Alternatives to Kodex

Compare Kodex alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Kodex in 2024. Compare features, ratings, user reviews, pricing, and more from Kodex competitors and alternatives in order to make an informed decision for your business.

  • 1
    Secure Privacy

    Secure Privacy

    Secure Privacy

    Become compliant today with the #1 Cookie & Consent Management Platform (CMP). Secure Privacy is protecting +10000 websites and helping companies to be compliant with CPRA, GDPR, ePRivacy, PIPEDA and other international data privacy laws. Our CMP, as well as our privacy training platform are always updated to meet legal requirements as they evolve. With Secure Privacy, you'll be able to: 1. Fully automate your cookie and consent management needs with our intelligent and integrated solution. 2. Stay up-to-date with GDPR, CPRA and other international data privacy regulations. 3. Safely document, store and filter consent. 4. Comply with the different legal requirements across all your web properties in an easy-to-use platform. We'd be happy to assist you on your compliance journey. You're welcome to schedule a free demo call with us.
    Leader badge
    Compare vs. Kodex View Software
    Visit Website
  • 2
    OneTrust Privacy & Data Governance Cloud
    Go beyond compliance and build trust through transparency, choice, and control. People demand greater control of their data, unlocking an opportunity for organizations to use these moments to build trust and deliver more valuable experiences. We provide privacy and data governance automation to help organizations better understand their data across the business, meet regulatory requirements, and operationalize risk mitigation to provide transparency and choice to individuals. Achieve data privacy compliance faster and build trust in your organization. Our platform helps break down silos across processes, workflows, and teams to operationalize regulatory compliance and enable trusted data use. Build proactive privacy programs rooted in global best practices, not reactive to individual regulations. Gain visibility into unknown risks to drive mitigation and risk-based decision making. Respect individual choice and embed privacy and security by default into the data lifecycle.
  • 3
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 4
    Piiano

    Piiano

    Piiano

    Emerging privacy policies often conflict with the architectures of enterprise systems that were not designed with sensitive data protection in mind. Piiano pioneers data privacy engineering for the cloud, offering the industry’s first personal data protection and management platform to transform how enterprises build privacy-forward architecture and operationalize privacy practices. Piiano provides a pre-built, developer-friendly infrastructure to dramatically ease the adoption or acceleration of enterprise privacy engineering and help developers build privacy-by-design architecture. This engineering infrastructure safeguards sensitive customers’ data, preempts breaches, and helps enterprises comply with privacy regulations as they evolve. The Vault is a dedicated, protected database for centralizing sensitive information that developers can install into enterprise VPC (Virtual Private Cloud). This ensures that the vault–and everything in it–is only accessible to the enterprise.
  • 5
    PHEMI Health DataLab

    PHEMI Health DataLab

    PHEMI Systems

    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden. PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools.
  • 6
    PK Protect

    PK Protect

    PKWARE

    Automate the DSAR response process to meet requirements faster and on budget. Find data that can and/or should legally be archived or deleted due to age or lack of use. Create rules that will delete or redact sensitive data as soon as it is found. Detect and confirm breaches with monitoring, then accurately estimate and report on the breach’s impact. Enable pseudonymization, anonymization, and de-identification of private personal data. Continuously monitor endpoints, servers, and enterprise solutions for privacy data. Organizations are required to keep up with the ever-changing privacy landscape and protect personally identifiable information they interact with. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation. Once PK Privacy discovers data, it can automatically encrypt, mask, redact, delete, or otherwise remediate personal information.
  • 7
    Roseman Labs

    Roseman Labs

    Roseman Labs

    Roseman Labs enables you to encrypt, link, and analyze multiple data sets while safeguarding the privacy and commercial sensitivity of the actual data. This allows you to combine data sets from several parties, analyze them, and get the insights you need to optimize your processes. Tap into the unused potential of your data. With Roseman Labs, you have the power of cryptography at your fingertips through the simplicity of Python. Encrypting sensitive data allows you to analyze it while safeguarding privacy, protecting commercial sensitivity, and adhering to GDPR regulations. Generate insights from personal or commercially sensitive information, with enhanced GDPR compliance. Ensure data privacy with state-of-the-art encryption. Roseman Labs allows you to link data sets from several parties. By analyzing the combined data, you'll be able to discover which records appear in several data sets, allowing for new patterns to emerge.
  • 8
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
    Starting Price: $159 per month
  • 9
    Cloud Compliance

