


Comfort

DarkShield is built on, and works within, Eclipse, the proven, extensible IDE already familiar to millions of users worldwide. It is an easy product to get started with, and use long-term. It also requires no external components.

What makes DarkShield even easier however are its intuitive dialogs for data classification, job configuration wizards, and metadata infrastructure ... providing convenient and easy-to-learn ways to classify and find your PII, and then run and modify the masking functions on it.

And thanks to this data class infrastructure, the nature of masking in DarkShield becomes content-agnostic. This means you do not have to think about the formats of the files, only your data classes and masking rules.


Cost

DarkShield is available standalone at the industry's lowest pricing (IRI is deliberately not a megavendor), or included free with subscriptions to the IRI Voracity data management platform.


Credibility

DarkShield is developed, licensed and supported by IRI, The CoSort Company, an American ISV renown for high performance data manipulation since 1978. Profitable since inception and partnered with leading data security and compliance VARs, system integrators and consultants worldwide like CapGemini, FortifyData, GDPRTech, HIPAAOne, and SecureIT Labs. In this way, IRI and its authorized representatives, continue to provide the confidence and personalized service you need to succeed.


Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.