Alternatives to NMTY Enterprise

Compare NMTY Enterprise alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to NMTY Enterprise in 2024. Compare features, ratings, user reviews, pricing, and more from NMTY Enterprise competitors and alternatives in order to make an informed decision for your business.

  • 1
    Source Defense

    Source Defense

    Source Defense

    Source Defense is a mission critical element of web security designed to protect data at the point of input. The Source Defense Platform provides a simple and effective solution for data security and data privacy compliance – addressing threats and risks originating from the increased use of JavaScript, third-party vendors, and open-source code in your web properties. The Platform provides options for securing your own code, as well as addressing a ubiquitous gap in the management of third-party digital supply chain risk – controlling the actions of the third-party, fourth and nth party JavaScript that powers your site experience. The Source Defense Platform protects against all forms of client-side security incidents – keylogging, formjacking, digital skimming, Magecart, etc. – by extending web security beyond the server to the client-side (the browser).
    Partner badge
    Compare vs. NMTY Enterprise View Software
    Visit Website
  • 2
    Secure Privacy

    Secure Privacy

    Secure Privacy

    Become compliant today with the #1 Cookie & Consent Management Platform (CMP). Secure Privacy is protecting +10000 websites and helping companies to be compliant with CPRA, GDPR, ePRivacy, PIPEDA and other international data privacy laws. Our CMP, as well as our privacy training platform are always updated to meet legal requirements as they evolve. With Secure Privacy, you'll be able to: 1. Fully automate your cookie and consent management needs with our intelligent and integrated solution. 2. Stay up-to-date with GDPR, CPRA and other international data privacy regulations. 3. Safely document, store and filter consent. 4. Comply with the different legal requirements across all your web properties in an easy-to-use platform. We'd be happy to assist you on your compliance journey. You're welcome to schedule a free demo call with us.
    Leader badge
    Compare vs. NMTY Enterprise View Software
    Visit Website
  • 3
    Satori

    Satori

    Satori

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.
  • 4
    DATPROF

    DATPROF

    DATPROF

    Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
  • 5
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 6
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
    Starting Price: $159 per month
  • 7
    Databunker

    Databunker

    Databunker

    Databunker is a lightning-fast, open-source vault developed in Go for secure storage of sensitive personal records. Protect user records from SQL and GraphQL injections with a simple API. Streamline GDPR, HIPAA, ISO 27001, and SOC2 compliance. Databunker is a special secure storage system designed to protect: - Personally Identifiable Information (PII) - Protected Health Information (PHI) - Payment Card Industry (PCI) data - Know Your Customer (KYC) records
  • 8
    Aircloak Insights
    Aircloak Insights is a transparent proxy sitting between analysts and the sensitive data they need to work with. Analysts query the system like normal, using SQL or dashboards like Tableau. Aircloak Insights intercepts the query and tailors it to the data backend which may be SQL or a NoSQL big data store. Results are returned via the proxy which ensures they are aggregated and fully anonymized. Aircloak Insights integrates directly in your existing workflow. You can query your sensitive datasets using the query editor in our easy-to-use web interface, Insights Air, or connect using business intelligence tools like Tableau or any other tools or dashboards that know how to communicate using the Postgres Message Protocol. Aircloak Insights also allows you to run queries programmatically using a RESTful API.
  • 9
    Private AI

    Private AI

    Private AI

    Safely share your production data with ML, data science, and analytics teams while safeguarding customer trust. Stop fiddling with regexes and open-source models. Private AI efficiently anonymizes 50+ entities of PII, PCI, and PHI across GDPR, CPRA, and HIPAA in 49 languages with unrivaled accuracy. Replace PII, PCI, and PHI in text with synthetic data to create model training datasets that look exactly like your production data without compromising customer privacy. Remove PII from 10+ file formats, such as PDF, DOCX, PNG, and audio to protect your customer data and comply with privacy regulations. Private AI uses the latest in transformer architectures to achieve remarkable accuracy out of the box, no third-party processing is required. Our technology has outperformed every other redaction service on the market. Feel free to ask us for a copy of our evaluation toolkit to test on your own data.
  • 10
    Mage Platform

    Mage Platform

    Mage Data

    Mage Data™ is the leading solutions provider of data security and data privacy software for global enterprises. Built upon a patented and award-winning solution, the Mage platform enables organizations to stay on top of privacy regulations while ensuring security and privacy of data. Top Swiss Banks, Fortune 10 organizations, Ivy League Universities, and Industry Leaders in the financial and healthcare businesses protect their sensitive data with the Mage platform for Data Privacy and Security. Deploying state-of-the-art privacy enhancing technologies for securing data, Mage Data™ delivers robust data security while ensuring privacy of individuals. Visit the website to explore the company’s solutions.
  • 11
    Anonomatic

    Anonomatic

    Anonomatic

    Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations.
  • 12
    Kodex

    Kodex

    Kodex

    Privacy engineering is an emerging field that has intersections with data engineering, information security, software development, and privacy law. Its goal is to ensure that personal data is stored and processed in a legally compliant way that respects and protects the privacy of the individuals this data belongs in the best possible way. Security engineering is on one hand a requirement for privacy engineering but also an independent discipline that aims to guarantee the secure processing and storage of sensitive data in general. If your organization processes data that is either sensitive or personal (or both), you need privacy & security engineering. This is especially true if you do your own data engineering or data science.
  • 13
    Cloud Compliance

