iDiscover™ for Data Discovery
Go beyond normal discovery solutions and find out which users and what programs have access to your sensitive data.
iScramble™ for Static Data Masking
Apply a variety of masking methods to your data while maintaining referential integrity.
iMask™ for Dynamic Data Masking
Apply masking rules to data as it is accessed, depending on the privileges of the user or program attempting to access it.
iMonitor™ for Data Monitoring
Monitor your data, complete with a decision and alerting engine.
iRetire™ for Data Retention
Retire your data by archiving it or otherwise removing it from your system at the end of its lifecycle.