{"id":9530,"date":"2010-01-01T00:00:05","date_gmt":"2010-01-01T05:00:05","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=9530"},"modified":"2019-04-23T15:30:02","modified_gmt":"2019-04-23T19:30:02","slug":"introduction-to-iri-fieldshield-data-masking","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/","title":{"rendered":"Introduction to IRI FieldShield Data Masking [video]"},"content":{"rendered":"<p><a href=\"https:\/\/www.iri.com\/products\/fieldshield\">IRI FieldShield<\/a> is the fastest, easiest, and most robust <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\">data masking<\/a> solution available for databases and structured (and some semi-structured) files. DBAs, data security, data governance, and compliance teams use FieldShield to find, classify, and protect personally identifiable information (PII) and other sensitive data using static or dynamic data masking functions.<\/p>\n<p>It&#8217;s many data discovery, delivery, de-identification, and risk scoring capabilities help companies and agencies comply with data privacy laws like the GDPR, HIPAA, FERPA, PCI DSS, PIPEDA, POPI, KVKK and standards like PCI DSS. FieldShield is also used to mitigate or nullify data breaches, and to provide persistent or virtualized <a href=\"https:\/\/www.iri.com\/solutions\/test-data#techniques\">test data<\/a> for developers.<\/p>\n<p>Using simple job wizards, diagrams, or 4GL text scripts all supported interchangeably in Eclipse, you can define jobs that differentially apply functions like bit scrambling, encryption, pseudonymization, hashing, redaction, tokenization and many more, or call your own function.<\/p>\n<p>FieldShield deploys, manages, and audits your data masking jobs across the enterprise at half the cost of megavendor tools. Since 2011, companies have relied on FieldShield to lock down their data at risk, so it no longer is. This 4-minute introductory video, last updated in late April 2019, provides more context and technical detail:<\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" width=\"1140\" height=\"641\" src=\"https:\/\/www.youtube.com\/embed\/LuO7bi9uRh4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IRI FieldShield is the fastest, easiest, and most robust data masking solution available for databases and structured (and some semi-structured) files. DBAs, data security, data governance, and compliance teams use FieldShield to find, classify, and protect personally identifiable information (PII) and other sensitive data using static or dynamic data masking functions. It&#8217;s many data discovery,<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/\" title=\"Introduction to IRI FieldShield Data Masking [video]\">Read More<\/a><\/div>\n","protected":false},"author":3,"featured_media":11759,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,29,1030],"tags":[],"class_list":["post-9530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-test-data","category-vlog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introduction to IRI FieldShield Data Masking [video] - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Introduction to IRI FieldShield Data Masking [video] - IRI\" \/>\n<meta property=\"og:description\" content=\"IRI FieldShield is the fastest, easiest, and most robust data masking solution available for databases and structured (and some semi-structured) files. DBAs, data security, data governance, and compliance teams use FieldShield to find, classify, and protect personally identifiable information (PII) and other sensitive data using static or dynamic data masking functions. It&#8217;s many data discovery,Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2010-01-01T05:00:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-23T19:30:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png\" \/>\n\t<meta property=\"og:image:width\" content=\"831\" \/>\n\t<meta property=\"og:image:height\" content=\"458\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"David Friedland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Friedland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/\"},\"author\":{\"name\":\"David Friedland\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\"},\"headline\":\"Introduction to IRI FieldShield Data Masking [video]\",\"datePublished\":\"2010-01-01T05:00:05+00:00\",\"dateModified\":\"2019-04-23T19:30:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/\"},\"wordCount\":214,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png\",\"articleSection\":[\"Data Masking\/Protection\",\"Test Data\",\"VLOG\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/\",\"name\":\"Introduction to IRI FieldShield Data Masking [video] - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png\",\"datePublished\":\"2010-01-01T05:00:05+00:00\",\"dateModified\":\"2019-04-23T19:30:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png\",\"width\":831,\"height\":458},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Introduction to IRI FieldShield Data Masking [video]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\",\"name\":\"David Friedland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"caption\":\"David Friedland\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/davidf\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introduction to IRI FieldShield Data Masking [video] - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/","og_locale":"en_US","og_type":"article","og_title":"Introduction to IRI FieldShield Data Masking [video] - IRI","og_description":"IRI FieldShield is the fastest, easiest, and most robust data masking solution available for databases and structured (and some semi-structured) files. DBAs, data security, data governance, and compliance teams use FieldShield to find, classify, and protect personally identifiable information (PII) and other sensitive data using static or dynamic data masking functions. It&#8217;s many data discovery,Read More","og_url":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/","og_site_name":"IRI","article_published_time":"2010-01-01T05:00:05+00:00","article_modified_time":"2019-04-23T19:30:02+00:00","og_image":[{"width":831,"height":458,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png","type":"image\/png"}],"author":"David Friedland","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Friedland","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/"},"author":{"name":"David Friedland","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a"},"headline":"Introduction to IRI FieldShield Data Masking [video]","datePublished":"2010-01-01T05:00:05+00:00","dateModified":"2019-04-23T19:30:02+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/"},"wordCount":214,"commentCount":0,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png","articleSection":["Data Masking\/Protection","Test Data","VLOG"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/","url":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/","name":"Introduction to IRI FieldShield Data Masking [video] - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png","datePublished":"2010-01-01T05:00:05+00:00","dateModified":"2019-04-23T19:30:02+00:00","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png","width":831,"height":458},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/introduction-to-iri-fieldshield-data-masking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Introduction to IRI FieldShield Data Masking [video]"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a","name":"David Friedland","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","caption":"David Friedland"},"url":"https:\/\/beta.iri.com\/blog\/author\/davidf\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2010\/01\/intro-to-fieldshield.png","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9530"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=9530"}],"version-history":[{"count":9,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9530\/revisions"}],"predecessor-version":[{"id":12820,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9530\/revisions\/12820"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/11759"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=9530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=9530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=9530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}