Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.

Description

Monad serves as a comprehensive security data cloud platform that simplifies the processes of extracting, transforming, and loading (ETL) data from a variety of security tools into a cohesive data warehouse. This platform empowers security teams to efficiently export data from their existing tools, customize it into tailored data models, and seamlessly deliver it to their data warehouses, thereby enabling smooth integration and deeper analysis. Additionally, it provides capabilities for security, DevOps, and cloud engineering teams to engage with data using SQL and business intelligence tools, which improves their effectiveness in normalizing, transforming, and enriching data to enhance security and compliance results. With its intuitive interface and robust enterprise-grade connectors, Monad makes it easy to establish a security data lake, assisting organizations in breaking down data silos and gaining valuable insights and analytics that contribute to effective security management. The ability to unify disparate data sources fosters a more holistic view of security metrics, ultimately leading to more informed decision-making and proactive risk management.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Snowflake
ACI Digital Business Banking
Apache Cassandra
Apache Kafka
Collibra
Cubeware Cockpit
Eclipse IDE
Elasticsearch
Greenplum
IBM Db2
IBM Netezza Performance Server
IRI CoSort
Logstash
Microsoft Word
NGINX
SQL Server
Strategy ONE
Tenable One
erwin Data Catalog

Integrations

Amazon Web Services (AWS)
Snowflake
ACI Digital Business Banking
Apache Cassandra
Apache Kafka
Collibra
Cubeware Cockpit
Eclipse IDE
Elasticsearch
Greenplum
IBM Db2
IBM Netezza Performance Server
IRI CoSort
Logstash
Microsoft Word
NGINX
SQL Server
Strategy ONE
Tenable One
erwin Data Catalog

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IRI, The CoSort Company

Founded

1978

Country

United States

Website

www.iri.com/products/voracity

Vendor Details

Company Name

Monad

Website

www.monad.com

Product Features

Big Data

Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates

Data Analysis

Data Discovery
Data Visualization
High Volume Processing
Predictive Analytics
Regression Analysis
Sentiment Analysis
Statistical Modeling
Text Analytics

Data Cleansing

Address/ZIP Code Cleaning
Charting
Data Consolidation / ETL
Data Mapping
Multi Data Format Support
Phone/Email Validation
Raw Data Ingestion
Sample Testing
Validation / Matching / Reconciliation

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Management Platforms (DMP)

Ad Network Integration
Analytics / ROI Tracking
Audience Targeting
Behavioral Analytics
CRM
Campaign Management
Competitive Analysis
Customer Journey Mapping
Data Capture / Transfer
Data Classification
Data Visualization

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

ETL

Data Analysis
Data Filtering
Data Quality Control
Job Scheduling
Match & Merge
Metadata Management
Non-Relational Transformations
Version Control

Product Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Alternatives

IRI FieldShield Reviews

IRI FieldShield

IRI, The CoSort Company

Alternatives

IRI Data Manager Reviews

IRI Data Manager

IRI, The CoSort Company
IRI DarkShield Reviews

IRI DarkShield

IRI, The CoSort Company
IRI CoSort Reviews

IRI CoSort

IRI, The CoSort Company
Monad Ticketing Reviews

Monad Ticketing

Monad Software