Quick Links
Test Data Services
IRI Test Data as a Service (TDaaS) solutions deliver safe, referentially correct test sets for relational and NoSQL databases of any size, as well as custom-formatted structured, semi-structured, and unstrutured files, documents, and images.
We define TDaaS in a couple ways:
1) As a professional service, where you send us the DDL or layout information for the data you need, along with any complex business rules, and we will provide test data management services by the hour, day, or project, to design and execute the test data generation jobs you need.
- DB, Data Warehouse, and Data Vault prototypes
- Application stress-testing and DevOps
- Software or hardware benchmarks
- Product demonstrations
- Outsourced developers
Data targets can be created at IRI and sent through email or S/FTP, staged in a cloud service, or populated directly into your targets through remote access or supervision of your team under NDA.
2) As a self-service test data portal, where IRI creates synthetic, subsetted, or masked test data in conjunctino with third-party software environments like CI/CD paltforms and fit-for-purpose test data management portals from Cigniti, ValueLabs, Windocks, Capgemini and Expleo. These companies all specialize in DevOps and can integrate IRI test data generation capabilities into their offerings for test data provisioning. Their worldwide presence and knowledge of IRI software allow you to combine robust test data generation and state-of-the-art ergonomics to provide the test sets your developers need in a managed way.
Please use the information request form below, or write to info@iri.com to discuss your use case for TDaaS solution and obtain a cost quote.
Data Masking as a Service (DMaaS)
IRI also provides remote, supervised data masking services for your databases, files, spreadsheets, documents, and images stored on-premise or in the cloud. Sources can be structured, semi-structured, or unstructured, big and small.
IRI experts will work with you to classify, discover, and consistently de-identify personally identifiable information (PII) and other sensitive data while preserving referential integrity and database resources. The masked targets in your lower development environments will be realistic, ready for testing, and compliant with data privacy laws.