Big Data Protection

 

Next Steps
Overview Package Protect Provision Structured Data Semi & Unstructured Data With/out Hadoop Use Cases IoT Bootcamp BDaaS

Big Data Protection

You can now discover, classify, and protect personally identifiable information (PII) and other sensitive data in big data environments with affordable IRI software front-ended in Eclipse.

IRI's proven data-centric security solutions support multiple legacy and modern data sources with multiple masking and encryption functions that run identically in your local file system (with the power of CoSort) and Hadoop clusters for unlimited scalability.

Mask existing production data or generate safe test data from scratch using a powerful Eclipse™ IDE that includes or supports:

  • IRI DarkShield - to discover, deliver, and delete PII in unstructured text and Parquet files, PDF and MS Office documents, email boxes and image files, etc. on premise or in the cloud
  • IRI FieldShield - to find and mask PII in large flat (COBOL, CSV, LDIF, JSON or XML) files, or very large databases, before, during, and after ETL, analytics, etc.
  • IRI Voracity - the total data management platform supporting both of the above, along with big data packaging and provisioning
  • IRI RowGen - for smart, big test data generation and virtualization
lightbulb icon What's "Big Data" About These
X

What's "Big Data" About These?

The ability to profile (discover) and protect (mask) PII in both Hadoop, Kafka, MQTT, S3, NoSQL, and SaaS platform sources, as well as in massive structured, semi-structured, and certain unstructured data volumes directly. Multiple data discovery and profiling wizards in the IRI Workbench IDE for Voracity, built on Eclipse™, allow you find, classify, extract, and redact PII in structured and unstructured sources. IRI data masking jobs leverage proven redaction and big data processing engines in multi-core servers or multi-node Hadoop environments.

Big Data Masking

Target each item with a data protection function from 14 categories per business and data privacy rules.

For example, choose format-preserving encryption or tokenization for credit card values, pseudonymization for names, randomization for ages, redaction for formulas, and character masking on national ID values.

For more information, see:

Solutions > Data Masking

Big Test Data

Generate and populate massive volumes of safe, realistic test data in file, table, and report targets.

Use production metadata - but not production data - to build structurally and referentially correct volumes that conform to the appearances, value ranges, frequency distributions, and layouts of real-world DB, DWH, and Hadoop environments.

For more information, see:

Solutions > Test Data

Share this page

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.

X

Try Voracity Free

Big Data Speed & Security. Simple and Seamless


Get Info See Demo