IRI FieldShield


Classify, Find, Risk-Score, Mask & Audit PII

Personally identifiable information (PII), protected health information (PHI), credit card / primary account number (PAN), and other confidential data stored in databases (DB) and files are accessed by applications and used in testing. Whether at rest or in motion, proper stewardship of this data is required to avoid lawsuits, privacy law violations, and reputational damage.

What is FieldShield?

IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. FieldShield utilities in Eclipse are used for profiling and de-identifying data at rest (static data masking), and the FieldShield SDK is used for securing data in motion (dynamic data masking).

See IRI CellShield for PII in Excel, and IRI DarkShield for unstructured text, document and image files. FieldShield and all 'shield' tools in the IRI Data Protector suite are also included free within IRI Voracity data management platform subscriptions.

What does FieldShield do?

FieldShield classifies, searches, and shields field values in DBs and flat files with the data security governance industry's broadest array of data masking and anonymization functions. FieldShield statistically measures the likelihood that quasi-identifiers can re-identify someone. And, FieldShield generates rich audit logs to verify compliance.

FieldShield can nullify the effects of data breaches, and help you comply with U.S. data privacy laws like the CCPA, CIPSEA, FERPA, GLBA, HIPAA/HITECH, HMDA, MISMO, PCI DSS, and SOC2, plus the DPA, GDPR, IPDPC, KVKK, PDPA, PIPEDA, and POPI abroad.

FieldShield is the Best Way to:

  • Connect to and protect PII in RDB tables and flat files, plus MongoDB and JSON
  •  Automatically scan and classify PII and then apply the same masks across sources
  • Mask big data on existing systems without Hadoop, in-memory databases, or appliances
  • Encrypt and de-ID PII without changing its appearance or losing access to non-sensitive data
  • Determine the risk of re-ID and generalize quasi-identifiers so they are anonymous and useful
  • Protect database clones as they are being created using scripts run from Actifio or Commvault
  • Use auto-created audit logs, job diagrams and risk score reports to verify privacy law compliance
  • Fold data masking into transformation, migration, replication, loading, federation, and analytic jobs

Deeper Dive

Learn more about FieldShield, how it's used, and why it's better than other data masking tools and costly legacy suites. Peruse the data masking solutions section and these resources. Then, request an online demo or onsite trial.

Do you know you have data at risk? Do you know where (all of) it is?

How FieldShield works, see here.

What Sets It Apart, learn here.

Is your data safe from breaches or useless in the wrong hands?

How FieldShield works, see here.

What Sets It Apart, learn here.

Do you comply with data privacy regulations? Can you prove it?

How FieldShield works, see here.

What Sets It Apart, learn here.

Do you use multiple UIs to protect different data in different ways?

How FieldShield works, see here.

What Sets It Apart, learn here.

Do you secure only PII so you can still use the non-sensitive data?

How FieldShield works, see here.

What Sets It Apart, learn here.

Does the protected data look real enough? Is it referentially correct?

How FieldShield works, see here.

What Sets It Apart, learn here.

Can you protect data in real-time or in DB applications dynamically?

How FieldShield works, see here.

What Sets It Apart, learn here.

Can you combine masking with transformation, migration, and reporting?

How FieldShield works, see here.

What Sets It Apart, learn here.

How long does it take for you to deploy, modify, or optimize masking jobs?

How FieldShield works, see here.

What Sets It Apart, learn here.

Is your masking metadata simple, reusable, shareable, and interoperable?

How FieldShield works, see here.

What Sets It Apart, learn here.

IRI Defines Startpoint Security | Outlook Series

Listen now.

Did you know that FieldShield was built from the IRI CoSort data processing package? CoSort has a four-decade track record for robust and precise manipulation of legacy and modern data sources.