IRI FieldShield is a robust, startpoint data security and privacy law compliance package that finds, classifies, and shields personally identifiable information (PII) in multiple database tables and file formats with one or more data masking functions.
FieldShield is also a deterministic, content-aware data loss prevention tool because it lets you apply the specific protections you need to only those columns that need protecting. It also scores the risk of re-identification from quasi-identifiers.
Click on the technical attributes of FieldShield below to learn more:
According to Gartner's data masking analysts, only about half of enterprises with sensitive data at rest know where it is. Included cross-platform DB and file profiling tools in FieldShield find, classify, and diagram PII based on pattern, value-lookup, and fuzzy search matches.
FieldShield users can apply the same or different functions to any number of columns in any number of sources, simultaneously. FieldShield delivers data-centric protection in 13 different functional categories.
- multiple, NSA suite B and FIPS-compliant encryption and decryption algorithms, including format-preserving encryption
- SHA-1 and SHA-2 hashing
- ASCII de-ID (big scrambling)
- binary encoding
- data blurring and generalization (anonymization)
- redaction (string masking)
- reversible and non-reversible pseudonymization
- expression (calculation / shuffle) logic
- conditional / partial filtering (omission)
- custom value replacement and type/format conversion
- byte shifting and sub-string functions
- tokenization (for PCI)
The shield you choose for each field depends on your need for security, reversibility, appearance, and speed. In addition to the built-in functions, you can also write and call your own field functions at runtime.
Field-level protections are safer because even if there is a breach based on access to a given column decryption key, the other columns may still have their own protection applied. Contrast that to a single password opening access to everything in the database, table, file, or volume.
FieldShield also uses state-of-the-art encryption algorithms that are difficult to crack. You can strengthen encryption with random tokenization, hashing, and secure, changing encryption keys. The data obfuscation techniques in FieldShieldcan also forever (irreversibly) redact original values. A non-reversible method like data masking or filtering removes any computational basis for deriving the original value.
Field-level protection is inherently efficient; i.e., you apply protections surgically to selected rows and columns rather than in bulk. Where the data are large, FieldShield uses the advanced data movement algorithms and resource exploitation techniques for which its parent IRI CoSort (big data transformation and reporting) product is famous.
You can also combine FieldShield with IRI FACT (Fast Extract) to unload very large database (VLDB) tables into flat files for faster protection operations. If you use the parent CoSortSortCL program, you can run the same protections during data transformation, cleansing, mapping, and pre-load sorting jobs that feed BI and DB targets.
And if you use FieldShield in the Voracity platform equipped with the premium VGrid(Voracity gateway) option for Hadoop, you can run many of the same data masking jobs interchangeably in MapReduce2, Spark, Spark Stream, Storm or Tez.
FieldShield includes automated, peer-reviewed statistical analysis and graphical scoring of re-identification risk to support compliance with FERPA and the HIPAA Expert Determination Method security rule.
The PII discovery processes in FieldShield can be used not only to classify data, but also to create a record of where it was found, and to extract search results into formats you can use to deliver that data to requesters in compliance with GDPR data portability provisions.
FieldShield provides an audit trail in query-ready XML files for every masking job. Those logs record all the scripted metadata for the source data and target data and masking functions, plus salient runtime environment for user accountability.
Finally, FieldShield provides for real time security through multiple methods, including: role-based access controls, robust encryption key management, direct support for SQL SELECT and UPDATE logic, and masking routines called into your applications.
Ease of Use
Column encryption from database vendors is cumbersome and limited to their platform or a few functions. Other data masking tools on the market are clunky, and job design and modification in them are difficult. Preserving referential integrity with them has also been an issue.
Static Data Masking jobs in FieldShield, on the other hand, are defined in self-documenting 4GL scripts that clearly identify source field layouts and target field protections and formats. The scripts are easy to modify and share securely with developers and end-users of FieldShieldwho need to mask or unmask data.
FieldShield scripting and language learning, however, are not required! With the free IRI Workbench GUI for FieldShieldbuilt on Eclipse™, you get a familiar, graphical IDE with:
- single- and multi-source data masking job creation wizards
- automated PII discovery, classification, and metadata definition
- re-ID risk scoring for HIPAA Expert Determination Method compliance
- master data definition and protection
- automatic masking rule application across semantically-matched column names or data classes
- project management (teaming) and version control
- encryption key management
- XML job audit logs for verifying privacy law compliance
FieldShield jobs launch from and run anywhere you need them to. Choose from ad hoc or scheduled execution from IRI Workbench, on a Unix/Linux/Windows command line, or from any application or automation tool you prefer.
Programmers find FieldShield easy to use for dynamic data masking because the SDK IRI publishes for C/C++, Java, and .NET developers is relatively short and simple.
FieldShieldusers enjoy immediate metadata links, job scripting compatibility, and graphical integration with the re-ID risk scoring, data transformation (integration and staging), test data generation, reporting, and advanced BI functionality in the IRI Workbench GUI for IRI Voracity, the "total data management" platform. Upgrading to Voracity and its default, FieldShield-compatible SortCL program allows you to add data masking to the same job script and I/O pass with multiple data manipulations.
FieldShieldand other IRI tools' data definition file (.ddf) metadata is also supported by Erwin (AnalytiX DS) Mapping Manager and the Meta Integration Model Bridge (MIMB). These tools convert metadata already defined in third-party BI, CRM, DB, ETL, and data modeling tools into FieldShield DDF... making it easier for you to protect data in your current environment.
FieldShield functionality has been on the market since 2007 and is supported in standalone or callable modes by IRI directly, its authorized representatives in major cities around the world, and third-party cyber security consulting partners. These experts are all vested in your success and are committed to rapid, responsive help on your use cases or trouble tickets with or without formal SLAs.
Expect the same level of support years into your use of the product that you received during your evaluation and proof of concept phases as your needs change. We are happy to provide you with references who will speak to their experiences with IRI data masking technology and support.