IRI FieldShield vs. Mage™ Dynamic Data Masking

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
IRI FieldShield
Score 0.0 out of 10
N/A
IRI FieldShield® classifies, finds, and shields sensitive column (field) values in DBs (and flat files) with a choice of data masking and anonymization functions in 15 categories, including format-preserving AES encryption, pseudonymization, and reaction. The vendor states that FieldShield has been used by companies and government agencies worldwide, large and small, since 2007 to protect their data at rest and in motion, on premise and in the cloud. They further state that FieldShield was…N/A
Mage™ Dynamic Data Masking
Score 9.3 out of 10
N/A
Mage™ Dynamic Data Masking (formerly Mentis' iMask) module helps users secure a production environment from unauthorized access. It secures sensitive data at the Application Layer and the Database layer by offering flexible approaches that cater to various use cases and types of users – small, medium, and large enterprises.N/A
Pricing
IRI FieldShieldMage™ Dynamic Data Masking
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
IRI FieldShieldMage™ Dynamic Data Masking
Free Trial
YesNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
YesNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Best Alternatives
IRI FieldShieldMage™ Dynamic Data Masking
Small Businesses

No answers on this topic

No answers on this topic

Medium-sized Companies

No answers on this topic

No answers on this topic

Enterprises
Delphix
Delphix
Score 9.2 out of 10
Delphix
Delphix
Score 9.2 out of 10
All AlternativesView all alternativesView all alternatives
User Testimonials
IRI FieldShieldMage™ Dynamic Data Masking
ScreenShots

IRI FieldShield Screenshots

Screenshot of

Mage™ Dynamic Data Masking Screenshots

Screenshot of Ensure your data’s complete protection in production instances by masking sensitive data at both application and database layers. Configure rules within the product UI to enable role-based, user-based, program-based, and location-based access controls on who can access your sensitive data. Maintain data consistency between production and non-production instances by having the flexibility to choose from over 40 anonymization methods (same as those used in the Static Data Masking Module).Screenshot of iMask offers you the ability to control who accesses your sensitive data through the application of authorization rules. Rules can be configured based on user, location, role, and even programs. Ensure complete control over your sensitive data access, and combined with real-time monitoring, enabling a full 360-degree data protection coverage