Software > Software-News > Implementing CMMC 2.0 Securely: How Modern Data Masking Supports the Protection of CUI!

Implementing CMMC 2.0 Securely: How Modern Data Masking Supports the Protection of CUI!


From Requirements to Implementation: Data-Centric Protection as the Key to CMMC Compliance!

Why Data Detection and Data Masking Are Important for CMMC

Many CMMC controls require organizations to:

Manual processes or isolated tools are usually insufficient for this—especially in hybrid, cloud, or legacy environments, which are common in the defense industry.

Overview of IRI’s Data Detection and Masking Capabilities

IRI offers an integrated approach to protecting sensitive data:

IRI DarkShield

IRI FieldShield / CellShield

IRI Voracity

These tools enable:

Connection between CMMC controls and IRI capabilities

1. Identification of assets and data, CMMC objective: Understand where FCI and CUI are located.

DarkShield scans file systems, databases, documents, or object storage using:

This allows sensitive data to be detected even in PDFs, Office documents, images, or logs.

2. Access control and least privilege, CMMC objective: Restrict access to sensitive data.

IRI approach:

This ensures users see only the data they actually need.

Result: reduced risk from insider threats or excessive data sharing.

3. Data protection and media sanitization, CMMC objective: Prevent unauthorized disclosure of CUI.

IRI approach:

This prevents production data from entering development or test environments.

4. Risk Management, CMMC Objective: Mitigate the impact of a security incident.

IRI Approach:

5. Auditability and Continuous Monitoring, CMMC Objective: Demonstrable compliance.

IRI features:

This enables the provision of audit evidence for CMMC assessments.

Typical use cases in the defense industry

Organizations use data discovery and masking, for example, for:

Conclusion: Ultimately, CMMC compliance means reducing risks to sensitive defense information!

Solutions for data discovery and data masking enable companies to implement these requirements:

A data-centric security approach not only accelerates certification but also strengthens organizations’ security architecture in the long term.

Efficiency meets experience: For more than four decades, our software solutions have been supporting companies in data management and data protection – technologically leading, reliable in productive use and applicable across all industries.

In use since 1978: Numerous well-known companies, service providers, financial institutions and state and federal authorities are among our long-standing customers.

Maximum compatibility: Our software supports both classic mainframe platforms (Fujitsu BS2000/OSD, IBM z/OS, z/VSE, z/Linux) and modern open system environments such as Linux, UNIX derivatives and Windows.

Source: JET-Software GmbH
Press release from 18 Mar. 2026 about the software Voracity
Voracity
Demo version
request URL
Information
directly to the product website
Online demonstration
directly to the product website
Video appointment
request
Success story
directly to the product website
Software exposé
request URL
Prices
directly to the product website
Customers
request URL
E-Mail-Contact