{"id":6249,"date":"2014-11-10T16:29:16","date_gmt":"2014-11-10T21:29:16","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=6249"},"modified":"2021-01-25T12:20:12","modified_gmt":"2021-01-25T17:20:12","slug":"introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/","title":{"rendered":"IRI CellShield Secures Sensitive Data in Excel [video]"},"content":{"rendered":"<p><em>This is an introduction to <a title=\"CellShield Product Page\" href=\"http:\/\/www.iri.com\/products\/cellshield\" target=\"_blank\" rel=\"noopener\">IRI CellShield<\/a>. Subsequent blogs will demonstrate the different functions in CellShield: <a title=\"CellShield Masks Sensitive Data in Your Excel Spreadsheets Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/protect-sensitive-data-excel-spreadsheets-cellshield\/\" target=\"_blank\" rel=\"noopener\">data masking<\/a>, <a title=\"Encrypt\/Decrypt Sensitive Data in Excel Spreadsheets Using CellShield Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\" target=\"_blank\" rel=\"noopener\">encryption<\/a>, and <a title=\" Pseudonymize Your Sensitive Excel Data with CellShield Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\" target=\"_blank\" rel=\"noopener\">pseudonymization<\/a>. \u00a0If you&#8217;re interested in finding, classifying, or masking PII in databases or flat files, check out <a href=\"https:\/\/www.iri.com\/products\/fieldshield\">IRI FieldShield<\/a>. For semi-structured and unstructured text (log, email, .pdf, etc.) files, see <a href=\"https:\/\/www.iri.com\/products\/darkshield\">IRI DarkShield<\/a>.<\/em><\/p>\n<p>Protecting sensitive data is certainly a top-of-mind issue for large retailers, medical facilities, and financial institutions. We have posited in <a href=\"http:\/\/www.iri.com\/blog\/data-protection\/beyond-the-breach\/\" target=\"_blank\" rel=\"noopener\"><em>Breached But Still Protected<\/em><\/a> that the threat of criminals trying to break protection barriers into data centers will only grow. And despite the number of security measures deployed, there will be even smarter attempts to breach the protected data, and the more layers of protection, the better.<\/p>\n<p>Financial institutions have social security numbers, account numbers, and transaction histories, that have to remain secure. Healthcare providers, and those managing their data, are required under HIPAA to de-identify key elements, or protected health information (PHI) at rest. And, retailers must protect credit card \/ primary account number (PAN) and credit details for their customers to comply with the Payment Card Industry (PCI) Data Security Standard (DSS).<\/p>\n<p>Regardless of the size of the business, these companies have sensitive data they need to protect. They have many methods, structures, and software\/hardware options to store and control their data. Large companies deploy data warehouses and legions of monitored and protected databases &#8212; sometimes combined with encryption and key management appliances &#8212; to better safeguard their contents. Smaller companies may have only one database, or use common tools like Excel spreadsheets to manage their data.<\/p>\n<p>There are enterprise-class data masking products on the market, like <a href=\"http:\/\/www.iri.com\/products\/fieldshield\">IRI FieldShield<\/a>, that are designed to protect sensitive data in large data stores and databases. However, there has not been a robust, targeted data security solution for that data in Excel spreadsheets, until now.<\/p>\n<div style=\"margin: 4% 0px; text-align: center;\"><iframe loading=\"lazy\" width=\"533\" height=\"300\" src=\"https:\/\/www.youtube.com\/embed\/gH2kLu3wlIc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div>\n<p>IRI&#8217;s new CellShield tool is an add-in for Excel 2010 and 2013 that offers some of the same masking and protection functions that FieldShield applies to large files and databases. CellShield&#8217;s algorithms and protection methods are compatible with certain FieldShield encryption, masking, and pseudonymization options. A simple-to-use interface takes you through the steps, and CellShield does the work for you. CellShield can provide for decryption and restoration (from pseudonymization) so that you, or other licensed users, can conceal and reveal data in the same, or different, worksheets.<\/p>\n<p>Because CellShield is a spin-off of FieldShield, it also allows companies who use FieldShield to protect sensitive data in a large data repository, create an Excel output file, and send it to individual users that can decrypt the needed data at their workstations. Conversely, data encrypted in Excel can be uploaded to the central IT department for decryption and use.<\/p>\n<p>CellShield not only can provide an additional layer of protection for corporations using Excel spreadsheets, but it also gives smaller companies and end-users a way to compete on data privacy and comply with the law.<\/p>\n<p>You can find more information and purchase the CellShield add-in <a title=\"CellShield Product Page\" href=\"http:\/\/www.iri.com\/products\/cellshield\" target=\"_blank\" rel=\"noopener\">here<\/a>.\u00a0Subsequent articles in this series contain examples of how <a title=\" CellShield Masks Sensitive Data in Your Excel Spreadsheets Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/protect-sensitive-data-excel-spreadsheets-cellshield\/\" target=\"_blank\" rel=\"noopener\">data masking<\/a>, <a title=\" Encrypt\/Decrypt Sensitive Data in Excel Spreadsheets Using CellShield Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/encryptdecrypt-sensitive-data-excel-spreadsheets-cellshield\/\" target=\"_blank\" rel=\"noopener\">encryption<\/a>, and <a title=\"Pseudonymize Your Sensitive Excel Data with CellShield Blog\" href=\"http:\/\/www.iri.com\/blog\/data-protection\/pseudonymize-sensitive-excel-data-cellshield\/\" target=\"_blank\" rel=\"noopener\">pseudonymization<\/a> are applied to cells in your Excel spreadsheets.