Compare the Top Data De-Identification Tools that integrate with Snowflake as of November 2025

This a list of Data De-Identification tools that integrate with Snowflake. Use the filters on the left to add additional filters for products that have integrations with Snowflake. View the products that work with Snowflake in the table below.

What are Data De-Identification Tools for Snowflake?

Data de-identification tools are designed to remove potentially identifiable information from datasets. These tools can be used to ensure that data is anonymized and compliant with data privacy regulations, such as GDPR. Data de-identification methods typically involve techniques like suppressing or masking of certain pieces of data. Other methods like pseudonymization, tokenization, and randomization may also be used in order to completely obfuscate the original data while still allowing analysis of the remaining dataset. Furthermore, some advanced data de-identification software includes additional features for monitoring access and preventing unauthorized use of sensitive personal information. In summary, data de-identification tools provide organizations with ways to ensure compliance by removing personally identifiable information from their datasets before sharing or publishing them publicly. Compare and read user reviews of the best Data De-Identification tools for Snowflake currently available using the table below. This list is updated regularly.

  • 1
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 2
    STRM

    STRM

    STRM

    Creating and managing data policies is a slow pain. With PACE by STRM, you can make sure data is used securely. Apply data policies through code, wherever it lives. Farewell to long waits and costly meetings, meet your new open source data security engine. Data policies aren't just about controlling access; they are about extracting value from data with the right guardrails. PACE lets you collaborate on the why and when automating the how through code. With PACE you can programmatically define and apply data policies across platforms. Integrated into your data platform and catalog (optional), and by leveraging the native capabilities of the stack you already have. PACE enables automated policy application across key data platforms and catalogs to ease your governance processes. Ease the process of policy creation and implementation, centralize control, and decentralize execution. Fulfill auditing obligations by simply showing how controls are implemented.
    Starting Price: Free
  • 3
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 4
    Informatica Persistent Data Masking
    Retain context, form, and integrity while preserving privacy. Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments. As a highly scalable, high-performance data masking solution, Informatica Persistent Data Masking shields confidential data—such as credit card numbers, addresses, and phone numbers—from unintended exposure by creating realistic, de-identified data that can be shared safely internally or externally. It also allows you to reduce the risk of data breaches in nonproduction environments, produce higher-quality test data and streamline development projects, and ensure compliance with data-privacy mandates and regulations.
  • 5
    Assure Security
    Assure Compliance Monitoring is a bundle of Assure Security features. Together, they can quickly identify security and compliance issues by producing alerts and reports on IBM i system activity, database changes and views of Db2 data. The bundle includes two features which are also available separately. Assure Monitoring and Reporting seamlessly extracts insights from IBM i journal data and delivers alerts and reports on security incidents and compliance deviations. System and database monitoring capabilities are available separately or together. Or, choose to send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. Assure Db2 Data Monitor is a unique, innovative solution that monitors views of highly confidential Db2 data and optionally blocks records from view. Assure Security delivers market-leading IBM i security capabilities that help your organization successfully comply with cybersecurity regulations.
  • 6
    Tonic

    Tonic

    Tonic

    Tonic automatically creates mock data that preserves key characteristics of secure datasets so that developers, data scientists, and salespeople can work conveniently without breaching privacy. Tonic mimics your production data to create de-identified, realistic, and safe data for your test environments. With Tonic, your data is modeled from your production data to help you tell an identical story in your testing environments. Safe, useful data created to mimic your real-world data, at scale. Generate data that looks, acts, and feels just like your production data and safely share it across teams, businesses, and international borders. PII/PHI identification, obfuscation, and transformation. Proactively protect your sensitive data with automatic scanning, alerts, de-identification, and mathematical guarantees of data privacy. Advanced sub setting across diverse database types. Collaboration, compliance, and data workflows — perfectly automated.
  • 7
    Baffle

    Baffle

    Baffle

    Baffle provides universal data protection from any source to any destination to control who can see what data. Enterprises continue to battle cybersecurity threats such as ransomware, as well as breaches and losses of their data assets in public and private clouds. New data management restrictions and considerations on how it must be protected have changed how data is stored, retrieved, and analyzed. Baffle’s aim is to render data breaches and data losses irrelevant by assuming that breaches will happen. We provide a last line of defense by ensuring that unprotected data is never available to an attacker. Our data protection solutions protect data as soon as it is produced and keep it protected even while it is being processed. Baffle's transparent data security mesh for both on-premises and cloud data offers several data protection modes. Protect data on-the-fly as it moves from a source data store to a cloud database or object storage, ensuring safe consumption of sensitive data.
  • 8
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 9
    Mage Platform

    Mage Platform

    Mage Data

    Mage Data™ is the leading solutions provider of data security and data privacy software for global enterprises. Built upon a patented and award-winning solution, the Mage platform enables organizations to stay on top of privacy regulations while ensuring security and privacy of data. Top Swiss Banks, Fortune 10 organizations, Ivy League Universities, and Industry Leaders in the financial and healthcare businesses protect their sensitive data with the Mage platform for Data Privacy and Security. Deploying state-of-the-art privacy enhancing technologies for securing data, Mage Data™ delivers robust data security while ensuring privacy of individuals. Visit the website to explore the company’s solutions.
  • Previous
  • You're on page 1
  • Next