PII Masking in MongoDB (1st Method)
Editors Note: This example demonstrates our earliest, least direct (though still available) method of using IRI FieldShield for NoSQL database protection; i.e., for MongoDB data masking. Read More
Editors Note: This example demonstrates our earliest, least direct (though still available) method of using IRI FieldShield for NoSQL database protection; i.e., for MongoDB data masking. Read More
Introduction: This example demonstrates an older method of using IRI FieldShield to protect sensitive data prior to indexing the data in Splunk. As you will read, FieldShield would process the data outside of Splunk and create a CSV file for Splunk’s ingestion. Read More
This is an introduction to IRI CellShield. Subsequent blogs will demonstrate the different functions in CellShield: data masking, encryption, and pseudonymization. If you’re interested in finding, classifying, or masking PII in databases or flat files, check out IRI FieldShield. Read More
Editors Updates: Q2’16: In addition to the database profiling wizard in the data discovery menu group in IRI Workbench described below, IRI has introduced robust data classification that enables the application of field rules for multi-source data transformation and protection through data class libraries. Read More
Data architects and data scientists, as well as DBAs and governance teams, may need to use or migrate data in legacy file formats and databases. Additionally, the ability to mash-up those sources with newer file and database repositories is important in data integration (ETL) and analytic projects, as well as in data profiling for data loss prevention and privacy law compliance. Read More
This is the last in a four-part series to introduce IRI CellShield. An overview is found here. The following parts demonstrate how to use the other functions in CellShield: data masking and encryption. Read More
This is the third in a four-part series describing IRI CellShield data masking software for Excel, and its format-preserving encryption function in particular; the series overview starts here. Read More
This is the second in a four-part series to introduce IRI CellShield. An overview is found here. The other parts demonstrate how to use more functions in CellShield like encryption and pseudonymization. Read More
This article is second in a 3-part series on using IRI products to expand functionality and improve performance in Pentaho systems. We first demonstrate how to improve sorting performance, and then introduce ways to mask production data, and create test data, in the Pentaho Data Integration (PDI) environment. Read More
This article is third in a 3-part series on CLF and ELF web log data. We first introduced CLF and ELF web log formats, then introduced IRI solutions for processing web log data, and here we conclude by masking private data in web log files. Read More
Abstract: Amid the still-growing problem of data breaches, and new v3 requirements of the Payment Card Industry Data Security Standard (PCI DSS) in effect, it has never been more important to protect sensitive data properly. Read More