IRI Data Protector Suite


Next Steps
Overview IRI Voracity (Platform) IRI Data Manager (Suite) IRI Data Protector (Suite)

IRI Data Masking Software in 2018 Market Guide

Gartner logo | Read More

Award-Winning Data-Centric Security

Renowned software products in the IRI Data Protector suite or IRI Voracity data management platform will: classify, find, and protect personally identifiable information (PII) and other "data at risk" in multiple sources. Each one will help you comply (and prove compliance) with the CCPA, CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, and SOC2 in the US, and international data privacy laws like the GDPR, KVKK, LGPD, LOPD, PDPA, PIPEDA and POPI. 

IRI and its authorized partners around the world can help you implement fit-for-purpose compliance and breach mitigation solutions using these technologies if you need help. For more information, link to the products and use cases below. Schedule a free online demonstration or an on-site evaluation here.

IRI FieldShield BannerIRI FieldShield Logo

Structured Data Masking

FieldShield classifies, finds de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc.

Learn More
IRI RowGen BannerIRI DarkShield Logo

Unstructured Data Masking

DarkShield classifies, finds, and deletes PII in text, pdf, MS documents, logs, and image files, plus faces.

Learn More
IRI CellShield BannerIRI CellShield Logo

Excel® Data Masking

CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide.

Learn More
IRI Chakra Max BannerIRI Chakra Max Logo


Chakra Max monitors, blocks, dynamically masks, and audits access and activity in high traffic databases.

Learn More

Learn More

Understand the capabilities of IRI Data Protector suite tools from the product feature-matrix, and the slide deck and article on startpoint security, linked (click) below.

Data Protector Suite Overview

Data Protector Suite PDF Cover

Secure Data at its Startpoints

Cybersecurity Sourcebook 2018

IRI Defines Startpoint Security | Outlook Series Listen Now

More Data Security Solutions

Data Masking as a Service

Data masking as a service logo

Let IRI experts handle your data masking needs. Regardless of their format or location, we can help you sift through your data sources to find and secure the PII in them, and provide you with the reports you need to verify compliance.

Learn More

Test Data Management

IRI RowGen logo

Use IRI's proven shield tools above, the IRI RowGen data synthesis package, or the IRI Voracity platform, to subset, create, or virtualize safe, intelligent test data in DB, file and report targets for ETL prototypes, DevOps, benchmarking, etc.

Learn More

Use Cases

The IRI Data Protector suite's constituent products address:

These data-centric security solutions are also critical complements to device and perimeter (network) security solutions which cannot address insider misuse. Licensing costs depend on which tools, and how many hostname or DB instance licenses, you need.

Voracity schematic

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.