Alternatives to IRI FieldShield

Compare IRI FieldShield alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to IRI FieldShield in 2026. Compare features, ratings, user reviews, pricing, and more from IRI FieldShield competitors and alternatives in order to make an informed decision for your business.

  • 1
    Windocks

    Windocks

    LangGrant

    Windocks is a leader in cloud native database DevOps, recognized by Gartner as a Cool Vendor, and as an innovator by Bloor research in Test Data Management. Novartis, DriveTime, American Family Insurance, and other enterprises rely on Windocks for on-demand database environments for development, testing, and DevOps. Windocks software is easily downloaded for evaluation on standard Linux and Windows servers, for use on-premises or cloud, and for data delivery of SQL Server, Oracle, PostgreSQL, and MySQL to Docker containers or conventional database instances. Windocks database orchestration allows for code-free end to end automated delivery. This includes masking, synthetic data, Git operations and access controls, as well as secrets management. Windocks can be installed on standard Linux or Windows servers in minutes. It can also run on any public cloud infrastructure or on-premise infrastructure. One VM can host up 50 concurrent database environments.
    Compare vs. IRI FieldShield View Software
    Visit Website
  • 2
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 3
    DATPROF

    DATPROF

    DATPROF

    Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
  • 4
    IRI Voracity

    IRI Voracity

    IRI, The CoSort Company

    Voracity is the only high-performance, all-in-one data management platform accelerating AND consolidating the key activities of data discovery, integration, migration, governance, and analytics. Voracity helps you control your data in every stage of the lifecycle, and extract maximum value from it. Only in Voracity can you: 1) CLASSIFY, profile and diagram enterprise data sources 2) Speed or LEAVE legacy sort and ETL tools 3) MIGRATE data to modernize and WRANGLE data to analyze 4) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. Use Voracity to comply with data privacy laws, de-muck and govern the data lake, improve the reliability of your analytics, and create safe, smart test data
  • 5
    IRI Data Protector Suite

    IRI Data Protector Suite

    IRI, The CoSort Company

    The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: ​IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you.
  • 6
    IRI DarkShield

    IRI DarkShield

    IRI, The CoSort Company

    IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.
  • 7
    IRI CellShield
    IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. CellShield EE is the only full-featured, professional data discovery, masking, and auditing package for Excel 2010, 2013, 2016, and 2019 (plus Office 365) workbooks in your LAN. CellShield EE exceeds the security and scope of a single password by combining and automating all these extra capabilities.
    Starting Price: $35 one-time payment
  • 8
    Informatica Persistent Data Masking
    Retain context, form, and integrity while preserving privacy. Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments. As a highly scalable, high-performance data masking solution, Informatica Persistent Data Masking shields confidential data—such as credit card numbers, addresses, and phone numbers—from unintended exposure by creating realistic, de-identified data that can be shared safely internally or externally. It also allows you to reduce the risk of data breaches in nonproduction environments, produce higher-quality test data and streamline development projects, and ensure compliance with data-privacy mandates and regulations.
  • 9
    Libelle DataMasking
    Libelle DataMasking (LDM) is a robust, enterprise-grade data masking solution that automates the anonymization of sensitive or personal data—such as names, addresses, dates, emails, IBANs, credit cards—and transforms them into realistic, logically consistent substitutes that maintain referential integrity across SAP and non‑SAP systems, including Oracle, SQL Server, IBM DB2, MySQL, PostgreSQL, SAP HANA, flat files, and cloud databases. Capable of processing up to 200,000 entries per second and supporting parallelized masking for massive datasets, LDM uses a multithreaded architecture to efficiently read, anonymize, and write data back with high performance. It features over 40 built‑in anonymization algorithms—such as number, alphanumeric, date shifting, name, email, IBAN masking, credit card obfuscation, and mapping algorithms—as well as templates for SAP modules (CRM, ERP, FI/CO, HCM, SD, SRM).
  • 10
    ShieldApps VPN

