Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

The Data Security Center (DSC) enables you to easily pinpoint, mask, and safeguard sensitive information across both structured and unstructured datasets. It categorizes risks as high, medium, or low in various stages of data handling, including collection, transmission, storage, sharing, utilization, and deletion. This allows for effective identification of risks, empowering you to take swift actions to bolster data security. Utilizing expert knowledge and Natural Language Processing (NLP), DSC accurately identifies sources of sensitive data. It offers comprehensive protection for structured and unstructured data from diverse origins, such as Object Storage Services, databases, and extensive data sources. With the help of predefined and customizable masking algorithms, DSC minimizes the risk of exposure to sensitive data, thus averting unauthorized access. Additionally, DSC facilitates the discovery, classification, and protection of sensitive data throughout every stage of data lifecycle management, ensuring a robust security framework is maintained. By implementing these measures, DSC not only enhances data protection but also reinforces compliance with data privacy regulations.

Description

IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Altibase
Amazon Web Services (AWS)
Apache Cassandra
Datadog
Docker
Elasticsearch
HPE Ezmeral Data Fabric
Huawei Cloud
IRI CoSort
IRI DMaaS
IRI Fast Extract (FACT)
IRI RowGen
Microsoft Excel
Microsoft Word
MongoDB
Red Hat Enterprise Linux
Snowflake
Splunk Enterprise
erwin Data Catalog

Integrations

Altibase
Amazon Web Services (AWS)
Apache Cassandra
Datadog
Docker
Elasticsearch
HPE Ezmeral Data Fabric
Huawei Cloud
IRI CoSort
IRI DMaaS
IRI Fast Extract (FACT)
IRI RowGen
Microsoft Excel
Microsoft Word
MongoDB
Red Hat Enterprise Linux
Snowflake
Splunk Enterprise
erwin Data Catalog

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Huawei Cloud

Founded

1987

Country

China

Website

www.huaweicloud.com/intl/en-us/product/dsc.html

Vendor Details

Company Name

IRI, The CoSort Company

Founded

1978

Country

United States

Website

www.iri.com/products/voracity

Product Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Product Features

Big Data

Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates

Data Analysis

Data Discovery
Data Visualization
High Volume Processing
Predictive Analytics
Regression Analysis
Sentiment Analysis
Statistical Modeling
Text Analytics

Data Cleansing

Address/ZIP Code Cleaning
Charting
Data Consolidation / ETL
Data Mapping
Multi Data Format Support
Phone/Email Validation
Raw Data Ingestion
Sample Testing
Validation / Matching / Reconciliation

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Management Platforms (DMP)

Ad Network Integration
Analytics / ROI Tracking
Audience Targeting
Behavioral Analytics
CRM
Campaign Management
Competitive Analysis
Customer Journey Mapping
Data Capture / Transfer
Data Classification
Data Visualization

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

ETL

Data Analysis
Data Filtering
Data Quality Control
Job Scheduling
Match & Merge
Metadata Management
Non-Relational Transformations
Version Control

Alternatives

Alternatives

IRI Data Protector Suite Reviews

IRI Data Protector Suite

IRI, The CoSort Company