    Cloud Compliance

    Cloud Compliance

    Operationalize privacy compliance and data security on Salesforce with the most comprehensive suite of products. The success of privacy programs requires thorough data inventory and risk assessment. However, most organizations end up overlooking pockets of data and struggle with manual processes and spreadsheets. Our Personal Data Inventory product is designed to automate and streamline DPIA and enterprise data inventory flows. Make it easy for your organization to have an accurate data inventory and clear risk assessment. Most organizations are seeing an increase in privacy right requests. Trying to meet these requests manually is inconsistent, error-prone, and increases the risk of non-compliance. Our Privacy Rights Automation product enables self-service and automates all privacy rights related activities. Mitigate the risk of non-compliance with a standardized and error-free solution.
  • 10
    Anonomatic

    Anonomatic

    Anonomatic

    Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations.
  • 11
    Mage Platform

    Mage Platform

    Mage Data

    Mage Data™ is the leading solutions provider of data security and data privacy software for global enterprises. Built upon a patented and award-winning solution, the Mage platform enables organizations to stay on top of privacy regulations while ensuring security and privacy of data. Top Swiss Banks, Fortune 10 organizations, Ivy League Universities, and Industry Leaders in the financial and healthcare businesses protect their sensitive data with the Mage platform for Data Privacy and Security. Deploying state-of-the-art privacy enhancing technologies for securing data, Mage Data™ delivers robust data security while ensuring privacy of individuals. Visit the website to explore the company’s solutions.
  • 12
    IBM InfoSphere Optim Data Privacy
    IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
  • 13
    Private AI

    Private AI

    Private AI

    Safely share your production data with ML, data science, and analytics teams while safeguarding customer trust. Stop fiddling with regexes and open-source models. Private AI efficiently anonymizes 50+ entities of PII, PCI, and PHI across GDPR, CPRA, and HIPAA in 49 languages with unrivaled accuracy. Replace PII, PCI, and PHI in text with synthetic data to create model training datasets that look exactly like your production data without compromising customer privacy. Remove PII from 10+ file formats, such as PDF, DOCX, PNG, and audio to protect your customer data and comply with privacy regulations. Private AI uses the latest in transformer architectures to achieve remarkable accuracy out of the box, no third-party processing is required. Our technology has outperformed every other redaction service on the market. Feel free to ask us for a copy of our evaluation toolkit to test on your own data.
  • 14
    NMTY Enterprise
    NMTY Enterprise helps you protect all your privacy-sensitive data within your organization, regardless if it is stored in databases or files. Make NMTY Enterprise part of your IT environment and immediately anonymize all data sources that need to be protected. NMTY Enterprise makes it possible to anonymize data regardless of how it is stored, from databases to individual files. Anonymize data stored in a database or in separate files such as CSV and XML. Data is always anonymized directly within the source. This prevents non-anonymized data from being duplicated unnecessarily. Connections to your data sources support integrated authentication and are always encrypted when stored. In addition to anonymizing datasets, it is also possible to directly anonymize data processed within documents and images. Our solutions are developed based on the latest innovations and integrate directly into your existing processes. This way we ensure we always achieve the maximum result.
  • 15
    PieEye

    PieEye

    PieEye

    PieEye simplifies the complex process of managing user consent and compliance with privacy regulations, such as GDPR and CPRA/CCPA. The quickest, easiest, most efficient, and most automated solution for any ecommerce business; large, medium, or small. There is no need to do headstands and spend weeks or even months on tedious compliance work when our platform can get you up and running in minutes. Easy-to-install, easy-to-install, and automate, PieEye allows you to streamline your compliance efforts and focus on what really matters: growing your business. Discover how effortless compliance can be. With more data privacy laws, cookie compliance is more important than ever. Our cutting-edge cookie banner makes your website fully compliant with all regulations, safeguarding your customers’ data rights and protecting you. Our automated platform streamlines the entire process, enabling you to easily manage requests and ensure compliance with all relevant regulations.
    Starting Price: $29 per month
  • 16
    Privacy Analytics

