Compare the Top Data De-Identification Tools that integrate with Docker as of July 2025

This a list of Data De-Identification tools that integrate with Docker. Use the filters on the left to add additional filters for products that have integrations with Docker. View the products that work with Docker in the table below.

What are Data De-Identification Tools for Docker?

Data de-identification tools are designed to remove potentially identifiable information from datasets. These tools can be used to ensure that data is anonymized and compliant with data privacy regulations, such as GDPR. Data de-identification methods typically involve techniques like suppressing or masking of certain pieces of data. Other methods like pseudonymization, tokenization, and randomization may also be used in order to completely obfuscate the original data while still allowing analysis of the remaining dataset. Furthermore, some advanced data de-identification software includes additional features for monitoring access and preventing unauthorized use of sensitive personal information. In summary, data de-identification tools provide organizations with ways to ensure compliance by removing personally identifiable information from their datasets before sharing or publishing them publicly. Compare and read user reviews of the best Data De-Identification tools for Docker currently available using the table below. This list is updated regularly.

  • 1
    Databunker

    Databunker

    Databunker

    Databunker is a lightning-fast, open-source vault developed in Go for secure storage of sensitive personal records. Protect user records from SQL and GraphQL injections with a simple API. Streamline GDPR, HIPAA, ISO 27001, and SOC2 compliance. Databunker is a special secure storage system designed to protect: - Personally Identifiable Information (PII) - Protected Health Information (PHI) - Payment Card Industry (PCI) data - Know Your Customer (KYC) records
    Starting Price: Free
  • 2
    STRM

    STRM

    STRM

    Creating and managing data policies is a slow pain. With PACE by STRM, you can make sure data is used securely. Apply data policies through code, wherever it lives. Farewell to long waits and costly meetings, meet your new open source data security engine. Data policies aren't just about controlling access; they are about extracting value from data with the right guardrails. PACE lets you collaborate on the why and when automating the how through code. With PACE you can programmatically define and apply data policies across platforms. Integrated into your data platform and catalog (optional), and by leveraging the native capabilities of the stack you already have. PACE enables automated policy application across key data platforms and catalogs to ease your governance processes. Ease the process of policy creation and implementation, centralize control, and decentralize execution. Fulfill auditing obligations by simply showing how controls are implemented.
    Starting Price: Free
  • 3
    Celantur

    Celantur

    Celantur

    Automatically anonymize faces, license plates, bodies, and vehicles, easy to use and integrate on all platforms. Solve privacy challenges for a wide range of commercial and industrial use cases. Global industry leaders put trust in our products and expertise. We are solving anonymization challenges, so you can focus on your core business. Our team is on your side, helping you on your privacy journey. Data Protection is our core business, and that's why we have strong measures in place to comply with the GDPR and other data protection laws. You can use our cloud service, where all the processing is done on our infrastructure. Or use our Docker container to deploy it on-premise or in your private/public cloud environment. We charge a fee per image or video hour, and you can create a demo account and test it for free. Blur faces, license plates, persons and vehicles on images in seconds with a simple REST call.
  • 4
    Syntho

    Syntho

    Syntho

    Syntho typically deploys in the safe environment of our customers so that (sensitive) data never leaves the safe and trusted environment of the customer. Connect to the source data and target environment with our out-of-the-box connectors. Syntho can connect with every leading database & filesystem and supports 20+ database connectors and 5+ filesystem connectors. Define the type of synthetization you would like to run, realistically mask or synthesize new values, automatically detect sensitive data types. Utilize and share the protected data securely, ensuring compliance and privacy are maintained throughout its usage.
  • Previous
  • You're on page 1
  • Next