Compare the Top Data Privacy Management Software in the UK as of March 2026 - Page 6

  • 1
    GDPR Plus

    GDPR Plus

    GDPR Plus

    Say goodbye to manual tracking, enable sharing, and secure storing of data. Mighty Trust’s Data Protection Software solutions centralize your accountability requirements for data protection, security, and compliance laws in different jurisdictions. We streamline, centralize, and control everything from consent management to data sharing, allowing your business to operate as a privacy-forward organization. GDPR Plus Software is our data protection & management software containing our proprietary process for GDPR. The product is offered in the cloud, on premises or can be accessed as part of our managed service solution. Our Activity monitoring functionality helps organizations determine who has access to personal data and when it is being accessed or processed. These solutions come with the following features to help manage activity.
  • 2
    Privacy Request

    Privacy Request

    Privacy Request

    Demonstrate and automate compliance for GDPR & CCPA. Build trust with your customers. Simplify & scale privacy at your business. Eliminate the tedious work that comes with building data maps and compliance records. Discover data sources using our fast and reliable data discovery and categorization solutions. Trust our automation technology to complete your customers' data requests and consent changes across every data system and vendor. Track the flow of data to, through and from your company to ensure strict compliance and risk mitigation. We cover all privacy operations from data sources and business processes, to identifying data owners, vendors and stakeholders. We provide a self-service, no-code integration builder that enables your team to build privacy automation into your proprietary or home-brewed systems. No coding or engineering required.
  • 3
    otris privacy

    otris privacy

    otris software

    Control your data protection management with otris privacy, the software solution for internal and external data protection. The system simplifies the ongoing review of all relevant processing operations and guides the structured implementation of measures. Through process automation, otris privacy increases efficiency in analysis, documentation and communication. The implementation of and compliance with the EU Data Protection Regulation (GDPR) is an indispensable part of modern corporate governance. However, a high level of data protection can only be achieved if the topic is not perceived as a burden in the company. Processes and workflows must not be disrupted and employees must not be hindered in their actual work. otris privacy supports internal and external data protection officers in automating and standardizing data protection processes. With the software, you optimize data protection-relevant processes such as the review of processing operations/processing contracts.
  • 4
    Salesforce Privacy Center
    Salesforce Privacy Center is a robust data privacy management solution designed to help businesses comply with privacy laws like the GDPR. It allows users to easily de-identify and delete sensitive data, streamline data subject access requests (DSARs), and simplify customer consent management. The platform features tools like the Preference Manager to manage consent and configure no-code templates for customer communication preferences. By ensuring proper data handling and compliance with privacy regulations, Privacy Center helps businesses mitigate risks while preparing data for applications like Agentforce and Customer 360.
  • 5
    Solvinx

    Solvinx

    USoft

    Solvinx is the future-proof solution that takes care of your privacy administration. It includes four integrated SMART modules that make you compliant with the requirements of the GDPR Privacy Act and other regulations. Solvinx was developed with USoft’s low-code development platform. Within five days, your organization is ready to deploy Solvinx. Using questionnaires and workflows in the SMART PIA module, you can easily carry out privacy impact assessments (DPIA) with full control over the six most important GDPR components. This module provides an accurate process to complete the recording of your privacy management. The software uses smart and proven questionnaires, supported by a sophisticated work process to ensure the GDPR requirements are met in your organization. With the help of described data flows, you can set all standard frameworks and legislation.
  • 6
    Trunomi

    Trunomi

    Trunomi

    Trunomi is the leading Data Privacy platform for businesses who want more than just a compliance suite. Our technology is preferred by businesses for privacy compliance as we are the only platform to offer comprehensive solutions without needing to see, copy or store the PII held by your business. Instead, Trunomi uses only metadata to provide seamless Privacy Services – making it fast and secure to implement and making it a truly Privacy-by-Design service. Automate necessary actions against any data sets when time periods expire – based on rules defined by you. Match personal data records across databases and systems and combine them into a single record. Visualise where data travels across systems, partners and borders, and map where it is stored. Understand where source data ends up in your business, and where it gets copied to and from.
  • 7
    WeControl

