Increasing Sensitive Data Visibility and Control: Best Practices
You might know the old saying, “What gets measured gets managed.” It rings true even in the IT sector. But there’s a catch—how can you manage and measure what you can’t see? Read More
You might know the old saying, “What gets measured gets managed.” It rings true even in the IT sector. But there’s a catch—how can you manage and measure what you can’t see? Read More
One of the data masking requirements for IRI FieldShield that we see in PHI anonymization use cases involves the blurring of dates at the row level, instead of the column level while providing a configurable option to retain the interval between those dates. Read More
Abstract: IRI has partnered with Windocks to provide an on-demand, test-ready virtualized repository that delivers masked, subsetted or synthesized databases in seconds for Docker containers, conventional instances, or workstations. Read More
Editor’s Note: A newer version of this IRI DarkShield wizard (as of 2024) is described in this article.
Elasticsearch is a Java-based search engine that has an HTTP interface and stores its data in schema-free JSON documents. Read More
IRI Workbench users can connect to and manipulate the data in the underlying database in Salesforce using the JDBC and ODBC drivers from CData or Progress Software. Read More
One of the primary uses of IRI FieldShield is to encrypt and decrypt sensitive data in database or flat-file columns. FieldShield relies on a passphrase to derive a symmetrical encryption key used at encryption and decryption time. Read More
Splunk Phantom is an orchestration, automation, and response technology for running “Playbooks” to respond to various conditions. Phantom connects to Splunk Enterprise using the Phantom App for Splunk, so that actions can be taken on knowledge derived from data indexed in Splunk. Read More
Finding and masking personally identifiable information (PII) in Snowflake® data warehouses works the same way in IRI FieldShield® or Voracity® installations as it does for other relational database sources. Read More
“Have you stopped speeding?” You could probably object to a leading question like this in court, but what happens when an important question with only a yes or no answer is solicited on a mandatory form, and the response becomes part of an actionable database record? Read More
Adding ‘random noise’ to data through blurring or perturbation is a data common anonymization requirement for researchers and marketers of protected health information (PHI) seeking to comply with the HIPAA Expert Determination Method security rule. Read More