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is an introduction to IRI CellShield. Subsequent blogs will demonstrate the different functions in CellShield: data masking, encryption, and pseudonymization. \u00a0If you&#8217;re interested in finding, classifying, or masking PII in databases or flat files, check out IRI FieldShield. For semi-structured and unstructured text (log, email, .pdf, etc.) files, see IRI DarkShield. Protecting sensitive data<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/\" title=\"IRI CellShield Secures Sensitive Data in Excel [video]\">Read More<\/a><\/div>\n","protected":false},"author":5,"featured_media":11717,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,1030],"tags":[597,601,13,99,603,596,520,598,412,604,22,602,599,600],"class_list":["post-6249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-vlog","tag-add-in","tag-custom-data-masking","tag-data-protection-2","tag-decryption","tag-hipaa","tag-iri-cellshield","tag-iri-fieldshield","tag-microsoft-excel","tag-phi","tag-protected-health-information","tag-pseudonymization","tag-restoration","tag-secure-sensitive-data","tag-spreadsheet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IRI CellShield Secures Sensitive Data in Excel [video] - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IRI CellShield Secures Sensitive Data in Excel [video] - IRI\" \/>\n<meta property=\"og:description\" content=\"This is an introduction to IRI CellShield. Subsequent blogs will demonstrate the different functions in CellShield: data masking, encryption, and pseudonymization. \u00a0If you&#8217;re interested in finding, classifying, or masking PII in databases or flat files, check out IRI FieldShield. For semi-structured and unstructured text (log, email, .pdf, etc.) files, see IRI DarkShield. Protecting sensitive dataRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-10T21:29:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-25T17:20:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png\" \/>\n\t<meta property=\"og:image:width\" content=\"909\" \/>\n\t<meta property=\"og:image:height\" content=\"909\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jason Koivu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jason Koivu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/\"},\"author\":{\"name\":\"Jason Koivu\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/c60bc4ff5919427034376979fb2cc8df\"},\"headline\":\"IRI CellShield Secures Sensitive Data in Excel [video]\",\"datePublished\":\"2014-11-10T21:29:16+00:00\",\"dateModified\":\"2021-01-25T17:20:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/\"},\"wordCount\":541,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png\",\"keywords\":[\"add-in\",\"custom data masking\",\"data protection\",\"decryption\",\"HIPAA\",\"IRI CellShield\",\"IRI FieldShield\",\"Microsoft Excel\",\"PHI\",\"protected health information\",\"pseudonymization\",\"restoration\",\"secure sensitive data\",\"spreadsheet\"],\"articleSection\":[\"Data Masking\/Protection\",\"VLOG\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/\",\"name\":\"IRI CellShield Secures Sensitive Data in Excel [video] - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png\",\"datePublished\":\"2014-11-10T21:29:16+00:00\",\"dateModified\":\"2021-01-25T17:20:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png\",\"width\":909,\"height\":909},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IRI CellShield Secures Sensitive Data in Excel [video]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/c60bc4ff5919427034376979fb2cc8df\",\"name\":\"Jason Koivu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/01e97234ff964558ca620a43a0506ef0?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/01e97234ff964558ca620a43a0506ef0?s=96&d=blank&r=g\",\"caption\":\"Jason Koivu\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/jasonk\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IRI CellShield Secures Sensitive Data in Excel [video] - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/","og_locale":"en_US","og_type":"article","og_title":"IRI CellShield Secures Sensitive Data in Excel [video] - IRI","og_description":"This is an introduction to IRI CellShield. Subsequent blogs will demonstrate the different functions in CellShield: data masking, encryption, and pseudonymization. \u00a0If you&#8217;re interested in finding, classifying, or masking PII in databases or flat files, check out IRI FieldShield. For semi-structured and unstructured text (log, email, .pdf, etc.) files, see IRI DarkShield. Protecting sensitive dataRead More","og_url":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/","og_site_name":"IRI","article_published_time":"2014-11-10T21:29:16+00:00","article_modified_time":"2021-01-25T17:20:12+00:00","og_image":[{"width":909,"height":909,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png","type":"image\/png"}],"author":"Jason Koivu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jason Koivu","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/"},"author":{"name":"Jason Koivu","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/c60bc4ff5919427034376979fb2cc8df"},"headline":"IRI CellShield Secures Sensitive Data in Excel [video]","datePublished":"2014-11-10T21:29:16+00:00","dateModified":"2021-01-25T17:20:12+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/"},"wordCount":541,"commentCount":0,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png","keywords":["add-in","custom data masking","data protection","decryption","HIPAA","IRI CellShield","IRI FieldShield","Microsoft Excel","PHI","protected health information","pseudonymization","restoration","secure sensitive data","spreadsheet"],"articleSection":["Data Masking\/Protection","VLOG"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/","url":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/","name":"IRI CellShield Secures Sensitive Data in Excel [video] - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png","datePublished":"2014-11-10T21:29:16+00:00","dateModified":"2021-01-25T17:20:12+00:00","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png","width":909,"height":909},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introducing-iri-cellshield-protect-sensitive-data-excel-spreadsheets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IRI CellShield Secures Sensitive Data in Excel [video]"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/c60bc4ff5919427034376979fb2cc8df","name":"Jason Koivu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/01e97234ff964558ca620a43a0506ef0?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/01e97234ff964558ca620a43a0506ef0?s=96&d=blank&r=g","caption":"Jason Koivu"},"url":"https:\/\/beta.iri.com\/blog\/author\/jasonk\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2014\/11\/cellshield-button.png","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/6249"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=6249"}],"version-history":[{"count":26,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/6249\/revisions"}],"predecessor-version":[{"id":14321,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/6249\/revisions\/14321"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/11717"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=6249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=6249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=6249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}