    WeControl

    WeControl

    WeControl is a comprehensive platform that makes your journey smooth and simple. We guide you carefully through various GDPR disciplines to help you make your compliance activities controlled and demonstrable. A list of simple tasks and a comprehensive compliance roadmap that guide you through the whole process with a seamless toolset at your fingertips - everything you need in a single dashboard to make GDPR compliance management simple and less time-consuming. Whether you do standard processing, automated profiling or processing special categories of data we are here to guide you step by step through managing all of your Data Protection Impact Assessments (DPIA) with valuable advice on how to safeguard your business and your users.
    Starting Price: €49 per month
  • 8
    DPOrganizer

    DPOrganizer

    DPOrganizer

    As the foundation of privacy management, our data mapping capabilities and connected features give you a birdseye view of what data you hold and how you use it. We help you identify high-risk processing activities and gaps, like lack of a clearly defined purpose, legal basis or retention policy. Thanks to a simple user interface, involving stakeholders is a breeze, no matter their technical skills. Simplify privacy program management and put ongoing planning on autopilot by using Tasks. You can centralise planned activities and schedule execution with timely reminders – giving you time to focus on more impactful initiatives. Educate staff and drive awareness at scale. Take the guesswork out of privacy training with a simple course builder – making course creation easy for you to learn, and even easier for your coworkers to use.
    Starting Price: €3,500 per year
  • 9
    Agility System

    Agility System

    Agility System

    From complex businesses to challenging industries, Agility System powers your processes and operations to deliver efficiency and simplify compliance for the people at the heart of your organization. Our integrated approach is trusted, intuitive and will future-proof your business. The robust pillar to your business that streamlines your document management procedures, lighting up the pathway for your workforce, driving efficiency, compliance and transparency across all of your processes simultaneously. To adapt your business to the new ways of working, our Workflow product can be easily added on to the core system, integrating QHSE modules and automating your processes to support the efficiency of your workforce, from anywhere they may be working. Our business and technical analysts are available, even after training, via email, phone or help desk to support your organization.
  • 10
    BeaconAI

    BeaconAI

    BeaconAI

    Use our managed service and let us do the work so that your team is not tied up with compliance tasks. We tailor our services and solutions to firms of all size and complexity. Developed from the users point of view, our software is simple and beautiful to use. The future as we see it is built on Privacy by Design. We are creating that future right now through our innovative solutions and services. Results matter and we pride ourselves on the partnerships we build with our customers that mean we can deliver outstanding results for them time and time again. We don’t shy away from competition because we offer real unique solutions that are unparalleled. We love to partner and make a real difference by working together.
  • 11
    TerraTrue

    TerraTrue

    TerraTrue

    TerraTrue plugs into the development lifecycle to make sure your company is always compliant. With real-time flags based on the latest laws and your own policies, you and your teams can make informed decisions ahead of every launch. Identify, address, and tackle privacy risks before you ship a product or feature. TerraTrue is simple, intuitive, and built by people who’ve done this before. Our customizable platform integrates with your existing tools and fits your unique business needs. Collaborate and manage approvals across teams, all in one place. We believe privacy programs shouldn’t be difficult to set up and run. Power a full program with TerraTrue out of the box, or use our point-and-click UI to build rich custom workflows in a snap. With TerraTrue, one click tells you everything about what data you collect, who you share it with, and how long you retain it.
  • 12
    Arrka Privacy Management Platform
    The Arrka Privacy Management Platform (APMP) is at the core of Arrka powering all our solutions. The APMP encapsulates deep domain knowhow, nifty technical features & functionalities and expert engines & repositories to empower organizations to be upand about with their privacy & compliance requirements rapidly and to manage & sustain them on an ongoing basis with ease and efficiency. The underlying data layer of APMP – powered by AI – equips organizations with the intelligence they require to manage their risks better. We are often asked what led us to develop the platform. Every, literally every, organization would need to implement privacy. However, where were the resources people & budgets going to come from? Given how rapidly this domain is evolving, finding people with the right expertise and knowledge is always going to be a challenge.
  • 13
    DataWise

