Data Masking and Data Encryption Are Different
It is a common mistake in the industry to use the terms data masking and data encryption interchangeably to mean the same things. Data masking and data encryption are two distinct processes as we will...
View ArticleEncryption Key Management and Why You Should Care
Encryption key management is one of the most important “basics” for an organization dealing with security and privacy protection. Major data losses and regulatory compliance requirements have prompted...
View ArticleSelecting Personally Identifable Information for Secure Queries (FieldShield...
In the course of protecting personally identifable information (PII) moving into and out of databases, FieldShield and CoSort typically externalize protection of the full table(s) they connect to. That...
View ArticleSecure, Then Splunk – A Format-Preserving Encryption and Pseduonymization...
Introduction: This example demonstrates an older method of using IRI FieldShield to protect sensitive data prior to indexing the data in Splunk. As you will read, FieldShield would process the data...
View ArticleDynamic Data Masking via IRI Chakra Max
IRI Chakra Max is data-centric audit and protection (DCAP) software for managing and protecting information in your databases. It does so through: Setting database access permissions Controlling SQL...
View ArticleIRI Chakra Max Setup Video
Learn how to set up IRI Chakra Max and get the most protection out of your DB firewall with this instructional video. Additional videos on the configuration and use of Chakra Max for database activity...
View ArticleWhich Data Masking Function Should I Use?
According to Simson L. Garfinkel at the NIST Information Access Division’s Information Technology Laboratory, De-identification is not a single technique, but a collection of approaches, algorithms,...
View ArticleDefining Startpoint Data Security
IRI has discussed startpoint security in further detail with the Outlook Series in a segment about data masking. This article defines what we’d like to call “startpoint security” mostly by virtue of a...
View Article
More Pages to Explore .....