    ShieldApps VPN

    ShieldApps

    ShieldApps VPN secures the connection between your device, the WiFi hotspot that you have connected to, and the world wide web. ShieldApps VPN is used to protect your online browsing from tracking, information snooping, ip-logging and more, providing you complete anonymity and privacy. ShieldApps VPN uses strong encryption algorithms to mask and falsify your location so you can browse the internet freely, without geographical limitation, censorship or any other restriction. Watch any content, from anywhere. ShieldApps VPN servers are distributed in multiple locations, allowing you to mask your location and use any remote server location you may want from a wide list of options, thus opening unlimited streaming opportunities. Use ShieldApps VPN on your desktop, laptop and android devices. ShieldApps VPN is compatible with multiple operating systems and devices, assuring your privacy wherever and whenever you choose to use it.
    Starting Price: $79.98 per year
  • 11
    Informatica Test Data Management
    We help you discover, create, and subset test data; visualize test data coverage; and protect data so you can focus on development. Automate provisioning of masked, subsetted, and synthetically generated data to meet development and testing needs. Identify sensitive data locations quickly with consistent masking in and across databases. Store, augment, share, and reuse test datasets to improve testers’ efficiency. Provision smaller data sets to minimize infrastructure requirements and speed performance. Use our comprehensive set of masking techniques to consistently protect data across applications. Support packaged applications to ensure solution integrity and speed deployments. Engage risk, compliance, and audit teams to align with data governance initiatives. Improve test efficiency with reliable, trusted production data sets; reduce server and storage footprints with data set sizes targeted for each team.
  • 12
    Informatica Dynamic Data Masking
    Your IT organization can apply sophisticated masking to limit sensitive data access with flexible data masking rules based on a user’s authentication level. Blocking, auditing, and alerting your users, IT personnel, and outsourced teams who access sensitive information, it ensures compliance with your security policies and industry and civil privacy regulations. Easily customize data-masking solutions for different regulatory or business requirements. Protect personal and sensitive information while supporting offshoring, outsourcing, and cloud-based initiatives. Secure big data by dynamically masking sensitive data in Hadoop.
  • 13
    Solix EDMS

    Solix EDMS

    Solix Technologies

    The Solix Enterprise Data Management Suite (Solix EDMS) brings together all the tools for an effective Information Lifecycle Management (ILM) program. From a single web-based console, the platform offers industry-leading database archiving, test data management, data masking, and application retirement solutions. Solix EDMS is designed to control costs, boost application performance and availability, and meet compliance objectives. It offers universal access to all archived data for business users through full-text search, structured SQL queries, forms & reports. Solix EDMS helps you quickly identify infrequently accessed historic data from your production applications, and ‘move’ it to a secure archive with data integrity and access preserved. Retention management holds the archived data for a given period of time, and purges the data automatically, or manually when the data retention policy meets its criteria.
  • 14
    DataVantage

    DataVantage

    DataVantage

    ​DataVantage offers comprehensive data management solutions designed to secure and manage sensitive information across mainframe and distributed environments. Key offerings include DataVantage for IMS, Db2, and VSAM, which provide advanced data masking, editing, and extraction capabilities to protect Personally Identifiable Information (PII) during non-production processes. DataVantage DME (Data Masking Express) offers cost-effective, on-the-fly data masking for Db2, IMS, and VSAM environments, ensuring compliance without disrupting existing workflows. For distributed systems, DataVantage Global delivers robust data masking, obfuscation, and de-identification, supporting compliance and operational efficiency across platforms. Additionally, DataVantage Adviser simplifies COBOL file management post-mainframe rehosting or application modernization, enhancing data accessibility and editing.
  • 15
    Oracle Data Masking and Subsetting
    The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
    Starting Price: $230 one-time payment
  • 16
    K2View

    K2View

    K2View

    At K2View, we believe that every enterprise should be able to leverage its data to become as disruptive and agile as the best companies in its industry. We make this possible through our patented Data Product Platform, which creates and manages a complete and compliant dataset for every business entity – on demand, and in real time. The dataset is always in sync with its underlying sources, adapts to changes in the source structures, and is instantly accessible to any authorized data consumer. Data Product Platform fuels many operational use cases, including customer 360, data masking and tokenization, test data management, data migration, legacy application modernization, data pipelining and more – to deliver business outcomes in less than half the time, and at half the cost, of any other alternative. The platform inherently supports modern data architectures – data mesh, data fabric, and data hub – and deploys in cloud, on-premise, or hybrid environments.
  • 17
    BizDataX