    DataWise

    Data Protection People

    Our cybersecurity dashboard, DataWise, has been designed and built to manage Data Protection in a single dashboard. It provides practical features and templates for data protection compliance, allowing organisations to automate and control many of the tasks required to comply with legislation like the Data Protection Act 2018 (DPA) and General Data Protection Regulation (GDPR). We have been busy behind the scenes developing an updated release of DataWise 2.0. The new update is mobile-friendly, simple to use and practical. The cybersecurity dashboard now features a comprehensive register of all your data assets, data processes and risks. Sign up for our newsletter to receive information on the release date!
  • 14
    Infosys Enterprise Data Privacy Suite
    As the value and volume of data grows exponentially, data protection has arisen as a board-level issue and potential upper hand source—not merely a compliance necessity. Without a thorough and successful data administration program, data protection stays a consistent challenge and a potential reputation time bomb. Organizations face increasing pressure from regulators and the commercial center to improve how they gather, use, store and erase individual data (PI). Furthermore, it’s importance will only increase as technology like the Internet of Things (IoT) and Big Data generate more data and insights. Infosys Enterprise Data Privacy Suite (iEDPS) meets enterprise challenges by helping companies protect their private data and adhere to global regulatory standards such as HIPAA, PIPEDA, GLBA, ITAR, and many more.
  • 15
    Privacy Analytics

    Privacy Analytics

    Privacy Analytics

    Privacy Analytics provides data anonymization services and software for organizations in the consumer and healthcare industries. We enable you to use your sensitive data assets safely and responsibly for innovation that benefits everyone. With Privacy Analytics you can safely de-identify health data to the highest standard, while preserving its utility. Regulatory deadlines are getting more stringent. Timelines to fulfill data requests are getting tighter. Pressure to uphold your company’s reputation has never been more apparent. The climate around data privacy continues to intensify. Everyone from consumers to regulators are holding organizations accountable. With so many stakeholders demanding more transparency, the pressure for drug makers to safely disclose clinical data and documents has never been higher. And as pressure rises, so too does the bar for privacy. You need solutions that both maximize transparency and protect the privacy of trial participants.
  • 16
    Piiano

    Piiano

    Piiano

    Emerging privacy policies often conflict with the architectures of enterprise systems that were not designed with sensitive data protection in mind. Piiano pioneers data privacy engineering for the cloud, offering the industry’s first personal data protection and management platform to transform how enterprises build privacy-forward architecture and operationalize privacy practices. Piiano provides a pre-built, developer-friendly infrastructure to dramatically ease the adoption or acceleration of enterprise privacy engineering and help developers build privacy-by-design architecture. This engineering infrastructure safeguards sensitive customers’ data, preempts breaches, and helps enterprises comply with privacy regulations as they evolve. The Vault is a dedicated, protected database for centralizing sensitive information that developers can install into enterprise VPC (Virtual Private Cloud). This ensures that the vault–and everything in it–is only accessible to the enterprise.
  • 17
    SylLab

    SylLab

    SylLab Systems

    SylLab Systems is providing embedded compliance for enterprise data security. Privacy compliance and cybersecurity are expensive and difficult to implement, and many organizations get it wrong. Changes in the architecture, lawyers, consultants are a significant expenditure when facing privacy regulations (HIPAA, GDPR, PDPA, CCPA). Request a demo to learn more. Privacy Regulations are expanding beyond the current framework of IT infrastructure. Adapting to such a change is costly, time-consuming, and requires legal and development expertise. There is a better, more structured approach to data governance that responds and adapts to your complex IT environment, whether it’s on-cloud or on-premise. Take control of your compliance workflow and shape it according to business logic. Learn more about the solution trusted by large financial institutions across the globe.
  • 18
    Qonsent

