Connecting to, and Masking Data, in Salesforce
IRI Workbench users can connect to and manipulate the data in the underlying database in Salesforce using theJDBC and ODBC drivers from CData or Progress Software. Read More
IRI Workbench users can connect to and manipulate the data in the underlying database in Salesforce using theJDBC and ODBC drivers from CData or Progress Software. Read More
One of the primary uses of IRI FieldShield is to encrypt and decrypt sensitive data in database or flat-file columns. FieldShield relies on a passphrase to derive a symmetrical encryption key used at encryption and decryption time. Read More
Usually static data masking is performed on production data at rest so it is stored safely, or when replicated to non-production environments for testing or development purposes. Read More
One of the biggest concerns with releasing a dataset is the risk that a potential attacker can identify the owners of particular records. Even though masking or removing unique identifiers, like names and Social Security Numbers, can reduce that risk substantially, it may still not be enough. Read More
This article looks at sets from an informational processing perspective; what they are; how they are constructed; and, distinct ways in which data can be drawn from sets within IRI software products using the SortCL data definition and processing program; i.e., Read More
Abstract: Amid the still-growing problem of data breaches, and new v3 requirements of the Payment Card Industry Data Security Standard (PCI DSS) in effect, it has never been more important to protect sensitive data properly. Read More
Data Privacy on Fire We’re still seeing data breach headlines burning across news outlets and social media, fast and hot:
The Equifax Breach was Entirely Preventable – Wired States Investigate Experian Data Breach – Krebs on Security ‘Heartbleed’ Bug in OpenSSL Exposes Millions of Online Passwords – Reuters Millions of Target Customers’ Credit, Debit Card Accounts May Be Hit by Data Breach – NBC News Neiman Marcus Data Breach Worse Than First Said – New York Times Retailers Hit by Credit-Data Breach Smaller Than Target’s – Bloomberg NewsAnd the fire burns on. Read More
Submitting one’s credit card details electronically can be disconcerting (e.g., via physical scanner or internet purchase). The personally identifiable information it contains can lead to fraudulent charges, identify theft, and so on. Read More
Hashing and encryption are distinct disciplines, but due to their nature they find harmony in cryptography. This article describes hashing, its synergy with encryption, and uses in IRI FieldShield for enhancing data protection. Read More
One of the best ways to speed up big data processing operations is to not process so much data in the first place; i.e. to eliminate unnecessary data ahead of time. Read More