Award-Winning Data Masking Tools
Renowned data classification, PII discovery, and data masking tools in the IRI Data Protector suite and IRI Voracity data management platform will: catalog, find, and mask personally identifiable information (PII) and other "data at risk" in multiple sources. Each one will help you comply (and prove compliance) with the CCPA, CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, and SOC2 in the US, and international data privacy laws like the GDPR, KVKK, LGPD, LOPD, PDPA, PIPEDA and POPI.
Co-located and compatible IRI tooling in Voracity, including IRI RowGen, can also synthesize test data from scratch, and produce referentially correct (and optionally masked) database subsets.
IRI and its authorized partners around the world can help you implement fit-for-purpose data anonymization and compliant breach mitigation solutions using these technologies if you need help. For more information, link to the products and use cases below. Schedule a free online demonstration or an on-site evaluation here.
Structured Data Masking
FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc.Learn More
Structured, Semi- & Unstructured Data Masking
DarkShield classifies, finds, and deletes PII in RDBs and flat files PLUS text, pdf, Parquet, C/BLOBs, MS Office documents, logs, NoSQL DBs, and images.Learn More
Excel® Data Masking
CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in Office 365.Learn More
Data Masking as a Service
IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you.Learn More
Compare the capabilities of IRI's award-winning data masking tools with this matrix, and peruse IRI's proven test data solutions here. Dive deeper with the slide deck and our article on startpoint security below.
IRI Defines Startpoint Security | Outlook Series Listen Now
Test Data Synthesis
Use the proven IRI data masking (*shield) tools above, the IRI RowGen data synthesis package, or the IRI Voracity platform, to: subset, create, or virtualize safe, intelligent test data in DB, file, API, and report targets for ETL prototypes, DevOps, benchmarking, etc.Learn More
The IRI Data Protector suite's constituent products address:
- Data Discovery and Classification for data security, quality/MDM, etc.
- Data Governance, Risk Management, and Compliance (GRC) initiatives
- Data Loss Prevention (DLP) and De-ID for HIPAA- and GDPR-covered entities
- Re-ID risk scoring and PHI blurring for Expert Determination Method compliance
- Static Data Masking (SDM) and Dynamic Data Masking (DDM) applications
- Encryption, hashing, and tokenization of PANs for PCI DSS
- Prototyping DB/ETL operations, DevOps and high volume data stress-testing
These data-centric security solutions are also critical complements to device and perimeter (network) security solutions which cannot address insider misuse. Licensing costs depend on which tools, and how many hostname or DB instance licenses, you need.