Compare the Top Data De-Identification Tools that integrate with .NET as of October 2025

This a list of Data De-Identification tools that integrate with .NET. Use the filters on the left to add additional filters for products that have integrations with .NET. View the products that work with .NET in the table below.

What are Data De-Identification Tools for .NET?

Data de-identification tools are designed to remove potentially identifiable information from datasets. These tools can be used to ensure that data is anonymized and compliant with data privacy regulations, such as GDPR. Data de-identification methods typically involve techniques like suppressing or masking of certain pieces of data. Other methods like pseudonymization, tokenization, and randomization may also be used in order to completely obfuscate the original data while still allowing analysis of the remaining dataset. Furthermore, some advanced data de-identification software includes additional features for monitoring access and preventing unauthorized use of sensitive personal information. In summary, data de-identification tools provide organizations with ways to ensure compliance by removing personally identifiable information from their datasets before sharing or publishing them publicly. Compare and read user reviews of the best Data De-Identification tools for .NET currently available using the table below. This list is updated regularly.

  • 1
    Babel Obfuscator

    Babel Obfuscator

    babelfor.NET

    Babel Obfuscator is a powerful protection tool for the Microsoft .NET Framework. Programs written in .NET languages, like C# and Visual Basic .NET, are normally easy to reverse engineer because they compile to MSIL (Microsoft Intermediate Language), a CPU-independent instruction set that is embedded into .NET assemblies, along with metadata allowing the reconstruction of original source code. Babel Obfuscator is able to transform assemblies in order to conceal the code, so reversing is extremely difficult. This transformation process is called obfuscation. Protect your software against reverse engineering to safeguard the intellectual property of your code. Runs on Windows, MAC OSX, and Linux operating systems. Fully managed code encryption and virtualization. Simplify the deploy of your application merging or embedding all dependencies into a single file. Performs code optimization by reducing the overall metadata size and removing unused code.
    Starting Price: €350 one-time payment
  • 2
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 3
    CipherTrust Tokenization

    CipherTrust Tokenization

    Thales Cloud Security

    CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including personally identifiable information (PII). While there are no tokenization standards in the industry, most tokenization solutions fall into one of two architectures: vaultless- or vaulted tokenization Both secure and anonymize sensitive assets. Tokenization software can reside in the data center, big data environments or the cloud. Tokenization can remove card holder data from PCI DSS scope with minimal cost and effort, enabling organizations to save on costs associated with compliance with the industry standard. Modern IT architectures require both use and protection of personally identifiable information (PII). With CipherTrust tokenization, PII protection is gained without encryption key management required by the software developer.
  • Previous
  • You're on page 1
  • Next