Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS.

Description

Your IT department can implement advanced data masking techniques to restrict access to sensitive information, utilizing adaptable masking rules that correspond to the authentication levels of users. By incorporating mechanisms for blocking, auditing, and notifying users, IT staff, and external teams who interact with confidential data, the organization can maintain adherence to its security protocols as well as comply with relevant industry and legal privacy standards. Additionally, you can tailor data-masking strategies to meet varying regulatory or business needs, fostering a secure environment for personal and sensitive information. This approach not only safeguards data but also facilitates offshoring, outsourcing, and cloud-based projects. Furthermore, large datasets can be secured by applying dynamic masking to sensitive information within Hadoop environments, enhancing overall data protection. Such measures bolster the integrity of the organization's data security framework.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon EC2
Amazon Redshift
Amazon S3
Apache Cassandra
Azure Blob Storage
Azure Cosmos DB
Cloudera
Datadog
Elasticsearch
Hadoop
IRI CellShield
IRI FieldShield
IRI Voracity
Microsoft Azure
Microsoft SharePoint
Microsoft Word
Oracle Cloud Infrastructure
SAP HANA
Splunk Enterprise
Ubuntu

Integrations

Amazon EC2
Amazon Redshift
Amazon S3
Apache Cassandra
Azure Blob Storage
Azure Cosmos DB
Cloudera
Datadog
Elasticsearch
Hadoop
IRI CellShield
IRI FieldShield
IRI Voracity
Microsoft Azure
Microsoft SharePoint
Microsoft Word
Oracle Cloud Infrastructure
SAP HANA
Splunk Enterprise
Ubuntu

Pricing Details

$5000
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IRI, The CoSort Company

Founded

1978

Country

United States

Website

www.iri.com/products/darkshield

Vendor Details

Company Name

Informatica

Country

United States

Website

www.informatica.com/products/data-security/data-masking/dynamic-data-masking.html

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Alternatives

IRI FieldShield Reviews

IRI FieldShield

IRI, The CoSort Company

Alternatives

IRI Data Protector Suite Reviews

IRI Data Protector Suite

IRI, The CoSort Company
BizDataX Reviews

BizDataX

Ekobit
ShieldApps VPN Reviews

ShieldApps VPN

ShieldApps