IRI Data Protector Suite


Next Steps
Overview IRI Voracity (Platform) IRI Data Manager (Suite) IRI Data Protector (Suite)

IRI Data Masking Tools in Annual Market Guides

Gartner logo| Read More

Award-Winning Data Masking Tools

Renowned data classification, PII discovery, and data masking tools in the IRI Data Protector suite and IRI Voracity data management platform will: catalog, find, and mask personally identifiable information (PII) and other "data at risk" in multiple sources. Each one will help you comply (and prove compliance) with the CCPA, CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, and SOC2 in the US, and international data privacy laws like the GDPR, KVKK, LGPD, LOPD, PDPA, PIPEDA and POPI. 

Co-located and compatible IRI tooling in Voracity, including IRI RowGen, can also synthesize test data from scratch, and produce referentially correct (and optionally masked) database subsets. 

IRI and its authorized partners around the world can help you implement fit-for-purpose data anonymization and compliant breach mitigation solutions using these technologies if you need help. For more information, link to the products and use cases below. Schedule a free online demonstration or an on-site evaluation here.

IRI Data Protector Suite Logo
IRI FieldShield BannerIRI FieldShield Logo

Structured Data Masking

FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in relational DBS, flat files, ASN.1 CDRs, and Excel.

Learn More
IRI RowGen BannerIRI DarkShield Logo

Structured, Semi- & Unstructured Data Masking

DarkShield classifies, finds, and deletes PII in RDBs and flat files, too, plus: free text, JSON, XML, HL7/X12, Parquet and log files; MS Office (Word, Excel and Powerpoint) and PDF documents, NoSQL DBs, as well as DICOM and other image formats.

Learn More
IRI CellShield BannerIRI CellShield Logo

Excel® Data Masking

CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in Office 365.

Learn More
Database BannerIRI DMaaS Logo

Data Masking as a Service

IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you.

Learn More

Learn More

Compare the capabilities of IRI's award-winning data masking tools with this matrix, and peruse IRI's proven test data solutions here. Dive deeper with the slide deck and our article on startpoint security below.

Data Protector Suite Overview

Data Protector Suite PDF Cover

Secure Data at its Startpoints

Cybersecurity Sourcebook

IRI Defines Startpoint Security | Outlook Series Listen Now

Test Data Synthesis

IRI RowGen logo

Use the proven IRI data masking tools above, the IRI RowGen test data synthesis package, or the IRI Voracity data management platform which includes them all, to: subset, create, or virtualize safe, intelligent test data in DB, file, API, and report targets for ETL prototypes, DevOps, benchmarking, etc.

Learn More

Use Cases

The IRI Data Protector suite's constituent products address:

These data masking tools and data-centric security solutions are also critical complements to device and perimeter (network) security solutions which cannot address insider attacks.

Licensing costs for the masking tools typically depend how many hostname executables, you need. See this FAQ on pricing.

Voracity schematic Voracity Data Quality Features
Share this page

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.