    Cloud Compliance

    Cloud Compliance

    Operationalize privacy compliance and data security on Salesforce with the most comprehensive suite of products. The success of privacy programs requires thorough data inventory and risk assessment. However, most organizations end up overlooking pockets of data and struggle with manual processes and spreadsheets. Our Personal Data Inventory product is designed to automate and streamline DPIA and enterprise data inventory flows. Make it easy for your organization to have an accurate data inventory and clear risk assessment. Most organizations are seeing an increase in privacy right requests. Trying to meet these requests manually is inconsistent, error-prone, and increases the risk of non-compliance. Our Privacy Rights Automation product enables self-service and automates all privacy rights related activities. Mitigate the risk of non-compliance with a standardized and error-free solution.
  • 14
    PieEye

    PieEye

    PieEye

    PieEye simplifies the complex process of managing user consent and compliance with privacy regulations, such as GDPR and CPRA/CCPA. The quickest, easiest, most efficient, and most automated solution for any ecommerce business; large, medium, or small. There is no need to do headstands and spend weeks or even months on tedious compliance work when our platform can get you up and running in minutes. Easy-to-install, easy-to-install, and automate, PieEye allows you to streamline your compliance efforts and focus on what really matters: growing your business. Discover how effortless compliance can be. With more data privacy laws, cookie compliance is more important than ever. Our cutting-edge cookie banner makes your website fully compliant with all regulations, safeguarding your customers’ data rights and protecting you. Our automated platform streamlines the entire process, enabling you to easily manage requests and ensure compliance with all relevant regulations.
    Starting Price: $29 per month
  • 15
    HushHush Data Masking
    Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms.
  • 16
    LeapYear

    LeapYear

    LeapYear Technologies

    Differential privacy is a mathematically proven standard of data privacy that ensures all data can be used for analytics and machine learning without the risk of compromising information about individual records. LeapYear’s differentially private system protects some of the world’s most sensitive datasets, including social media data, medical information, and financial transactions. The system ensures analysts, data scientists, and researchers can derive value from all of the data, including data of highly sensitive fields, while protecting all facts about individuals, entities, and transactions. Traditional approaches, such as aggregation, anonymization, or masking degrade data value and can be easily exploited to reconstruct sensitive information. LeapYear’s implementation of differential privacy provides mathematically proven assurances that information about individual records cannot be reconstructed, while also enabling all of the data to be leveraged for reporting
  • 17
    PK Protect
    Automate the DSAR response process to meet requirements faster and on budget. Find data that can and/or should legally be archived or deleted due to age or lack of use. Create rules that will delete or redact sensitive data as soon as it is found. Detect and confirm breaches with monitoring, then accurately estimate and report on the breach’s impact. Enable pseudonymization, anonymization, and de-identification of private personal data. Continuously monitor endpoints, servers, and enterprise solutions for privacy data. Organizations are required to keep up with the ever-changing privacy landscape and protect personally identifiable information they interact with. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation. Once PK Privacy discovers data, it can automatically encrypt, mask, redact, delete, or otherwise remediate personal information.
  • 18
    Privacy Analytics

    Privacy Analytics

    Privacy Analytics

    Privacy Analytics provides data anonymization services and software for organizations in the consumer and healthcare industries. We enable you to use your sensitive data assets safely and responsibly for innovation that benefits everyone. With Privacy Analytics you can safely de-identify health data to the highest standard, while preserving its utility. Regulatory deadlines are getting more stringent. Timelines to fulfill data requests are getting tighter. Pressure to uphold your company’s reputation has never been more apparent. The climate around data privacy continues to intensify. Everyone from consumers to regulators are holding organizations accountable. With so many stakeholders demanding more transparency, the pressure for drug makers to safely disclose clinical data and documents has never been higher. And as pressure rises, so too does the bar for privacy. You need solutions that both maximize transparency and protect the privacy of trial participants.
  • 19
    PHEMI Health DataLab
    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden. PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools.
  • 20
    Piiano

    Piiano

    Piiano

    Emerging privacy policies often conflict with the architectures of enterprise systems that were not designed with sensitive data protection in mind. Piiano pioneers data privacy engineering for the cloud, offering the industry’s first personal data protection and management platform to transform how enterprises build privacy-forward architecture and operationalize privacy practices. Piiano provides a pre-built, developer-friendly infrastructure to dramatically ease the adoption or acceleration of enterprise privacy engineering and help developers build privacy-by-design architecture. This engineering infrastructure safeguards sensitive customers’ data, preempts breaches, and helps enterprises comply with privacy regulations as they evolve. The Vault is a dedicated, protected database for centralizing sensitive information that developers can install into enterprise VPC (Virtual Private Cloud). This ensures that the vault–and everything in it–is only accessible to the enterprise.
  • 21
    TokenEx

