About
The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources.
Apply their many masking functions consistently for referential integrity:
IRI FieldShield®
Structured Data Masking
FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc.
IRI DarkShield®
Semi & Unstructured Data Masking
DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces.
IRI CellShield®
Excel® Data Masking
CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud.
IRI Data Masking as a Service
IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you.
|
About
The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
|
About
Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access. Discover sensitive and proprietary information in databases across the environment. Improve regulatory compliance by blocking unauthorized access to sensitive data. Address vulnerabilities quickly, with little to no downtime. Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment. Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities, and receive detailed remediation advice. Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment.
|
About
WinSQL is a powerful universal database management tool that is used by 90 percent of Fortune 500 companies and more than a million programmers and DBAs around the globe. WinSQL is a generic querying tool that connects to any relational database (RDBMS) for which an Open Database Connectivity (ODBC) driver is available, virtually all RDBMS on the market today. Connect to a variety of databases, including: heavy duty vendors Oracle, MS SQL Server, DB2, Sybase, Informix to lightweight backends like MS Access, DBase, and Text File. Generate royalty-free executables that can be used by your business users to run queries. These can be either static or dynamic queries that pull fresh data from the back-end. Export or simply open any query results into MS Excel with just a click of your mouse. You can even import an existing Excel spreadsheet to a database table by simply dragging an *.XSL file in the catalog tree.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
CISOs, DBAs, DevOps,
|
Audience
Organizations that need a flexible solution that discovers, masks and subsets sensitive data to safely share across non-production environments
|
Audience
Companies seeking a solution to find and defend databases and the information they contain
|
Audience
Database administrators (DBAs) and programmers
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$230 one-time payment
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$99.00/year/user
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationIRI, The CoSort Company
Founded: 1978
United States
www.iri.com/products/iri-data-protector
|
Company InformationOracle
Founded: 1977
United States
www.oracle.com/database/technologies/security/data-masking-subsetting.html
|
Company InformationTrellix
Founded: 2022
United States
www.trellix.com/products/database-security/
|
Company InformationSynametrics Technologies
Founded: 2002
United States
web.synametrics.com/winsql.htm
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
|
|
||||
|
|
|
|
||||
|
|
|
|
|
|||
|
|
|
|
||||
Categories |
Categories |
Categories |
Categories |
|||
Data Security Features
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
|
Database Features
Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization
|
|||||
Integrations
Actifio
Amazon S3
Azure Storage
Flexter
Google Cloud Platform
IBM Db2
IBM Informix
Microsoft Power BI
Microsoft SharePoint
Microsoft Word
|
Integrations
Actifio
Amazon S3
Azure Storage
Flexter
Google Cloud Platform
IBM Db2
IBM Informix
Microsoft Power BI
Microsoft SharePoint
Microsoft Word
|
Integrations
Actifio
Amazon S3
Azure Storage
Flexter
Google Cloud Platform
IBM Db2
IBM Informix
Microsoft Power BI
Microsoft SharePoint
Microsoft Word
|
Integrations
Actifio
Amazon S3
Azure Storage
Flexter
Google Cloud Platform
IBM Db2
IBM Informix
Microsoft Power BI
Microsoft SharePoint
Microsoft Word
|
|||
|
|
|
|
|