    Privacy Analytics

    Privacy Analytics

    Privacy Analytics provides data anonymization services and software for organizations in the consumer and healthcare industries. We enable you to use your sensitive data assets safely and responsibly for innovation that benefits everyone. With Privacy Analytics you can safely de-identify health data to the highest standard, while preserving its utility. Regulatory deadlines are getting more stringent. Timelines to fulfill data requests are getting tighter. Pressure to uphold your company’s reputation has never been more apparent. The climate around data privacy continues to intensify. Everyone from consumers to regulators are holding organizations accountable. With so many stakeholders demanding more transparency, the pressure for drug makers to safely disclose clinical data and documents has never been higher. And as pressure rises, so too does the bar for privacy. You need solutions that both maximize transparency and protect the privacy of trial participants.
  • 17
    LeapYear

    LeapYear

    LeapYear Technologies

    Differential privacy is a mathematically proven standard of data privacy that ensures all data can be used for analytics and machine learning without the risk of compromising information about individual records. LeapYear’s differentially private system protects some of the world’s most sensitive datasets, including social media data, medical information, and financial transactions. The system ensures analysts, data scientists, and researchers can derive value from all of the data, including data of highly sensitive fields, while protecting all facts about individuals, entities, and transactions. Traditional approaches, such as aggregation, anonymization, or masking degrade data value and can be easily exploited to reconstruct sensitive information. LeapYear’s implementation of differential privacy provides mathematically proven assurances that information about individual records cannot be reconstructed, while also enabling all of the data to be leveraged for reporting
  • 18
    Trūata Calibrate
    Operationalize your data pipelines with privacy-centric data management software. Trūata Calibrate empowers organizations to make data usable while leveraging privacy as a commercial differentiator. Our frictionless, cloud-native software enables businesses to operationalize privacy-compliant data pipelines at speed, so teams can work with data responsibly and confidently. Powered by intelligent automation, Trūata Calibrate facilitates fast and effective risk measurement and mitigation via a centralized dashboard. The platform provides a smart, standardized solution for managing privacy risks and ensures that data can be effectively transformed for safe use right across your business ecosystem. Access dynamic recommendations for data transformation and view privacy-utility impact simulations before performing forensically targeted de-identification to mitigate risks. Transform data to create privacy-enhanced datasets that can be shared or transferred and used responsibly by teams.
    Starting Price: $5,000 per month
  • 19
    Databunker

    Databunker

    Databunker

    Databunker is an open source vault and API that ensures GDPR, HIPAA, ISO 27001, and SOC2 compliance. Protect sensitive user records against GraphQL and SQL injections without the need for expensive custom coding. Databunker acts as a powerful encrypted vault specifically designed to protect sensitive records, including Personally Identifiable Information (PII), personal health information (PHI), and other critical data. Databunker helps organizations meet the data protection requirements of GDPR, HIPAA, SOC2, and ISO 27001 by safeguarding sensitive data from unauthorized access or data breaches. Databunker provides robust access control mechanisms that allow organizations to define and enforce permissions for accessing sensitive data. Databunker offers audit trails and logging features to track and monitor access to sensitive data, providing a comprehensive record of data access and activities.
    Starting Price: Free
  • 20
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 21
    Randtronics DPM easyCipher
    Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database.
  • 22
    Wizuda

    Wizuda

    Wizuda

    Powerful Solutions to revolutionize how your organization shares data internally and externally. Designed with security, compliance and efficiency at its core, Wizuda MFT enables IT to manage the movement of critical data within your organization and with external parties, from one centralized solution. Wizuda MFT scales with your business and provides full end-to-end accountability of all file transfer operations. Provide people in your organization and clients with an easy, secure and compliant way to share sensitive data. With no file size limitations and encryption by default, using insecure alternatives such as USBs can be a thing of the past. Users have the added flexibility of sending emails with Wizuda either straight from their Outlook email or the secure web portal. Wizuda Virtual Data Rooms provide your business with a secure online repository for document storage, collaboration and distribution. Built with ‘privacy by design’, Wizuda VDRs can be set up in minutes.
    Starting Price: $9.99/month/user
  • 23
    Kiprotect

