Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
IRI CellShield®, protects sensitive information in Microsoft Excel®, allowing you to comply data privacy laws. You can protect your columns with reversible or non-reversible masking options. CellShield protects your data, no matter how many sheets they are. Multiple search methods are available to locate and report on PII across the LAN. Protect it all at once with CellShield. Intuitive graphical dialogs allow you to classify and mask it. CellShield's core technology uses the award-winning IRI FieldShield flat file and database data masking product. Data that is hidden in one platform can be seen in another. CellShield EE, the only fully-featured professional data discovery, masking and auditing package for Excel 2010, 2016, and 2019 (plus Office 365 workbooks) in your LAN, is available. CellShield EE goes beyond the security and scope a single password can provide by combining and automating all of these additional capabilities.
Description
RedShield has teamed up with leading cloud provider AWS to develop an innovative architecture that delivers exceptional DDoS defense as an integral part of its offerings. In today's environment, where around 50 new vulnerabilities emerge daily, maintaining an edge over cybercriminals can seem like a daunting challenge. To combat this, RedShield employs a proven operational framework that integrates cybersecurity specialists, advanced tools, and AI-enhanced processes, empowering clients to reduce their exposure to threats while bolstering their cybersecurity resilience. The complexity and ever-evolving nature of cybersecurity, combined with a significant gap between the demand for and supply of security and development talent, can quickly divert focus from essential business operations. RedShield’s solution not only addresses the challenges of staffing in this field but does so at an approximate cost of only 10% compared to establishing and maintaining an in-house web application security team, thus providing an attractive return on investment in risk mitigation. This partnership symbolizes a powerful step forward in redefining how organizations approach cybersecurity in an increasingly perilous digital landscape.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Capgemini Intelligent Automation Platform
Cincom CONTROL
Cloudera
Datacom Datapay
Datadog
Deloitte Compliance Suite
Diamond IP
Fujitsu Biometrics-as-a-Service
HPE Ezmeral Data Fabric
Integrations
Amazon Web Services (AWS)
Capgemini Intelligent Automation Platform
Cincom CONTROL
Cloudera
Datacom Datapay
Datadog
Deloitte Compliance Suite
Diamond IP
Fujitsu Biometrics-as-a-Service
HPE Ezmeral Data Fabric
Pricing Details
$35 one-time payment
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
IRI
Founded
1979
Country
United States
Website
www.iri.com/products/cellshield
Vendor Details
Company Name
RedShield
Founded
2008
Country
New Zealand
Website
www.redshield.co
Product Features
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Spreadsheet
Analytics
Audit Trail
Calculators
Charting
Multi-User Collaboration
Templates
Product Features
DDoS Protection
DNS Amplification Protection
DNS Reflection Protection
High Network Capacity
Illegitimate Traffic Recognition
Infrastructure Protection (Layer 3/Layer 4)
Post Attack Analysis
Traffic Monitoring
Website Protection (Layer 7)