Static Data Masking (SDM)

 

Next Steps
Overview Anonymize Custom Encode Encrypt Hash Pseudonymize Randomize Redact Scramble Shift Tokenize

Static Data Masking


Persistent data masking, or Static Data Masking (SDM) is the primary method of protecting specific data elements at rest. These "elements" are typically database column or atomic (fixed or floating) values that are considered sensitive. These elements may contain personally identifiable information (PII), protected health information (PHI), primary account numbers (PAN), trade secrets, or other private values.

SDM is used to nullify data breaches, provide safe test data, and comply with data privacy laws. Compare it to Dynamic Data Masking (DDM), which selectively redacts sensitive values for database applications 

The "startpoint" data-centric security products IRI FieldShield, IRI DarkShield and IRI CellShield -- or the IRI Voracity platform that includes them -- centrally classify data at risk and provide more data discovery and SDM functions for more data sources than any other data masking stack. FieldShield also provides state-of-the-art re-ID risk scoring. Referential integrity, or deterministic data masking, is achieved through their automatic application of consistent masking functions. 

The available categories of per-element functions include:

IRI solutions for data masking problems

You can also "roll your own" external data masking function. This allows you to call a custom field protection at runtime instead of a built-in function

Whether built-in or custom, you can apply functions conditionally to specific rows or columns, and across tables through protection rules you can define, store, and re-use. It is also possible to apply these functions in a dynamic data masking (DDM) context.

Create, run, and manage your data masking jobs in a free state-of-the-art GUI, built on Eclipse.™ Or, use the same, simple, self-documenting 4GL metadata defining your data layouts and protections in a command line environment.

If you have sensitive data in Excel, check out IRI CellShield. FieldShield supports many of the same encryption, redaction and psedudonymization functions as FieldShield.

If you have sensitive data in unstructured text, log or .pdf files, or in semi- or unstructured RDB columns or NoSQL DB collections, check out IRI DarkShield. DarkShield supports at least half the number of functions listed for FieldShield above. The same deterministic (consistent) data masking results apply!

Did You Know?

FieldShield is the award-winning, fit-for-purpose static data masking product for databases and flat files built on Eclipse and powered by IRI CoSort. FieldShield -- along with DarkShield and CellShield -- is also a member product of the IRI Data Protector suite, and is included with IRI Voracity total data management platform subscriptions.

Voracity users can run these static masking functions along with data discovery, integration, migration, governance, and analytic operations. For example, they can simultaneously cleanse, encrypt, and sort data for safe bulk DB loads; mask data migration/replication or subset targets; and, build a delta report or ETL job that also de-identifies fields.

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.