    Qonsent

    Qonsent

    A clear and concise interface that enables transparent consumer control of personal information, transforming awareness between brand and consumer interactions. Consumer identity is the fundamental building block that powers direct to consumer relationships, enabling personalized ads and tailored experiences. Through our partnership with TransUnion, QONSENT™ enables brands to start a trusted relationship with a validated consumer while integrating with their existing management tools. QONSENT™ consumers experience a simple one time frictionless onboarding process to validate their identity and securing their consent. Trust and transparency are based on a direct, mutual understanding reflected in a clear agreement. In partnership with Ketch, we’ve established the industry’s first SmartQontract enablement platform to capture the mutually agreed value exchange between a brand and a consumer.
  • 19
    IBM InfoSphere Optim Data Privacy
    IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
  • 20
    DataGuard

    DataGuard

    DataGuard

    Achieve your security and compliance goals with DataGuard’s all-in-one platform, designed to simplify compliance with frameworks like ISO 27001, TISAX®, NIS2, SOC 2, GDPR, and the EU Whistleblowing Directive. DataGuard’s iterative risk management enables you to capture all relevant risks, assets and controls to reduce risk exposure from day one. Automated evidence collection and control monitoring ensure ongoing governance to safeguard your organization as it scales. The platform combines AI-powered automation with expert support, reducing manual effort by 40% and fast-tracking certification by 75%. Join 4,000+ companies driving their security and compliance objectives with DataGuard. Disclaimer: TISAX® is a registered trademark of the ENX Association. DataGuard is not affiliated with the ENX Association. We provide Software-as-a-Service and support for the assessment on TISAX® only. The ENX Association does not take any responsibility for any content shown on DataGuard's website
  • 21
    Actifile

    Actifile

    We-Bridge

    Holistic. Automated. Real-time. Actifile automates data risk assessments, ongoing sensitive data monitoring and data protection. Find out how much your company could lose from cyber attack on data. See exactly how your files are moving in the organization and prevent files from leaving your internal network. Encrypt and protect sensitive data to stop data leakage in the event of a ransomware attack. Actifile's client deploys automatically and seamlessly in your organization endpoints. Gain visibility into risks that may expose sensitive data. Reduce organizational risk by making it harder for bad actors to get at your data. Actifile’s Risk Portal displays number of files, number of records and an assessment of the monetary risk the data would pose if a data privacy incident were to happen. Actifile is a 100% software-based solution so that you can get up and running in minutes without purchasing dedicated hardware to run it.
  • 22
    SeaCat

    SeaCat

    TeskaLabs

    Cyber-security and data privacy platform for mobile and IoT applications. Build and operate the app free from any cyber-security incident. SeaCat is a cyber-security platform created by experts, and it features all cyber-security and data privacy must-haves. SeaCat deployment is smooth and hassle-free. SeaCat improves your security level instantly, with no need for custom development. Cyber-security should not come at the cost of the user experience. SeaCat requires no pesky configurations or procedures on the part of the user; SeaCat employs all modern cyber-security features, such as biometrical authorization,  and hardware security modules. SeaCat cyber-security platform consists of a SeaCat SDK that is to be added to a mobile or IoT application, the SeaCat Gateway that is to be installed into the demilitarized zone (DMZ) in front of the application backend servers, and SeaCat PKI that is a service that provides enrolment, access, and identity management.
  • 23
    Nalytics

    Nalytics

    Nalanda Technology

    Since GDPR came into effect, any individual can request access to the personal data a company or organization stores on them. To meet GDPR compliance, these requests, Subject Access Requests (SARs), require to be completed within one month. Nalytics Subject Access Request software (SARs) significantly improves your process around responding on time to a subject access request making it easier, faster, and more cost-effective. Our solution allows you to quickly and easily search across your structured and unstructured documents, files, and emails to find the ‘subject’s’ data, and automatically redact any third-party PII (Personally Identifiable Information) which should not be disclosed. This not only includes Microsoft files, such as Word or Excel, but also emails and their attachments, text files, PDFs, and so on. Images and scanned documents can also be redacted. Nalytics SARs significantly reduces the time spent searching for personal data.
  • 24
    Strac