    BizDataX

    Ekobit

    BizDataX is a data masking that provides test data of production-level quality. It enables compliance with GDPR and other regulations by masking customers' identity while preparing data for testers and developers. By using masked/anonymized data instead of production data, the risk is significantly reduced. Focus on policy management, business requirements, sensitive data governance and other regulations. Track inventory of databases, data sources, tables and want to know where sensitive data is located. Manage large customer databases and exchange data with online partner shops and parcel delivery companies. Management of medical records is heavily regulated and regulatory compliance can be achieved with data anonymization.
  • 18
    Qlik Gold Client
    Qlik Gold Client improves the efficiency, cost and security of managing test data in SAP environments. Qlik Gold Client is designed to eliminate development workarounds by easily moving configuration, master, and transactional data subsets into testing environments. Rapidly define, copy and synchronize transactional data from production to non-production targets. Identify, select, and delete non-production data. Manage extensive and powerful data transformations through a clean and easy-to-use interface. Automate data selection and enable hands-free test data refresh cycles, reducing time and effort for test data management. Qlik Gold Client provides several options to protect PII data in non-production environments via data masking. Data masking applies a set of rules to “scramble” your production data when it’s replicated to a non-production environment.
  • 19
    Randtronics DPM easyData
    DPM easyData is a high-performance data spoofing or de-identification engine. Data spoofing examples include masking, tokenization, anonymization, pseudonymization and encryption. DPM data spoofing processes replace whole or parts of sensitive data with a non-sensitive equivalent (creates fake data) and is a very powerful data protection tool. DPM easyData is a software data security solution that allows web and app server applications and databases to tokenize and anonymize data and apply masking policies for unauthorized users when retrieving sensitive data. The software allows a high level of granularity, defining which authorized users have access to which protection policies, and what operations they may perform with those protection policies. DPM easyData is extremely customizable and is able to protect and tokenize many different types of data. The software has been designed to be flexible and users are free to define any format of input data and token format.
  • 20
    Doculayer

    Doculayer

    Doculayer

    Forget about manual content classification and data entry. Doculayer.ai offers a configurable pipeline with document processing services like OCR, document type classification, topic classification, data extraction and data masking. Doculayer.ai puts business users in the driver's seat by making training/learning easy via an intuitive user interface for labeling of documents and data. With our hybrid data extraction approach machine learning models can be combined with rules, patterns and library scripts to obtain better results with less training data in less time. For the protection of sensitive data within documents, data masking can be anonymized or pseudonymized. Doculayer.ai adds document intelligence to your Content Services Platform, Business Process Management systems, and RPA solutions. Supercharge your existing IT environment for document processing with machine learning, natural language processing, and computer vision technologies.
  • 21
    Mage Dynamic Data Masking
    Mage™ Dynamic Data Masking module of the Mage data security platform has been designed with the end customer needs taken into consideration. Mage™ Dynamic Data Masking has been developed working alongside our customers, to address the specific needs and requirements they have. As a result, this product has evolved in a way to meet all the use cases that an enterprise could possibly have. Most other solutions in the market are either a part of an acquisition or are developed to meet only a specific use case. Mage™ Dynamic Data Masking has been designed to deliver adequate protection to sensitive data in production to application and database users while simultaneously integrating seamlessly with an organization's existing IT framework without the requirement of any additional architectural changes.​
  • 22
    VIPRE Internet Shield VPN

    VIPRE Internet Shield VPN

    VIPRE Security Group

    VIPRE Internet Shield VPN is a virtual private network (VPN) service designed to enhance online security and privacy by encrypting internet connections and masking IP addresses. With VIPRE Internet Shield VPN, users can browse securely on public Wi-Fi, keeping their data protected from hackers, trackers, and potential cyber threats. It allows users to select from multiple server locations worldwide, granting access to restricted content and improving anonymity online. The VPN operates with high-speed connections and maintains reliable performance, ensuring smooth streaming and browsing experiences. VIPRE Internet Shield VPN is an ideal solution for anyone looking to protect their online identity, secure their internet activities, and enjoy unrestricted access to global content.
  • 23
    IBM Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • 24
    DOT Anonymizer

