
Data Security in the Business World: Navigating Challenges
Threats of data breaches and cyberattacks have intensified over the years. In 2025 alone, the total damage cost is already forecast to reach up to $10.5 trillion. Read More
Threats of data breaches and cyberattacks have intensified over the years. In 2025 alone, the total damage cost is already forecast to reach up to $10.5 trillion. Read More
The purpose of IRI data masking tools is to discover and obfuscate Personally Identifiable Information (PII) in various data sources. Depending on the type of data source, we recommend different products in the IRI Data Protector Suite, typically IRI FieldShield or IRI DarkShield. Read More
Abstract: Adopting a data mesh approach represents a contemporary solution to the challenges faced by traditional centralized data management systems. This article summarizes what data mesh architecture is about, and how you can leverage its key benefits using the IRI Voracity platform. Read More
The IRI DarkShield data masking tool includes fit-for-purpose wizards in its IRI Workbench GUI to search (classify) and mask (remediate) sensitive ”dark data” (as defined by Gartner) in many semi, unstructured, and structured file, NoSQL, and relational database (RDB) sources. Read More
As I’ve discussed previously, IRI provides a robust solution for data migration. For those needing a recap, IRI is a longstanding data management vendor that has been almost perennially involved in data modernization efforts (such as legacy “lift and shift” work). Read More
Abstract: This article describes how IRI DarkShield users can access files in SharePoint Online for searching and masking PII. It documents the setup steps you will take to use Microsoft Entra ID (formerly Azure Active Directory) for authorization, and configure DarkShield jobs in the IRI Workbench graphical IDE, built on Eclipse. Read More
The IRI DarkShield Command-Line Interface (CLI) offers a powerful way to harness the data discovery and masking capabilities of DarkShield Version 5 outside the graphical IRI Workbench environment. Read More
This article demonstrates the Voracity user’s ability to join values in a flat-file file to those in an RDB (Relational Database) table to provide meaningful information. Read More
This article demonstrates the use of the “format preserving scramble” (FPS) function available in IRI Voracity data masking and test data synthesis tools . FPS obfuscates numeric and alphabetic data in a random way but preserves the format and original widths of the characters (including upper- and lower-case letters). Read More
The IRI DarkShield data masking tool includes fit-for-purpose wizards in its IRI Workbench GUI to search (classify) and mask (remediate) sensitive ”dark data” (as defined by Gartner) in many semi, unstructured, and structured file, NoSQL, and relational database (RDB) sources. Read More
To configure both JDBC and ODBC to support the Transport Layer Security (TLS) protocol, there are additional configuration steps that are needed when compared to this previous article. Read More