    Kiprotect

    Kiprotect

    KIProtect develops software solutions that help you to process sensitive and personal data in a secure, legally compliant and privacy-friendly manner. Data security and data protection are becoming increasingly important. Unfortunately, they are often neglected, because technical data protection is complex and takes time. We want to change that! With our open source solutions, we help companies to apply modern anonymization and pseudonymization techniques to their data and thus protect it in the best possible way during processing.
  • 24
    K2View

    K2View

    K2View

    At K2View, we believe that every enterprise should be able to leverage its data to become as disruptive and agile as the best companies in its industry. We make this possible through our patented Data Product Platform, which creates and manages a complete and compliant dataset for every business entity – on demand, and in real time. The dataset is always in sync with its underlying sources, adapts to changes in the source structures, and is instantly accessible to any authorized data consumer. Data Product Platform fuels many operational use cases, including customer 360, data masking and tokenization, test data management, data migration, legacy application modernization, data pipelining and more – to deliver business outcomes in less than half the time, and at half the cost, of any other alternative. The platform inherently supports modern data architectures – data mesh, data fabric, and data hub – and deploys in cloud, on-premise, or hybrid environments.
  • 25
    Privacy Bee

    Privacy Bee

    Privacy Bee

    Privacy Bee is the leading external data privacy platform designed specifically for enterprise needs. It provides comprehensive discovery, removal, and monitoring of workforce personal information exposed online - such as names, addresses, phone numbers, emails, IDs, credentials, and more. By scrubbing sensitive employee data from people search sites, marketing lists, court records, forums, code repositories, and thousands of other public data sources, Privacy Bee shuts down the channels cybercriminals use for targeted social engineering, phishing, fraud, and physical threats. Privacy Bee offers tailored packages for different business sizes and needs. Key benefits include: - Reduced risk of security incidents and data breaches caused by employee data exposure. - Protection for executives and high-profile personnel from cyber harassment, doxxing, and stalking. - Mitigation of reputational damage, loss of trust, and legal liability from data breaches.
    Starting Price: $197/year
  • 26
    Bearer

    Bearer

    Bearer

    Automate GDPR compliance by implementing Privacy by Design into your product development processes. Bearer helps you proactively find and fix data security risks and vulnerabilities across your application environment so you can prevent data breaches before they happen. Bearer helps security and development teams implement and monitor their data security policy at scale so they can prevent data breaches. Scan your applications and your infrastructure continuously to map sensitive data flows. Identify, prioritize and assess security risks and vulnerabilities that can lead to a data breach. Monitor your data security policy and empower your developers to fix issues on their own. Bearer’s detection engine supports 120+ data types, including personal, health and financial data, and adapts to your data taxonomy.
  • 27
    Opsware

    Opsware

    Opsware

    Legal and engineering teams are using Opsware to embed privacy workflows across their organizations to simplify compliance with modern privacy laws. No coding is required. Eliminate the tedious work that comes with building data maps and managing vendors. Discover data sources using our fast and reliable data discovery and classification solutions. Trust our automation technology to complete your customers' data requests and consent changes across every data system and vendor. Get your teams on one tool and workflow. Track the flow of personal data across your company to operationalize compliance and get visibility into risk. We cover the workflows required to build out processing records with a single click. Your company data is fully controlled by you. Provision our virtual appliance on-premise so you can ensure that personal data doesn't leave your secure data context. Every business is data first and every company collects personal data.
  • 28
    PrivacyEngine

