Quantcast
Channel: data security – IRI
Browsing all 8 articles
Browse latest View live

Data Masking and Data Encryption Are Different

It is a common mistake in the industry to use the terms data masking and data encryption interchangeably to mean the same things.  Data masking and data encryption are two distinct processes as we will...

View Article



Encryption Key Management and Why You Should Care

Encryption key management is one of the most important “basics” for an organization dealing with security and privacy protection.  Major data losses and regulatory compliance requirements have prompted...

View Article

Selecting Personally Identifable Information for Secure Queries (FieldShield...

In the course of protecting personally identifable information (PII) moving into and out of databases, FieldShield and CoSort typically externalize protection of the full table(s) they connect to. That...

View Article

Secure, Then Splunk – A Format-Preserving Encryption and Pseduonymization...

Introduction: This example demonstrates an older method of using IRI FieldShield to protect sensitive data prior to indexing the data in Splunk. As you will read, FieldShield would process the data...

View Article

Dynamic Data Masking via IRI Chakra Max

IRI Chakra Max is data-centric audit and protection (DCAP) software for managing and protecting information in your databases. It does so through: Setting database access permissions Controlling SQL...

View Article


IRI Chakra Max Setup Video

Learn how to set up IRI Chakra Max and get the most protection out of your DB firewall with this instructional video. Additional videos on the configuration and use of Chakra Max for database activity...

View Article

Which Data Masking Function Should I Use?

According to Simson L. Garfinkel at the NIST Information Access Division’s Information Technology Laboratory, De-identification is not a single technique, but a collection of approaches, algorithms,...

View Article

Defining Startpoint Data Security

IRI has discussed startpoint security in further detail with the Outlook Series in a segment about data masking. This article defines what we’d like to call “startpoint security” mostly by virtue of a...

View Article

Browsing all 8 articles
Browse latest View live




Latest Images