Test Data as a Service

 

Safe, Realistic, and Ready Fast

Test Data Services

 

IRI Test Data as a Service (TDaaS) solutions deliver safe, referentially correct test sets for relational and NoSQL databases of any size, as well as custom-formatted structured, semi-structured, and unstrutured files, documents, and images.

 

We define TDaaS in a couple ways:

 

1) As a professional service, where you send us the DDLor layout information for the data you need, along with any complex business rules, and we will engage in a service by the hour to synthesize that data for your:

  • DB, Data Warehouse, and Data Vault prototypes
  • Application stress-testing and DevOps
  • Software or hardware benchmarks
  • Product demonstrations
  • Outsourced developers

 

Data targets can be created at IRI and sent through email or S/FTP, staged in a cloud service, or populated directly into your targets through remote log-in to your monitored system(s) under NDA.

 

2) As a self-service test data portal, where IRI creates synthetic, subsetted, or masked test data in conjunctino with third-party software environments like CI/CD paltforms and fit-for-purpose test data management portals from Cigniti, ValueLabs, Windocks, Capgemini and Expleo. These companies all specialize in DevOps and can integrate IRI test data generation capabilities into their offerings for test data provisioning. Their worldwide presence and knowledge of IRI software allow you to combine robust test data generation and state-of-the-art ergonomics to provide the test sets your developers need in a managed way.

 

Please use the information request form below, or write us to discuss your use case for TDaaS solution and obtain a cost quote.

Data Masking as a Service (DMaaS)

IRI also provides remote or cloud based data masking services for your databases, files, spreadsheets, documents, and images stored on-premise or in the cloud. Sources can be structured, semi-structured, or unstructured, big and small.

IRI experts will work with you to classify, discover, and consistently de-identify personally identifiable information (PII) and other sensitive data while preserving referential integrity and database resources. The masked targets in your lower development environments will be realistic, ready for testing, and compliant with data privacy laws.