    PrivacyEngine

    PrivacyEngine

    The easy-to-use data privacy and GDPR software for all your organization’s Data Privacy compliance needs. We’ve put all our data protection experience and expertise into one software-as-a-service platform, to save you time and money when implementing and managing your data privacy compliance program. Organizations using PrivacyEngine can save between €10,000 and €50,000 annually by eliminating legal fees, in addition to slashing the amount of time spent performing essential data privacy-related processes. Whether your organization needs to manage programs for GDPR, CCPA or any other of the emerging data privacy regulations around the world PrivacyEngine has you covered. PrivacyEngine is a complete data privacy software as a service platform incorporating data privacy management & advisory, data privacy training, and vendor assessment. PrivacyEngine takes care of all your privacy management regulatory needs, including managing individuals’ rights, reporting data breaches and incidents.
    Starting Price: €4,399 per year
  • 29
    Secuvy AI

    Secuvy AI

    Secuvy AI

    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 30
    Privacybunker

    Privacybunker

    Privacybunker

    Commercial websites are lead generation machines. Customer data lands in a database, cloud CRM, newsletter service, online support, and other platforms. By law, your business is responsible for all customers' personal data. Privacybunker is an instant, safe, and risk-free solution. Our solution will save you 5 to 7 figures of USD/EUR in support hours reducing human errors. We are committed to privacy adoption and privacy awareness. Privacybunker released Databunker - an open-source, self-hosted, GDPR compliant, secure storage for personal data. Privacybunker provides a free cookie banner check. Privacybunker provides free privacy training for startup developers. PrivacyBunker seeks to re-imagine how privacy works, both for consumers and businesses. We are building a modern automation service that makes privacy simple for everyone. We are engineering, business, and thought leaders from companies such as Checkpoint and RSA Security.
    Starting Price: $230 per month
  • 31
    Viacryp

    Viacryp

    Viacryp

    Experience the convenience of a Trusted Third Party ( TTP ) for the careful pseudonymization of personal data, so that you can perform data analysis within the framework of the GDPR. Our basic service consists of pseudonymizing personal data. For this, we apply the principles of irreversible pseudonyms and thickening of behavior. The pseudonymized data is the source of further processing by our clients. Our filter service offers the possibility to share personal data proportionally and therefore with respect for privacy. We filter the information based on an expertly pseudonymized whitelist and only forward the information of individuals who appear on the whitelist. Viacryp provides privacy advice regarding the protection and security of personal data. Together with our partners, we advise on the measures to be taken as an organization to comply with the frameworks of the GDPR. This concerns both technical measures and organizational and process measures.
  • 32
    Dataships

    Dataships

    Dataships

    Outsource your data privacy compliance. Our Privacy Centre is easy to set up and gives you everything you need to become compliant. Comply. Build a Privacy Center with all you need to comply with global Data Protection laws. Trust. Build trust with your users. All great customer relationships are built on a foundation of brand trust. Policies. We'll help you create your Privacy Policies, Cookie policies, Security Policies, Data Processing Addendums and more. Automate. The Data Privacy landscape is consistently evolving. We'll update your policies for you, if and when necessary. Integrations. We've pre-built all integrations so you don't have to. Seamlessly intergrate with the tools you already use. Access. Leverage our Data Access Gateway to give your customers access to the information you hold on them. Rights fulfillment. Earn your users' respect by showing how you go above and beyond to fulfil their Data Privacy Rights. Automate.
  • 33
    Klaro

    Klaro

    Klaro

    Simple and robust data protection for your website. Klaro is a powerful tool that protects the privacy and data of your visitors and helps you run a GDPR compliant website. Run a scan of your website to learn more. Klaro is simple, unobtrusive and optimized for both mobile devices and desktop browsers. Klaro disturbs your users as little as possible and helps you to process personal data in a completely transparent and legally compliant manner. The Klaro front-end code is licensed under the liberal BSD-3 license, which means you can use it freely for commercial and non-commercial purposes. This allows you to freely customize every aspect of Klaro. Klaro can manage any third-party services and tracking scripts. New services can be added with just a few lines of code. Klaro supports implicit and explicit consent processes and can ensure that no third-party applications are loaded or collect personal data without the user's consent.
    Starting Price: €19 per month
  • 34
    Signatu

