About
The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources.
Apply their many masking functions consistently for referential integrity:
IRI FieldShield®
Structured Data Masking
FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc.
IRI DarkShield®
Semi & Unstructured Data Masking
DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces.
IRI CellShield®
Excel® Data Masking
CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud.
IRI Data Masking as a Service
IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you.
|
About
Libelle DataMasking (LDM) is a robust, enterprise-grade data masking solution that automates the anonymization of sensitive or personal data—such as names, addresses, dates, emails, IBANs, credit cards—and transforms them into realistic, logically consistent substitutes that maintain referential integrity across SAP and non‑SAP systems, including Oracle, SQL Server, IBM DB2, MySQL, PostgreSQL, SAP HANA, flat files, and cloud databases. Capable of processing up to 200,000 entries per second and supporting parallelized masking for massive datasets, LDM uses a multithreaded architecture to efficiently read, anonymize, and write data back with high performance. It features over 40 built‑in anonymization algorithms—such as number, alphanumeric, date shifting, name, email, IBAN masking, credit card obfuscation, and mapping algorithms—as well as templates for SAP modules (CRM, ERP, FI/CO, HCM, SD, SRM).
|
About
The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
|
About
Oracle Database@AWS enables customers to migrate Oracle Databases, including Oracle Exadata workloads, to Oracle Exadata Database Service on Dedicated Infrastructure or Oracle Autonomous Database on Dedicated Exadata Infrastructure within AWS. This migration requires minimal to no database or application changes while maintaining full feature and architecture compatibility, performance, and availability. Customers can establish low-latency connections between Oracle Database@AWS and applications deployed in AWS, including on Amazon Elastic Compute Cloud (Amazon EC2). Oracle Database@AWS integrates directly with AWS Analytics services through zero-ETL to unify data across Oracle and AWS, enabling analytics and machine learning. Further, integration with AWS generative AI services is supported to accelerate innovation. It offers a unified experience for collaborative purchasing, management, operations, and support.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
CISOs, DBAs, DevOps,
|
Audience
IT teams in need of a solution to anonymize large-scale sensitive datasets for secure, realistic non‑production use
|
Audience
Organizations that need a flexible solution that discovers, masks and subsets sensitive data to safely share across non-production environments
|
Audience
IT teams seeking a tool to migrate and modernize Oracle workloads in the cloud
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$230 one-time payment
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationIRI, The CoSort Company
Founded: 1978
United States
www.iri.com/products/iri-data-protector
|
Company InformationLibelle
Founded: 1994
Germany
www.libelle.com/products/datamasking/
|
Company InformationOracle
Founded: 1977
United States
www.oracle.com/database/technologies/security/data-masking-subsetting.html
|
Company InformationAmazon
Founded: 1994
United States
aws.amazon.com/marketplace/featured-seller/oracle/
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
|
|
|
|||
|
|
|
|
|
|||
|
|
|
|
|
|||
|
|
|
|
||||
Categories |
Categories |
Categories |
Categories |
|||
Data Security Features
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
|
||||||
Integrations
Oracle Database
AWS IoT Analytics
Amazon S3
Apache Cassandra
Apache Hive
Azure Storage
Elasticsearch
Flexter
IBM Db2
Microsoft Power BI
|
Integrations
Oracle Database
AWS IoT Analytics
Amazon S3
Apache Cassandra
Apache Hive
Azure Storage
Elasticsearch
Flexter
IBM Db2
Microsoft Power BI
|
Integrations
Oracle Database
AWS IoT Analytics
Amazon S3
Apache Cassandra
Apache Hive
Azure Storage
Elasticsearch
Flexter
IBM Db2
Microsoft Power BI
|
Integrations
Oracle Database
AWS IoT Analytics
Amazon S3
Apache Cassandra
Apache Hive
Azure Storage
Elasticsearch
Flexter
IBM Db2
Microsoft Power BI
|
|||
|
|
|
|
|