    DOT Anonymizer

    DOT Anonymizer

    Mask your personal data while ensuring it looks and acts like real data. Software development needs realistic test data. DOT Anonymizer masks your test data while ensuring its consistency, across all your data sources and DBMS. The use of personal or identifying data outside of production (development, testing, training, BI, external service providers, etc.) carries a major risk of data leak. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. Anonymization enables you to retain the original data format. Your teams work with fictional but realistic data. Manage all your data sources and maintain their usability. Invoke DOT Anonymizer functions from your own applications. Consistency of anonymizations across all DBMS and platforms. Preserve relations between tables to guarantee realistic data. Anonymize all database types and files like CSV, XML, JSON, etc.
    Starting Price: €488 per month
  • 25
    IRI RowGen

    IRI RowGen

    IRI, The CoSort Company

    Stop relying on confidential production data. Masked data may not be realistic or robust enough either. IRI RowGen uses your metadata and business rules to make better test data. Persistent or virtual test sets improve DB/ETL prototypes and speed DevOps. Use the high quality, high volume database, file, report or DataVault targets you create and populate with RowGen's graphical job wizards in in the IRI Workbench IDE (built on Eclipse) to stress-test and future-proof new software and systems. RowGen lets you customize data formats, volumes, ranges, distributions, and other properties on the fly or with re-usable rules that support major goals like application testing and subsetting. RowGen uses the IRI CoSort engine to deliver the fastest generation, transformation, and bulk-load movement of big test data on the market. You can also leverage RowGen functionality in CI/CD pipelines like GitLab, cloned DBs via Windocks et al, and purpose-built TDM hubs from Cigniti or ValueLabs.
    Starting Price: $8000 on first hostname
  • 26
    Data Secure
    Protect your sensitive SAP data. Solve your SAP data security challenges and comply with data privacy legislation such as the EU's. General Data Protection Regulation (GDPR), South Africa's POPI Act and the California Consumer Privacy Act of 2018 (CCPA) with Data Secure™. Data security is critical in today's business environment. Data Secure™, part of EPI-USE Labs' Data Sync Manager™ (DSM) suite, solves your data security challenges. Data Secure is a comprehensive protection solution that comes with pre-defined masking rules. With these rules you can scramble any non-key field in any client-dependent SAP table in a number of different ways (such as mapping table look-up, constant value, clear a field). You can also extend these rules to cover your own particular security needs. Data Secure enables your company to meet all well-known data privacy and protection standards such as the General Data Protection Regulation (GDPR), Sarbanes Oxley and the BDSG (Bundesdatenschutzgesetz).
  • 27
    MaskOff

    MaskOff

    Picom Technologies

    MaskOff is an Android & iOS app to unmask the identity of No Caller ID and unknown callers. The app is available in USA,UK,IL the app based on Call Forwarding function - every No Caller ID that coming by decline the call - it forward to MaskOff services and it unmasked - the number return in push notification or SMS.
  • 28
    EMS Data Generator for MySQL

    EMS Data Generator for MySQL

    EMS Software Development

    EMS Data Generator for MySQL is an impressive tool for generating test data to MySQL database tables with the possibility to save and edit scripts. The utility can help you to simulate the database production environment and allows you to populate several MySQL database tables with test data simultaneously, define tables and fields for generating data, set value ranges, generate MySQL char fields by mask, define lists of values manually or select them from SQL queries, set generation parameters for each field type and has many other features to generate MySQL test data in a simple and direct way. Data Generator for MySQL also provides a console application, which allows you to generate MySQL test data in one-touch by using generation templates.
    Starting Price: $60 per year
  • 29
    IBM InfoSphere Optim Data Privacy
    IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
  • 30
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
    Starting Price: $1000 per day
  • 31
    Mage Static Data Masking
    Mage™ Static Data Masking (SDM) and Test data Management (TDM) capabilities fully integrate with Imperva’s Data Security Fabric (DSF) delivering complete protection for all sensitive or regulated data while simultaneously integrating seamlessly with an organization’s existing IT framework and existing application development, testing and data flows without the requirement for any additional architectural changes.
  • 32
    IRI CoSort