    Signatu

    Signatu

    We make software services to support digital businesses create value from personal data in a legal, transparent and secure manner. Signatu is a comprehensive Software-as-a-Service (SaaS) platform for managing privacy on your sites and apps. We provide tools for managing consent, monitoring cookies and 3rd parties, and creating GDPR-compliant Privacy Policies. So you can give your users control, and earn their trust. When you respectfully ask your users for their consent, you build trust. Signatu aims to provide the most comprehensive, easy-to-use, scalable and secure Consent Management Platform in the market. So it's easy for you to build those trust relationships and build your business. Analyze your website and identify 3rd party cookies, beacons and scripts that can collect information from your users. We also identify security flaws in your website that may increase risk of e.g., phishing to your users.
    Starting Price: €50 per month
  • 35
    Datastreams

    Datastreams

    Datastreams.io

    The Datastreams Platform is our state-of-the-art solution to simplify the process of capturing, sharing and managing data within and between organizations. From the initial step of collecting the right data towards getting a trusted personalized data view, our Platform facilitates the journey. Fast through optimized streaming technology, simple due to its patented data capturing capabilities and secured per our privacy by design principles, data collaboration is now available for everyone! The Platform is built upon a core Data Operations Unit (Datastreams Operator) that can be extended with different modules to fulfill specific data and business requirements like data quality checks on your web/mobile platforms or defining and segmenting specific target groups in a compliant way. Designed with IT & business agility in mind, it takes just a couple of days to start data collaborating with connections to data sources.
  • 36
    TrueVault

    TrueVault

    TrueVault

    TrueVault is the first data security company entirely focused on protecting Personally Identifiable Information (PII). TrueVault decouples consumer identity from consumer behavior to eliminate data security risks and compliance liabilities, giving companies only the data they need. As organizations collect and store more data to drive their businesses forward, they are simultaneously increasing their risk and liability. Our attorney-designed software will guide you step-by-step to CCPA compliance. Whether your business is an online store or a SaaS, TrueVault Polaris will get your business to full compliance for a flat rate. If we can’t, we’ll give you a full refund. No questions asked. From getting compliant for the first time to processing consumer requests, TrueVault Polaris will walk you through everything you need to do one step at a time. If you can file your taxes online, you can get your business to full compliance.
  • 37
    BigID

    BigID

    BigID

    BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2
  • 38
    Rixon

    Rixon

    Rixon

    Maximize data security & solve data privacy concerns with the fastest cloud-native vaultless tokenization platform. Knowing your business meets and exceeds compliance requirements gives you the time and peace of mind to focus on what is important for your business. Organizations are faced with increasing operating costs, threats from ransomware, and ongoing compliance audits. Rixon enables you to be safe and confident, giving you the freedom to bring your business value to the world. The Rixon privacy platform drives business outcomes by giving organizations the tools they need to deliver security, compliance, and privacy operations to the business and the applications they support. Rixon eliminates sensitive data exposure within your applications by leveraging our patented tokenization process. Sensitive information is securely ingested and converted into smart security tokens which armor the data from unauthorized data access.
    Starting Price: $99 per month
  • 39
    Informatica Dynamic Data Masking
    Your IT organization can apply sophisticated masking to limit sensitive data access with flexible data masking rules based on a user’s authentication level. Blocking, auditing, and alerting your users, IT personnel, and outsourced teams who access sensitive information, it ensures compliance with your security policies and industry and civil privacy regulations. Easily customize data-masking solutions for different regulatory or business requirements. Protect personal and sensitive information while supporting offshoring, outsourcing, and cloud-based initiatives. Secure big data by dynamically masking sensitive data in Hadoop.
  • 40
    ZenData

    ZenData

    ZenData

    Manage data security & risk across your entire stack. Your customer-facing assets are where the data collection/shaping occurs. Source code with data flows and third-party components. Distrust with how companies handle data arises due to data breaches, sharing/selling of personal information, and targeted advertising without consent, eroding trust between companies and customers. Don’t forfeit your customers’ trust by exposing them to privacy risks. Ensure their individual privacy and also protect your organization’s sensitive information with our data protection plans. Our privacy program will keep all of your company's data safe. And for your enterprise's continuity, our privacy compliance software will safeguard you from paying fines for non-compliance with security policies. Protect your customers' personal information and ensure compliance with global privacy laws with ZenData's no-code platform.
    Starting Price: $299 per month
  • 41
    Xtendr