    Strac

    Strac

    Strac is a 1-stop shop for all things PII (Personally Identifiable Information). Strac is a Data Loss Prevention software that protects businesses from security and compliance risks by a) automatically detecting and redacting sensitive data across all communication channels like email, slack, zendesk, google drive, one drive, intercom, etc. and b) protecting sensitive data on front end apps and backend servers such that sensitive data never touches servers. Integrate with your SaaS apps in minutes, eliminate data leaks and be compliant with PCI, SOC 2, HIPAA, GDPR, CCPA. Strac's accurate machine learning models, real time notifications, unique redaction experience saves employees time and very productive.
  • 25
    Getvisibility

    Getvisibility

    Getvisibility

    Getvisibility's customizable AI revolutionizes the DSPM landscape. With cutting-edge algorithms and user-friendly interfaces, it empowers businesses to unlock unprecedented insights, optimize performance, and detect anomalies in real time. Experience the power of tailored solutions that elevate your DSPM capabilities to new heights. Using AI and machine learning, Getvisibility provides the fastest and most accurate data discovery and classification platform. Our AI Models are trained on Industry-specific knowledge allowing you to quickly and accurately classify all of your data. Getvisibilities OCR capabilities enable organizations to see within pictures and images. Through our cutting-edge AI models, developed specifically for your security needs, our platform empowers your organization to swiftly identify your most sensitive data. With our advanced algorithms, Getvisibility enables the precise identification of protected surfaces, including personally identifiable information (PII).
  • 26
    Tumult Analytics

    Tumult Analytics

    Tumult Analytics

    Built and maintained by a team of differential privacy experts, and running in production at institutions like the U.S. Census Bureau. Runs on Spark and effortlessly supports input tables containing billions of rows. Supports a large and ever-growing list of aggregation functions, data transformation operators, and privacy definitions. Perform public and private joins, filters, or user-defined functions on your data. Compute counts, sums, quantiles, and more under multiple privacy models. Differential privacy is made easy, thanks to our simple tutorials and extensive documentation. Tumult Analytics is built on our sophisticated privacy foundation, Tumult Core, which mediates access to sensitive data and means that every program and application comes with an embedded proof of privacy. Built by composing small, easy-to-review components. Provably safe stability tracking and floating-point primitives. Uses a generic framework based on peer-reviewed research.
  • 27
    NMTY Enterprise
    NMTY Enterprise helps you protect all your privacy-sensitive data within your organization, regardless if it is stored in databases or files. Make NMTY Enterprise part of your IT environment and immediately anonymize all data sources that need to be protected. NMTY Enterprise makes it possible to anonymize data regardless of how it is stored, from databases to individual files. Anonymize data stored in a database or in separate files such as CSV and XML. Data is always anonymized directly within the source. This prevents non-anonymized data from being duplicated unnecessarily. Connections to your data sources support integrated authentication and are always encrypted when stored. In addition to anonymizing datasets, it is also possible to directly anonymize data processed within documents and images. Our solutions are developed based on the latest innovations and integrate directly into your existing processes. This way we ensure we always achieve the maximum result.
  • 28
    PK Protect
    PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. The platform integrates with various systems to provide a unified approach to managing data security across cloud, on-premises, and hybrid environments. By offering real-time visibility and proactive threat detection, PK Protect helps organizations maintain control over their sensitive data and reduce security vulnerabilities.
  • 29
    Anonomatic

    Anonomatic

    Anonomatic

    Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations.
  • 30
    Kodex

    Kodex

    Kodex

    Privacy engineering is an emerging field that has intersections with data engineering, information security, software development, and privacy law. Its goal is to ensure that personal data is stored and processed in a legally compliant way that respects and protects the privacy of the individuals this data belongs in the best possible way. Security engineering is on one hand a requirement for privacy engineering but also an independent discipline that aims to guarantee the secure processing and storage of sensitive data in general. If your organization processes data that is either sensitive or personal (or both), you need privacy & security engineering. This is especially true if you do your own data engineering or data science.
MongoDB Logo MongoDB