Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.

Description

Netwrix Access Analyzer is an enterprise-grade data protection software that helps organizations secure sensitive data across complex IT environments. It automatically discovers and classifies data across on-premises and cloud platforms, providing complete visibility into where sensitive information resides. The platform identifies access risks by analyzing permissions and highlighting excessive or outdated access rights. It enables organizations to enforce least-privilege principles through automated access governance and delegation to data owners. Netwrix Access Analyzer also simplifies compliance by generating audit-ready reports and maintaining detailed audit trails. The solution supports over 40 data sources, including Active Directory, Microsoft 365, databases, and file systems. It provides real-time monitoring of user activity, helping detect suspicious behavior and potential threats early. The platform automates governance tasks such as deprovisioning and cleanup to reduce IT workload. It also helps organizations manage risks associated with AI tools by controlling access to sensitive data. With centralized visibility and automation, it improves overall data security posture. Overall, it enables organizations to proactively protect data and reduce their attack surface.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Altibase
Amazon Redshift
Amazon Web Services (AWS)
Apache Kafka
Cloudera
DataStax
Eclipse IDE
GitHub
GitLab
Greenplum
Hadoop
IBM Db2
IRI DMaaS
Microsoft Word
Netwrix Auditor
PostgreSQL
Red Hat Enterprise Linux
SAP HANA
Ubuntu

Integrations

Altibase
Amazon Redshift
Amazon Web Services (AWS)
Apache Kafka
Cloudera
DataStax
Eclipse IDE
GitHub
GitLab
Greenplum
Hadoop
IBM Db2
IRI DMaaS
Microsoft Word
Netwrix Auditor
PostgreSQL
Red Hat Enterprise Linux
SAP HANA
Ubuntu

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

$10.00/one-time/user
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IRI, The CoSort Company

Founded

1978

Country

United States

Website

www.iri.com/products/voracity

Vendor Details

Company Name

Netwrix

Founded

2006

Country

United States

Website

netwrix.com/en/products/access-analyzer/

Product Features

Big Data

Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates

Data Analysis

Data Discovery
Data Visualization
High Volume Processing
Predictive Analytics
Regression Analysis
Sentiment Analysis
Statistical Modeling
Text Analytics

Data Cleansing

Address/ZIP Code Cleaning
Charting
Data Consolidation / ETL
Data Mapping
Multi Data Format Support
Phone/Email Validation
Raw Data Ingestion
Sample Testing
Validation / Matching / Reconciliation

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Management Platforms (DMP)

Ad Network Integration
Analytics / ROI Tracking
Audience Targeting
Behavioral Analytics
CRM
Campaign Management
Competitive Analysis
Customer Journey Mapping
Data Capture / Transfer
Data Classification
Data Visualization

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

ETL

Data Analysis
Data Filtering
Data Quality Control
Job Scheduling
Match & Merge
Metadata Management
Non-Relational Transformations
Version Control

Product Features

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Alternatives

IRI FieldShield Reviews

IRI FieldShield

IRI, The CoSort Company

Alternatives

IRI Data Manager Reviews

IRI Data Manager

IRI, The CoSort Company
Semarchy xDM Reviews

Semarchy xDM

Semarchy
IRI DarkShield Reviews

IRI DarkShield

IRI, The CoSort Company
IRI CoSort Reviews

IRI CoSort

IRI, The CoSort Company