    Xtendr

    Xtendr

    XtendR unhides detailed, privacy-preserving insights across multiple independent data sources. XtendR enables access to thus far inaccessible data, and protects you during your entire data lifecycle, giving you confidence in complete privacy and regulatory compliance. XtendR is more than anonymity, it’s the critical missing piece for multi-party data sharing with true privacy protection - it is cryptography on duty so you can reach your full potential. The most advanced privacy-enhancing data collaboration technology. Xtendr solved the decades-long cryptography challenge of data sharing between mutually mistrustful parties. Take your business further with an enterprise-grade data protection offering that allows individual organizations to form data partnerships while protecting sensitive data. Data is the currency of our digital age. Some argue that it is replacing oil as the world's most valuable resource and there is no doubt about its growing importance.
  • 42
    Tonic

    Tonic

    Tonic

    Tonic automatically creates mock data that preserves key characteristics of secure datasets so that developers, data scientists, and salespeople can work conveniently without breaching privacy. Tonic mimics your production data to create de-identified, realistic, and safe data for your test environments. With Tonic, your data is modeled from your production data to help you tell an identical story in your testing environments. Safe, useful data created to mimic your real-world data, at scale. Generate data that looks, acts, and feels just like your production data and safely share it across teams, businesses, and international borders. PII/PHI identification, obfuscation, and transformation. Proactively protect your sensitive data with automatic scanning, alerts, de-identification, and mathematical guarantees of data privacy. Advanced sub setting across diverse database types. Collaboration, compliance, and data workflows — perfectly automated.
  • 43
    HoundDog.ai

    HoundDog.ai

    HoundDog.ai

    AI-powered code scanner designed to implement a proactive, shift-left strategy for sensitive data protection and privacy compliance. Product development outpaces privacy teams, leading to a constant need to update outdated data maps, which consumes much of their workload. Use HoundDog.ai’s AI-powered code scanner to continuously detect vulnerabilities (currently overlooked by SAST scanners) where sensitive data is exposed in plaintext through mediums such as logs, files, tokens, cookies, or third-party systems. Get essential context and remediation strategies, such as omitting sensitive data, applying masking or obfuscation, or using UUIDs instead of PII. Receive alerts when new data elements are introduced, based on their sensitivity levels, and prevent out-of-scope product changes from going live to avoid privacy incidents. Eliminate the manual and highly error-prone processes typically associated with security tasks.
    Starting Price: $200 per month
  • 44
    Anonos Data Embassy
    Anonos spent 10 years in the lab, researching and developing Data Embassy to prove that it’s possible to selectively reveal, access and use data with granularity and precision never achieved before. We’ve addressed the shortcomings of data privacy and security point solutions, so organizations can use sensitive information as part of their data-driven initiatives and still be compliant. Data Embassy works by transforming source data into Variant Twins: non-identifiable yet 100% accurate data assets that can be used for specific, authorized purposes. Because multi-level data privacy and security controls are embedded into the data itself and technologically enforced, Variant Twins can travel anywhere and that includes crossing international borders.
  • 45
    2B Advice PrIME

