Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
The Data Security Center (DSC) enables you to easily pinpoint, mask, and safeguard sensitive information across both structured and unstructured datasets. It categorizes risks as high, medium, or low in various stages of data handling, including collection, transmission, storage, sharing, utilization, and deletion. This allows for effective identification of risks, empowering you to take swift actions to bolster data security. Utilizing expert knowledge and Natural Language Processing (NLP), DSC accurately identifies sources of sensitive data. It offers comprehensive protection for structured and unstructured data from diverse origins, such as Object Storage Services, databases, and extensive data sources. With the help of predefined and customizable masking algorithms, DSC minimizes the risk of exposure to sensitive data, thus averting unauthorized access. Additionally, DSC facilitates the discovery, classification, and protection of sensitive data throughout every stage of data lifecycle management, ensuring a robust security framework is maintained. By implementing these measures, DSC not only enhances data protection but also reinforces compliance with data privacy regulations.
Description
IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™.
Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data:
* profiling and classification
* searching and risk-scoring
* integration and federation
* migration and replication
* cleansing and enrichment
* validation and unification
* masking and encryption
* reporting and wrangling
* subsetting and testing
Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.
API Access
Has API
API Access
Has API
Integrations
Altibase
Amazon Web Services (AWS)
Apache Cassandra
Datadog
Docker
Elasticsearch
HPE Ezmeral Data Fabric
Huawei Cloud
IRI CoSort
IRI DMaaS
Integrations
Altibase
Amazon Web Services (AWS)
Apache Cassandra
Datadog
Docker
Elasticsearch
HPE Ezmeral Data Fabric
Huawei Cloud
IRI CoSort
IRI DMaaS
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Huawei Cloud
Founded
1987
Country
China
Website
www.huaweicloud.com/intl/en-us/product/dsc.html
Vendor Details
Company Name
IRI, The CoSort Company
Founded
1978
Country
United States
Website
www.iri.com/products/voracity
Product Features
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Product Features
Big Data
Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates
Data Analysis
Data Discovery
Data Visualization
High Volume Processing
Predictive Analytics
Regression Analysis
Sentiment Analysis
Statistical Modeling
Text Analytics
Data Cleansing
Address/ZIP Code Cleaning
Charting
Data Consolidation / ETL
Data Mapping
Multi Data Format Support
Phone/Email Validation
Raw Data Ingestion
Sample Testing
Validation / Matching / Reconciliation
Data Discovery
Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics
Data Governance
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Data Management
Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge
Data Management Platforms (DMP)
Ad Network Integration
Analytics / ROI Tracking
Audience Targeting
Behavioral Analytics
CRM
Campaign Management
Competitive Analysis
Customer Journey Mapping
Data Capture / Transfer
Data Classification
Data Visualization
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
ETL
Data Analysis
Data Filtering
Data Quality Control
Job Scheduling
Match & Merge
Metadata Management
Non-Relational Transformations
Version Control