    IRI CoSort

    IRI, The CoSort Company

    What is CoSort? IRI CoSort® is a fast, affordable, and easy-to-use sort/merge/report utility, and a full-featured data transformation and preparation package. The world's first sort product off the mainframe, CoSort continues to deliver maximum price-performance and functional versatility for the manipulation and blending of big data sources. CoSort also powers the IRI Voracity data management platform and many third-party tools. What does CoSort do? CoSort runs multi-threaded sort/merge jobs AND many other high-volume (big data) manipulations separately, or in combination. It can also cleanse, mask, convert, and report at the same time. Self-documenting 4GL scripts supported in Eclipse™ help you speed or leave legacy: sort, ETL and BI tools; COBOL and SQL programs, plus Hadoop, Perl, Python, and other batch jobs. Use CoSort to sort, join, aggregate, and load 2-20X faster than data wrangling and BI tools, 10x faster than SQL transforms, and 6x faster than most ETL tools.
    Starting Price: $4,000 perpetual use
  • 33
    ShieldConex
    Tokenize PAN (primary account number) data and associated PII/PHI data so you maintain compliance for regulations governing the handling of sensitive data. PCI DSS scope reduction across all channels and trusted third parties. Tokenization masks data at the time of input and helps your organization meet evolving security standards. The ShieldConex platform provides vaultless, format-preserving tokenization for every data element. Payment data, including credit or debit card primary account number (PAN), expiration, date, CVV, cardholder name, and more. Standardize the payment experience across businesses, locations and channels including mobile, online, and in-store.
  • 34
    HushHush Data Masking
    Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms.
  • 35
    PolygonScan

    PolygonScan

    PolygonScan

    PolygonScan is a blockchain explorer for the Polygon (Matic) blockchain network. PolygonScan allows you to explore and search the Polygon blockchain for transactions, addresses, tokens, prices and other activities taking place on Polygon. Supports high transaction activity on Polygon. Using PolygonScan, the users will now be able to fetch the data about their tokens, prices, and addresses on the blockchain. You can use Polygonscan to view transactions and addresses on the Polygon (PoS) mainnet. Simply to go Polygonscan.com and use the same wallet address you use on Ethereum. For example, if you use MetaMask, simply copy the address at the top of the MetaMask extension and copy it in the search field on Polygonscan.
  • 36
    Anonomatic

    Anonomatic

    Anonomatic

    Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations.
  • 37
    Syntho

    Syntho

    Syntho

    Syntho typically deploys in the safe environment of our customers so that (sensitive) data never leaves the safe and trusted environment of the customer. Connect to the source data and target environment with our out-of-the-box connectors. Syntho can connect with every leading database & filesystem and supports 20+ database connectors and 5+ filesystem connectors. Define the type of synthetization you would like to run, realistically mask or synthesize new values, automatically detect sensitive data types. Utilize and share the protected data securely, ensuring compliance and privacy are maintained throughout its usage.
  • 38
    Pega Co-Browse
    There are no downloads, no installations, no plug-ins. Just tag your website with a single line of Javascript and customers can share their browser with a single click. With Pega Co-Browse, you can highlight and direct customers easily to the information they need. You can ask the customer to allow you to control their page and guide them or use highlighting features and or visual cues like arrows to point them in the right direction. With Pega Co-Browse, you can specify the sensitive information to be masked with HTML elements or form fields. All masked elements never leave the customer’s browser and are never seen by the representative. Pega Co-Browse provides a no code solution to mask or hide text fields or images. This allows companies to only show the agent the information they want the agent to view. With Pega Co-Browse, you can integrate with Pega Chat or your own chat platform. You can also integrate chat within your Pega Customer Service application.
  • 39
    Honeywell MAXPRO
    The Honeywell MAXPRO VMS/NVR solutions conduct real-time monitoring of people within a building to determine compliance to a building’s customized guidelines on wearing mask and social distancing adherence with deep learning AI capabilities. The advanced analytics provide a very high accuracy, when used in the recommended operating conditions, and can isolate and report any instances of non-compliance to buildings and facilities managers. Currently, most building operators do not have effective ways of monitoring compliance with social distancing and mask guidelines. The easy-to-use interface provides live monitoring and counts the number of people in the field of view of the camera and detects masks or PPE. The solutions report on activity throughout the day so owners and managers can identify usage or issue trends and even manage access control if needed based on non-compliance events.
  • 40
    MetaMask

