Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Cribl Stream allows you create an observability pipeline that helps you parse and restructure data in flight before you pay to analyze it. You can get the right data in the format you need, at the right place and in the format you want. Translate and format data into any tooling scheme you need to route data to the right tool for the job or all of the job tools. Different departments can choose different analytics environments without the need to deploy new forwarders or agents. Log and metric data can go unused up to 50%. This includes duplicate data, null fields, and fields with zero analytical value. Cribl Stream allows you to trim waste data streams and only analyze what you need. Cribl Stream is the best way for multiple data formats to be integrated into trusted tools that you use for IT and Security. Cribl Stream universal receiver can be used to collect data from any machine source - and to schedule batch collection from REST APIs (Kinesis Firehose), Raw HTTP and Microsoft Office 365 APIs.

Description

Renowned startpoint security software products in the IRI Data Protector suite and IRI Voracity data management platform will: classify, find, and mask personally identifiable information (PII) and other "data at risk" in almost every enterprise data source and sillo today, on-premise or in the cloud. Each IRI data masking tool in the suite -- FieldShield, DarkShield or CellShield EE -- can help you comply (and prove compliance) with the CCPA, CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, and SOC2 in the US, and international data privacy laws like the GDPR, KVKK, LGPD, LOPD, PDPA, PIPEDA and POPI. Co-located and compatible IRI tooling in Voracity, including IRI RowGen, can also synthesize test data from scratch, and produce referentially correct (and optionally masked) database subsets. IRI and its authorized partners around the world can help you implement fit-for-purpose compliance and breach mitigation solutions using these technologies if you need help. ​

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon S3
Amazon EC2
Amazon Kinesis
Apache Tomcat
Azure Blob Storage
Azure Marketplace
Azure Storage
Elasticsearch
Flexter
Google Cloud Storage
IBM Informix
InfluxDB
Microsoft Azure
Microsoft Excel
Oracle Cloud Infrastructure
SAP HANA
SQL Server
Snowflake
Telegraf
erwin Data Intelligence

Integrations

Amazon S3
Amazon EC2
Amazon Kinesis
Apache Tomcat
Azure Blob Storage
Azure Marketplace
Azure Storage
Elasticsearch
Flexter
Google Cloud Storage
IBM Informix
InfluxDB
Microsoft Azure
Microsoft Excel
Oracle Cloud Infrastructure
SAP HANA
SQL Server
Snowflake
Telegraf
erwin Data Intelligence

Pricing Details

Free (1TB / Day)
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Cribl

Founded

2017

Country

United States

Website

cribl.io/stream/

Vendor Details

Company Name

IRI, The CoSort Company

Founded

1978

Country

United States

Website

www.iri.com/products/iri-data-protector

Product Features

Cloud Security

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Log Management

Archiving
Audit Trails
Compliance Reporting
Consolidation
Data Visualization
Event Logs
Network Logs
Remediation
Syslogs
Thresholds
Web Logs

Product Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Alternatives

Alternatives

IRI FieldShield Reviews

IRI FieldShield

IRI, The CoSort Company
IRI DarkShield Reviews

IRI DarkShield

IRI, The CoSort Company
Bindplane Reviews

Bindplane

observIQ
IRI Voracity Reviews

IRI Voracity

IRI, The CoSort Company