
Run Remote Linux Jobs from IRI Workbench
This article demonstrates how you can run SortCL-compatible jobs configured in your local Linux IRI Workbench on a remote Linux machine with a licensed CoSort SortCL executable. Read More
This article demonstrates how you can run SortCL-compatible jobs configured in your local Linux IRI Workbench on a remote Linux machine with a licensed CoSort SortCL executable. Read More
Healthcare providers, medical researchers, and other “business associates” collect and process sensitive data on patients, which HIPAA law classifies as protected health information (PHI). Because PHI is stored and shared in databases, clinical notes, imaging studies, treatment forms, and EDI (claim) formats – both on-premise and in the cloud – safeguarding it by finding and de-identifying it can be a complex, time-consuming challenge. Read More
A data masking tool can be an effective, if not essential, way to protect sensitive information stored in files and databases. As the numbers of data breaches, lawsuits, and data privacy laws continue to grow, companies must find ways to anonymize production and test data without sacrificing its utility for analytics, research, marketing, or development. Read More
The Banking, Financial Services, and Insurance (BFSI) industry handles huge amounts of personally identifiable information (PII) and sensitive financial data each day. This data ranges from NID, account information and credit scores to financial transactions and loan documents. Read More
Threats of data breaches and cyberattacks have intensified over the years. In 2025 alone, the total damage cost is already forecast to reach up to $10.5 trillion. Read More
The purpose of IRI data masking tools is to discover and obfuscate Personally Identifiable Information (PII) in various data sources. Depending on the type of data source, we recommend different products in the IRI Data Protector Suite, typically IRI FieldShield or IRI DarkShield. Read More
Abstract: Adopting a data mesh approach represents a contemporary solution to the challenges faced by traditional centralized data management systems. This article summarizes what data mesh architecture is about, and how you can leverage its key benefits using the IRI Voracity platform. Read More
The IRI DarkShield data masking tool includes fit-for-purpose wizards in its IRI Workbench GUI to search (classify) and mask (remediate) sensitive ”dark data” (as defined by Gartner) in many semi, unstructured, and structured file, NoSQL, and relational database (RDB) sources. Read More
As I’ve discussed previously, IRI provides robust solutions for data migration. For those needing a recap, IRI is a longstanding data management vendor that has been almost perennially involved in data modernization efforts (such as legacy “lift and shift” work). Read More
Abstract: This article describes how IRI DarkShield users can access files in SharePoint Online for searching and masking PII. It documents the setup steps you will take to use Microsoft Entra ID (formerly Azure Active Directory) for authorization, and configure DarkShield jobs in the IRI Workbench graphical IDE, built on Eclipse. Read More
The IRI DarkShield Command-Line Interface (CLI) offers a powerful way to harness the data discovery and masking capabilities of DarkShield Version 5 outside the graphical IRI Workbench environment. Read More