    2B Advice PrIME

    2B Advice

    Designed by data privacy experts for privacy experts, 2B Advice PrIME is a web-based data privacy software & management solution that consolidates all the elements of an effective data protection & privacy program into one, streamlined system. 2B Advice PrIME leads the way in cloud-based compliance and data privacy management software with a rich set of features and tools that makes managing your privacy program simple and efficient. From documenting data flows to training your staff, from performing privacy impact assessments to running privacy audits, 2B Advice PrIME makes everything a snap. Simply follow the process-by-process forms and see your personal data and privacy activity map appear. Link individual data processes directly to corporate policies to track compliance as well. 2B Advice PrIME gives you the tools you need to implement and manage all aspects of your data privacy and security program by providing a simple, integrated system.
    Starting Price: $120 per month
  • 46
    Proteus NextGen Data Privacy
    Proteus NextGen Data Privacy software provides DPOs, Privacy teams and Legal teams with the data privacy management tools required to manage GDPR compliance, CCPA compliance or other data privacy compliance programme, comprehensively and effectively. Designed for enterprise organisations using current, secure technologies, Proteus NextGen is often regarded as the most highly configurable and comprehensive data privacy software on the market. Covering Privacy Impact Assessments, DPIAs, Transfer Impact Assessments, data mapping, reporting (eg Records of Processing Activity reports), Subject Access Request management, breach notification, vendor management, risk assessment and even automated SCC generation to help with Schrems II compliance, plus other features you would and would not expect. With training and consultancy available to get you up and running quickly, we aim for ultimate customer satisfaction. Go to our website to request a demo www.proteuscyber.com
  • 47
    Legally ok

    Legally ok

    Legally ok

    As an all in one data privacy solution, Legally ok consent management platform (CMP) provides transparency and control over all the cookies and similar tracking on your website and webshop. Legally ok CMP helps you establish trust with website visitors while adhering to data protection laws and avoiding potential fines. It has three automated core functions (cookie consent, monitoring, and control) that are simple to set up. With the Legally ok consent management platform, you can achieve true compliance with privacy laws by promoting respectful and transparent data exchange based on user consent.
    Starting Price: €19 per domain per month
  • 48
    TrueZero Tokenization
    TrueZero’s vaultless data privacy API replaces sensitive PII with tokens allowing you to easily reduce the impact of data breaches, share data more freely and securely, and minimize compliance overhead. Our tokenization solutions are leveraged by leading financial institutions. Wherever PII is stored, and however it is used, TrueZero Tokenization replaces and protects your data. More securely authenticate users, validate their information, and enrich their profiles without ever revealing sensitive data (e.g. SSN) to partners, other internal teams, or third-party services. TrueZero minimizes your in-scope environments, speeding up your time to comply by months and saving you potentially millions in build/partner costs. Data breaches cost $164 per breached record, tokenize PII & protect your business from data loss penalties and loss of brand reputation. Store tokens and run analytics in the same way you would with raw data.
  • 49
    DatAnswers

    DatAnswers

    Varonis

    Easily respond to data subject access requests by surfacing personal information across cloud and on-prem files with fast and powerful search. Find any file with personal data in seconds with Varonis’ purpose-built search engine. We instantly surface and collect the information you need for DSARs, right to be forgotten, or e-discovery—all with super lean infrastructure. Our DSAR form uses sophisticated logic on the backend to ensure you get high-fidelity results, so you can avoid false positives (and fines). Keep a pulse on how much data you’ve indexed and any failed documents so that you always know the scope of your searches. Sensitive data creation doesn’t stop and privacy regulations are ever-evolving. Privacy automation can help you stay ahead. Easily see where you have overexposed PII with dynamic dashboards that highlight privacy issues. Reduce the risk of breaches and fines by monitoring for unauthorized access to sensitive information and restricting access to least privilege.
  • 50
    MineOS

    MineOS

    Mine

    💯 The #1-rated Data Privacy & Security platform on G2, custom-built with a people-centric approach to please and empower privacy and compliance professionals. We're so confident you'll love our platform, too, that our PoCs are completely free. Thanks to the fastest implementation time and the highest ROI on the market, companies can strengthen their privacy programs to handle DSARs, RoPA reports, and other privacy tasks faster and get true oversight over user data within days. We’re innovating the sphere so anyone within an organization can use and understand the value of data privacy through: Email Navigator Technology, Continuous Data Classification & Smart Sampling, Mine Radar, Data Mapping, Automated DSR/DSAR, Automated ROPA, DPIA and PIA reports, AI Suggestions, Consent Management, Vendor Risk Assessment. With MineOS, you’re not just investing in data governance, you’re creating a two-way street with your customers to show you respect their digital rights. MineOS.ai
    Starting Price: $0/month