IRI Data Protector Suite Description

Renowned startpoint security software products in the IRI Data Protector suite and IRI Voracity data management platform will: classify, find, and mask personally identifiable information (PII) and other "data at risk" in almost every enterprise data source and sillo today, on-premise or in the cloud.

Each IRI data masking tool in the suite -- FieldShield, DarkShield or CellShield EE -- can help you comply (and prove compliance) with the CCPA, CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, and SOC2 in the US, and international data privacy laws like the GDPR, KVKK, LGPD, LOPD, PDPA, PIPEDA and POPI.

Co-located and compatible IRI tooling in Voracity, including IRI RowGen, can also synthesize test data from scratch, and produce referentially correct (and optionally masked) database subsets.

IRI and its authorized partners around the world can help you implement fit-for-purpose compliance and breach mitigation solutions using these technologies if you need help.

Pricing

Free Trial:
Yes

Integrations

API:
Yes, IRI Data Protector Suite has an API

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
IRI, The CoSort Company
Year Founded:
1978
Headquarters:
United States
Website:
www.iri.com/products/iri-data-protector
Update This Listing

Media

You Might Also Like
It's not magic, it's real-time data with Twilio Segment Icon
Activate your data warehouse to all the tools you use with a CDP that’s fast, powerful and flexible. We'll show you how with Twilio Segment.

Product Details

Platforms
SaaS
Windows
Mac
Linux
Type of Training
Documentation
Live Online
Webinars
In Person
Videos
Customer Support
Phone Support
24/7 Live Support
Online

IRI Data Protector Suite Features and Options

Data Security Software

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance