Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.

Description

Tarsal's capability for infinite scalability ensures that as your organization expands, it seamlessly adapts to your needs. With Tarsal, you can effortlessly change the destination of your data; what serves as SIEM data today can transform into data lake information tomorrow, all accomplished with a single click. You can maintain your SIEM while gradually shifting analytics to a data lake without the need for any extensive overhaul. Some analytics may not be compatible with your current SIEM, but Tarsal empowers you to have data ready for queries in a data lake environment. Since your SIEM represents a significant portion of your expenses, utilizing Tarsal to transfer some of that data to your data lake can be a cost-effective strategy. Tarsal stands out as the first highly scalable ETL data pipeline specifically designed for security teams, allowing you to easily exfiltrate vast amounts of data in just a few clicks. With its instant normalization feature, Tarsal enables you to route data efficiently to any destination of your choice, making data management simpler and more effective than ever. This flexibility allows organizations to maximize their resources while enhancing their data handling capabilities.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon S3
GitHub
Snowflake
Amazon Web Services (AWS)
Azure Storage
Databricks
Docker
Google Cloud Storage
HPE Ezmeral Data Fabric
IBM Cognos Analytics
IRI CellShield
IRI CoSort
IRI DMaaS
IRI Data Manager
MongoDB Atlas
NGINX
Okta
Oracle Database
Red Hat Enterprise Linux
Strategy ONE

Integrations

Amazon S3
GitHub
Snowflake
Amazon Web Services (AWS)
Azure Storage
Databricks
Docker
Google Cloud Storage
HPE Ezmeral Data Fabric
IBM Cognos Analytics
IRI CellShield
IRI CoSort
IRI DMaaS
IRI Data Manager
MongoDB Atlas
NGINX
Okta
Oracle Database
Red Hat Enterprise Linux
Strategy ONE

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IRI, The CoSort Company

Founded

1978

Country

United States

Website

www.iri.com/products/voracity

Vendor Details

Company Name

Tarsal

Country

United States

Website

tarsal.co

Product Features

Big Data

Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates

Data Analysis

Data Discovery
Data Visualization
High Volume Processing
Predictive Analytics
Regression Analysis
Sentiment Analysis
Statistical Modeling
Text Analytics

Data Cleansing

Address/ZIP Code Cleaning
Charting
Data Consolidation / ETL
Data Mapping
Multi Data Format Support
Phone/Email Validation
Raw Data Ingestion
Sample Testing
Validation / Matching / Reconciliation

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Management Platforms (DMP)

Ad Network Integration
Analytics / ROI Tracking
Audience Targeting
Behavioral Analytics
CRM
Campaign Management
Competitive Analysis
Customer Journey Mapping
Data Capture / Transfer
Data Classification
Data Visualization

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

ETL

Data Analysis
Data Filtering
Data Quality Control
Job Scheduling
Match & Merge
Metadata Management
Non-Relational Transformations
Version Control

Product Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Alternatives

IRI FieldShield Reviews

IRI FieldShield

IRI, The CoSort Company

Alternatives

IRI Data Manager Reviews

IRI Data Manager

IRI, The CoSort Company
IRI CoSort Reviews

IRI CoSort

IRI, The CoSort Company
IRI DarkShield Reviews

IRI DarkShield

IRI, The CoSort Company