Data-Centric Security


Complete Data Masking

IRI Data Masking Software in 2018 Market Guide

Gartner logo

Read More here


Profile and Protect Data at Risk
Nullify data breaches by masking PII in your DBs and files. Automatically find and classify it, then encrypt, pseudonymize, redact, and more while preserving its referential integrity.

Learn more


Comply with Data Privacy Laws
FieldShield de-identifies data subject to CIPSEA, DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, etc. It also helps you verify compliance via XML audit logs and re-identification risk scores.

Learn more

 

 

Protect Data throughout its Lifecycle
Secure your data at every stage by applying FieldShield functions in IRI Voracity operations. Anonymize during data integration (ETL), federation, replication, testing, and analytics.

Learn more

 

 

References


FieldShield Use Cases

 

  • Payment Card Industry Data (PCI)

    "FieldShield decrypts and re-encrypts fields in our credit card migration and test sources, and easily generates and manages encryption keys."

  • Protected Health Information (PHI)

    "We continue to rely on FieldShield for flat-file and DB de-identification in order to comply with government healthcare privacy regulations."

  • Personally Identifiable Information (PII)

    "We use FieldShield to anonymize HR data in complex file feeds, to segment and substitute values based on field-level conditions."



Complete Data Masking

Every Source:

Flat Files
Database Tables
Semi-structured Files
Mainrame Files
Learn more.

Every Protection:

Encryption & Decryption
Blurring & Scrambling
Encoding & Decoding
Pseudonymization
Character Masking
Randomization
Hashing
Expressions
String Manipulations
Tokenization
Row/Column Removal
Custom Functions

Learn more.

 Every Deployment:

Command Line
Eclipse GUI
Batch/Shell Scripts
System/API Library Calls
In Situ/SQL Procedures

Learn more.


Learn more about FieldShield


What Others Are Reading

  • Data Masking vs. Data Encryption

    Do you know the differences between them? Learn about these two popular forms of data obfuscation and when to use them.

    Read now.

  • Which Masking Function is Best?

    Read this review of the important decision criteria, including realism, reversibility, consistency, speed, and security.

    Read now.

  • PCI Tokenization in FieldShield

    The Payment Card Industry Data Security Standard, or PCI DSS, requires encryption or tokenization of primary account numbers.

    Read now.