    MetaMask

    Consensys

    Start exploring blockchain applications in seconds. Trusted by over 1 million users worldwide. Available as a browser extension and as a mobile app, MetaMask equips you with a key vault, secure login, token wallet, and token exchange—everything you need to manage your digital assets. MetaMask provides the simplest yet most secure way to connect to blockchain-based applications. You are always in control when interacting on the new decentralized web. MetaMask generates passwords and keys on your device, so only you have access to your accounts and data. You always choose what to share and what to keep private. MetaMask provides an essential utility for blockchain newcomers, token traders, crypto gamers, and developers. Over a million downloads and counting!
  • 41
    VPN Proxy Master

    VPN Proxy Master

    VPN Proxy Master

    Internet privacy is the first thing that comes to everyone’s mind while surfing the web. Is my data safe? Is someone spying on me or collecting my information? VPN Proxy Master reroutes your traffic through a tunnel with AES 256-bit encryption and masks your online identity by hiding your IP address. Worrying about a slow connection somewhere or getting a tradeoff between a safer or faster VPN service? With VPN Proxy Master, no worries! You can always enjoy ultra-fast and secure connections whether you are in a public space, workplace, school, or at your home. A Virtual Private Network(VPN) provides you with a secure, encrypted tunnel to shield your online activities. As the best VPN for security, VPN Proxy Master is dedicated to protecting your online security and privacy.
    Starting Price: $3.75 per month
  • 42
    AdGuard VPN

    AdGuard VPN

    AdGuard Software Ltd

    AdGuard VPN is a reliable solution designed to protect your online privacy, safeguard sensitive data, and maintain seamless internet operations. With robust encryption and a global network of servers, AdGuard VPN ensures that all company internet traffic is routed securely, shielding your organization from being traced. AdGuard has a reputation of being privacy fanatics, and that means your data gets the highest level of protection. AdGuard’s no-logging policy helps ensure that no user activity is recorded. AdGuard VPN effectively masks IP addresses to ensure anonymity, while also bypassing geo-restrictions and giving access to content from anywhere in the world. You can access restricted resources to satisfy your research, development or market expansion goals. Ideal for remote teams or businesses with a global presence, AdGuard VPN helps secure your digital communications and online operations.
    Starting Price: $1.49 per month
  • 43
    Credal

    Credal

    Credal

    Credal is the safest way to leverage AI at your enterprise. Our APIs, chat UI, and Slackbot automatically mask, redact or warn users about sensitive data, based on policies set by IT. Users get the most powerful AI apps like GPT-4-32k (the private and most powerful version of ChatGPT-4), Claude and others, whilst the Enterprise can control usage with confidence that data is secured and Audit Logged. Credal integrates with enterprise data sources like Google Drive, Confluence, and Slack so employees can seamlessly use AI with their existing knowledge assets whilst respecting source system permissions and masking sensitive data.
    Starting Price: $500 per month
  • 44
    TestBench for IBM i

    TestBench for IBM i

    Original Software

    Testing and test data management for IBM i, IBM iSeries, AS/400. Complex IBM i applications must be checked from top to bottom, right into the data, wherever it is. TestBench IBM i is a comprehensive, proven test data management, verification and unit testing solution that integrates with other solutions for total application quality. Stop copying the entire live database and hone in on the data you really need. Select or sample data with full referential integrity preserved. Simply decide which fields need to be protected and use a variety of obfuscation methods to protect your data. Track every insert, update and delete including intervening data states. Create rules so that data failures are flagged to you automatically. Avoid the painful save/restores and stop attempting to explain bad test results based on poor initial data. Comparing outputs is a well proven method to verify your test results but it can be laborious and prone to error. This unique solution can save hours.
    Starting Price: $1,200 per user per year
  • 45
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
    Starting Price: $159 per month
  • 46
    ByteHide

