IRI Data Protector Suite

 

Classify, Find, and Mask PII Everywhere

Award-Winning Data-Centric Security

 

Renowned software products in the IRI Data Protector suite or IRI Voracity data management platform will: find, classify, and protect personally identifiable information (PII) and other "data at risk" in multiple sources. Each one will help you comply (and prove compliance) with the CCPA, CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, and SOC2 in the US, and international data privacy laws like the GDPR, KVKK, LOPD, PDPA and POPI.

 

IRI and its authorized partners around the world can help you implement fit-for-purpose compliance and breach mitigation solutions using these technologies if you need help. For more information, link to the products and use cases below. Schedule a free online demonstration or an on-site evaluation with the contact-form.

 

Co-located and compatible IRI tooling in Voracity, including IRI RowGen, can also synthesize test data from scratch, and produce referentially correct (and optionally masked) database subsets.

 

IRI and its authorized partners around the world can help you implement fit-for-purpose compliance and breach mitigation solutions using these technologies if you need help. For more information, link to the products and use cases below. Schedule a free online demonstration or an on-site evaluation.

 

IRI Data Masking Software in 2017-21 Market Guides

Structured Data Masking:
FieldShield classifies, finds de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc.


For further information click
here.

Unstructured Data Masking
DarkShield classifies, finds, and deletes PII in text, pdf, MS documents, logs, NoSQL DBs, image files, and faces.


For further information click
here.

Data Masking as a Service
IRI DMaaS engineers in the US and abroad do the work of classifying, finding, and masking, and risk-scoring PII for you.


For further information click
here.

Excel® Data Masking:
CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in Office 365.


For further information click
here.

Learn More

Understand the capabilities of IRI Data Protector suite tools from the product feature-matrix, and the slide deck and article on startpoint security, linked (click) below.

  • IRI Defines Startpoint Security

     

    Outlook Series:

     

    Listen now.

Test Data Synthesis

Use IRI's proven shield tools above, the IRI RowGen data synthesis package, or the IRI Voracity platform, to subset, create, or virtualize safe, intelligent test data in DB, file and report targets for ETL prototypes, DevOps, benchmarking, etc.

Learn More

Use Cases

The IRI Data Protector suite's constituent products address:

These data-centric security solutions are also critical complements to device and perimeter (network) security solutions which cannot address insider misuse. Licensing costs depend on which tools, and how many hostname or DB instance licenses, you need.