Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • Satori Reviews & Ratings
    86 Ratings
    Company Website
  • Netwrix Auditor Reviews & Ratings
    296 Ratings
    Company Website
  • ManageEngine EventLog Analyzer Reviews & Ratings
    154 Ratings
    Company Website
  • DocTract Reviews & Ratings
    38 Ratings
    Company Website
  • ManageEngine ADAudit Plus Reviews & Ratings
    397 Ratings
    Company Website
  • Paessler PRTG Reviews & Ratings
    694 Ratings
    Company Website
  • Predict360 Reviews & Ratings
    18 Ratings
    Company Website
  • StandardFusion Reviews & Ratings
    88 Ratings
    Company Website
  • Onspring Reviews & Ratings
    169 Ratings
    Company Website
  • SuperOps Reviews & Ratings
    148 Ratings
    Company Website

What is Security Auditor?

Security Auditor offers a streamlined approach to managing security policies and monitoring file integrity across cloud, on-premise, and hybrid environments, centralizing administration effortlessly. By leveraging agentless technology, it facilitates swift enforcement of compliance with security policies while mitigating risks stemming from misconfigurations, which often lead to data breaches. The software automatically secures newly activated systems and continuously monitors them for any configuration changes that stray from your predefined standards. Users are promptly alerted to any policy breaches and can implement necessary adjustments easily via an intuitive web interface, thereby improving efficiency and simplifying compliance documentation. For those who desire enhanced automation, the FixIt feature enables Security Auditor to autonomously make required adjustments, further optimizing the security landscape. This tool not only makes the identification of issues more efficient but also fortifies security configurations within your evolving cloud infrastructure, ensuring a strong security posture is sustained. In summary, Security Auditor is expertly crafted to boost both security measures and operational productivity across various computing environments, ultimately fostering a more resilient infrastructure.

What is IRI DMaaS?

IRI offers a Data Masking as a Service solution that focuses on safeguarding personally identifiable information (PII). Initially, under a non-disclosure agreement, IRI commits to categorizing, assessing, and documenting the sensitive data within your systems. We will provide a preliminary cost estimate that can be refined collaboratively during the data discovery phase. Next, you will need to securely transfer the vulnerable data to a safe on-premise or cloud staging area, or alternatively, grant IRI remote, supervised access to the data sources in question. Utilizing the award-winning IRI Data Protector suite, we will mask the data in accordance with your specified business rules, whether on a one-time basis or routinely. In the final stage, our specialists can facilitate the transfer of the newly masked data to production replicas or to lower non-production environments, ensuring that the data is now secure for analytics, development, testing, or training purposes. Additionally, if required, we can offer extra services, such as re-identification risk assessments of the de-identified data. This method combines the advantages of established data masking technologies and services, eliminating the need for you to learn and tailor new software from the ground up. Moreover, should you decide to utilize the software internally, it will come fully configured to streamline long-term self-use and adaptation. By partnering with IRI, you can confidently navigate the complexities of data protection while focusing on your core business objectives.

Media

Media

Integrations Supported

Amazon DynamoDB
Amazon S3
Azure Blob Storage
Cloudera
EDB Postgres Advanced Server
Google Cloud Platform
Google Cloud Storage
HP-UX
HPE Ezmeral Data Fabric
Hadoop
IBM Cloud
Microsoft Azure
Microsoft Excel
Microsoft OneDrive
PostgreSQL
Rackspace OpenStack
SQL Server
Snowflake
Splunk Enterprise
erwin Data Catalog

Integrations Supported

Amazon DynamoDB
Amazon S3
Azure Blob Storage
Cloudera
EDB Postgres Advanced Server
Google Cloud Platform
Google Cloud Storage
HP-UX
HPE Ezmeral Data Fabric
Hadoop
IBM Cloud
Microsoft Azure
Microsoft Excel
Microsoft OneDrive
PostgreSQL
Rackspace OpenStack
SQL Server
Snowflake
Splunk Enterprise
erwin Data Catalog

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$1000 per day
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Core Security (Fortra)

Date Founded

1996

Company Location

United States

Company Website

www.coresecurity.com/products/security-auditor

Company Facts

Organization Name

IRI, The CoSort Company

Date Founded

1978

Company Location

United States

Company Website

www.iri.com/solutions/data-masking/dmaas

Categories and Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Policy Management

Approval Process Control
Attestation
Audit Trails
Policy Creation
Policy Library
Policy Metadata Management
Policy Training
Reporting / Analytics
Version Control
Workflow Management

Categories and Features

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Popular Alternatives

Popular Alternatives

IRI Data Protector Suite Reviews & Ratings

IRI Data Protector Suite

IRI, The CoSort Company
IRI Voracity Reviews & Ratings

IRI Voracity

IRI, The CoSort Company