    ByteHide

    ByteHide

    ByteHide is an all-in-one, developer-first application security platform designed to protect code, secrets, data, and runtime environments, while minimizing your dependencies and risk. It integrates seamlessly with your development workflows and communication tools, delivering key security insights and alerts without disrupting productivity. Operating under a zero-knowledge model, ByteHide uses client-side encryption so only you hold the keys, and it never stores your source code. With minimal, typically read-only permissions, you remain fully in control of what repositories and data sources are analyzed. ByteHide’s core tools include Shield for next-generation code obfuscation and anti-tampering, Secrets for AI-powered secret detection and decentralized management, Monitor for real-time runtime threat detection, and Radar for unified SAST/SCA scanning. These tools run in secure, isolated environments and automatically mask sensitive personal data.
    Starting Price: €39.99 per month
  • 47
    SmartSIP

    SmartSIP

    IntraNext Systems

    SmartSIP® is a premise-based software application that provides a DTMF suppression and masking solution for contact centers to securely capture sensitive cardholder data in live-operator calls. Customers use their touch-tone telephone to enter sensitive information while staying in contact with the contact center agent. With DTMF suppression and masking, tones entered by the customer are replaced with flat tones that cannot be converted back to the original data. Agent screens are populated with a masked representation of the customer's entry. SmartSIP effectively eliminates the verbal exchange of sensitive data between customers and agents allowing for full call recordings and full-screen capture. SmartSIP acts as a SIP proxy between the Session Border Controller (SBC or Media Gateway) and the voice platform and interacts with the DTMF data while never affecting the voice path. Developed specifically for VoIP telephony contact centers.
  • 48
    Steganos VPN Online Shield
    Steganos VPN Online Shield is a German-made VPN that makes it easy to surf anonymously, unblock geo-restricted videos and websites, and protect data on any network by encrypting connections with strong 256-bit AES; it automatically selects optimal servers, lets users choose IP locations worldwide to bypass censorship, and keeps them invisible online by hiding their real IP address. It secures public Wi-Fi, protects sensitive activities like banking and password use, and uniquely extends protection beyond the browser to downloaders, ensuring apps that fetch content also benefit from IP masking. Compatible with all major browsers (Chrome, Firefox, Edge, etc.), it emphasizes digital freedom and privacy without requiring complicated setup: users install, connect, and instantly get uncensored access to content from anywhere. The interface promotes ease of use while delivering real-time anonymity, with continuous updates and support for multiple devices.
    Starting Price: $2.41 per month
  • 49
    Dot Browser
    The browser with privacy at heart. Dot Browser is a privacy-conscious web browser with smarts built-in for protection against trackers and advertisements online. Your data is constantly being sold through large advertisement networks that track what sites you like to visit online. We never send telemetry or crash reports without your consent. Browse our library of thousands of themes and extensions to get Dot just how you like it. We will offer to mask your email address when you sign up for sites or services. Dot is built on top of open-source software meaning the source code is open to anyone. Dot can migrate all your data from your previous browser in just a few clicks. Dot Browser has Dot Shield, which protects you from nasty ads and trackers. We chose Gecko due to its position as the best competitor to Chromium, and because it’s developed by Mozilla, who are best known for their privacy efforts in the community.
  • 50
    Adaptive

    Adaptive

    Adaptive

    Adaptive is a data security platform designed to prevent sensitive data exposure across all human and non-human entities. It offers a secure control plane to protect and access data, featuring an agentless architecture that requires zero network reconfiguration and can be deployed in the cloud or on-premises. The platform enables organizations to share privileged access to data sources without sharing actual credentials, enhancing security posture. It supports just-in-time access to various data sources, including databases, cloud infrastructure resources, data warehouses, and web services. Adaptive also facilitates non-human data access by connecting third-party tools or ETL pipelines through a central interface without exposing data source credentials. To minimize data exposure, the platform provides data masking and tokenization for non-privileged users without altering access workflows. Comprehensive audibility is achieved through identity-based audit trails across all resources.