Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Renowned startpoint security software products in the IRI Data Protector suite and IRI Voracity data management platform will: classify, find, and mask personally identifiable information (PII) and other "data at risk" in almost every enterprise data source and sillo today, on-premise or in the cloud.
Each IRI data masking tool in the suite -- FieldShield, DarkShield or CellShield EE -- can help you comply (and prove compliance) with the CCPA, CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, and SOC2 in the US, and international data privacy laws like the GDPR, KVKK, LGPD, LOPD, PDPA, PIPEDA and POPI.
Co-located and compatible IRI tooling in Voracity, including IRI RowGen, can also synthesize test data from scratch, and produce referentially correct (and optionally masked) database subsets.
IRI and its authorized partners around the world can help you implement fit-for-purpose compliance and breach mitigation solutions using these technologies if you need help.
Description
This VPN service is both fast and reliable, functioning as a virtual private network that offers numerous efficient servers to fulfill your connectivity requirements. Additionally, it effectively conceals your IP address, encrypts your internet traffic, and transforms public WiFi into a secure private network. With servers available in a wide array of global locations, users can select from over 30 different countries or regions, such as the United States, Brazil, Germany, India, Indonesia, Italy, Russia, Mexico, South Korea, the United Kingdom, and Japan. There's no longer a need for an incognito browser; you can simply press the connect button, ensuring that all your internet traffic is fully encrypted. This guarantees that your online activities remain anonymous, and no matter what public WiFi network you connect to, you will be protected from online threats with complete security. Your IP address and geographical location will be obscured while using the service, preventing any tracking of your activities on the internet. This means that no logs are maintained, and there is no risk of DNS leaks, ensuring your online privacy remains intact and secure at all times. Ultimately, this VPN offers peace of mind for users seeking to navigate the internet without fear of surveillance or data breaches.
API Access
Has API
API Access
Has API
Integrations
Amazon EC2
Amazon S3
Apache Cassandra
Apache Hive
Azure Storage
Elasticsearch
Flexter
Google Cloud Platform
IBM Informix
KNIME Analytics Platform
Integrations
Amazon EC2
Amazon S3
Apache Cassandra
Apache Hive
Azure Storage
Elasticsearch
Flexter
Google Cloud Platform
IBM Informix
KNIME Analytics Platform
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
Free
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
IRI, The CoSort Company
Founded
1978
Country
United States
Website
www.iri.com/products/iri-data-protector
Vendor Details
Company Name
IronMeta Studio
Country
Singapore
Website
vpn-tomato.ironmeta.com
Product Features
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Product Features
VPN
Anonymous Browsing
DNS Leak Protection
For Digital Security
For Financial Security
For Gaming
For Streaming
Kill Switch
Multi-Language
Multi-Protocol
Peer-to-Peer
Policy Management
Remote Access
Web Inspection
White Label