    TokenEx

    TokenEx

    Alongside Payment Card Information (PCI), Personally Identifiable Information (PII) also known as personal information and Protected Health Information (PHI) have become a favorite target of hackers. TokenEx can tokenize any type of data, so PII, PHI, PCI, ACH, etc. can be safely vaulted away from business systems and replaced with tokens that are mathematically unrelated to the original data and, thus, useless to data thieves. Tokenization offers virtually unlimited flexibility in how you store, access, and secure your sensitive data sets.
  • 22
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 23
    GrowthDot GDPR Compliance
    GDPR Compliance app for Zendesk is an app for deleting, anonymizing and retrieving customers' data in Zendesk instances. Here is a list of basic app features: Process thousands of tickets and contacts in bulk and quickly; Combine user, ticket and organizational list; Create ticket and contact list for bulk treatment; Delete users' or organizations' personal data; Keep entire or only sensitive information confidential; Compile data in CSV files and download them; Edit information individually or in bulk; Anonymize credit card and phone numbers completely; Set up automations and schedule processes; Check out the statistics; User-friendly interface; Submit agents’ requests to process the data; Give agent permissions to run processes; Configure tag anonymization in tickets;
    Starting Price: $41.70 organization/per month
  • 24
    K2View

    K2View

    K2View

    At K2View, we believe that every enterprise should be able to leverage its data to become as disruptive and agile as the best companies in its industry. We make this possible through our patented Data Product Platform, which creates and manages a complete and compliant dataset for every business entity – on demand, and in real time. The dataset is always in sync with its underlying sources, adapts to changes in the source structures, and is instantly accessible to any authorized data consumer. Data Product Platform fuels many operational use cases, including customer 360, data masking and tokenization, test data management, data migration, legacy application modernization, data pipelining and more – to deliver business outcomes in less than half the time, and at half the cost, of any other alternative. The platform inherently supports modern data architectures – data mesh, data fabric, and data hub – and deploys in cloud, on-premise, or hybrid environments.
  • 25
    BigID

    BigID

    BigID

    BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2
  • 26
    Statice

    Statice

    Statice

    We offer data anonymization software that generates entirely anonymous synthetic datasets for our customers. The synthetic data generated by Statice contains statistical properties similar to real data but irreversibly breaks any relationships with actual individuals, making it a valuable and safe to use asset. It can be used for behavior, predictive, or transactional analysis, allowing companies to leverage data safely while complying with data regulations. Statice’s solution is built for enterprise environments with flexibility and security in mind. It integrates features to guarantee the utility and privacy of the data while maintaining usability and scalability. It supports common data types: Generate synthetic data from structured data such as transactions, customer data, churn data, digital user data, geodata, market data, etc We help your technical and compliance teams validate the robustness of our anonymization method and the privacy of your synthetic data
    Starting Price: Licence starting at 3,990€ / m
  • 27
    Simply GDPR

    Simply GDPR

    Simply Digital Consulting

    Simply GDPR is a GDPR (General Data Protection Regulation) audit and data management tool, designed to take the pain out of compliance with the GDPR. Unlike other products which often only offer a collection of forms and statements, or are limited to working in your website, Simply GDPR does much more. It will guide you through the process of obtaining consent for permission-based marketing and will also act upon it. Simply GDPR can also interact with and manage your permission records across your, and your suppliers', data stores and databases. Simply GDPR saves you time and money by creating a GDPR process, and reducing overheads by integrating all your databases into one. Our team has the knowledge and experience to design and develop FileMaker apps for your organization. Individuals or whole groups can be taught general FileMaker skills or those specific to your system.
    Starting Price: $17 per month
  • 28
    Randtronics DPM easyCipher
    Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database.
  • 29
    IBM InfoSphere Optim Data Privacy
    IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
  • 30
    Anonos Data Embassy
    Anonos spent 10 years in the lab, researching and developing Data Embassy to prove that it’s possible to selectively reveal, access and use data with granularity and precision never achieved before. We’ve addressed the shortcomings of data privacy and security point solutions, so organizations can use sensitive information as part of their data-driven initiatives and still be compliant. Data Embassy works by transforming source data into Variant Twins: non-identifiable yet 100% accurate data assets that can be used for specific, authorized purposes. Because multi-level data privacy and security controls are embedded into the data itself and technologically enforced, Variant Twins can travel anywhere and that includes crossing international borders.
  • 31
    DOT Anonymizer

    DOT Anonymizer

    DOT Anonymizer

    Mask your personal data while ensuring it looks and acts like real data. Software development needs realistic test data. DOT Anonymizer masks your test data while ensuring its consistency, across all your data sources and DBMS. The use of personal or identifying data outside of production (development, testing, training, BI, external service providers, etc.) carries a major risk of data leak. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. Anonymization enables you to retain the original data format. Your teams work with fictional but realistic data. Manage all your data sources and maintain their usability. Invoke DOT Anonymizer functions from your own applications. Consistency of anonymizations across all DBMS and platforms. Preserve relations between tables to guarantee realistic data. Anonymize all database types and files like CSV, XML, JSON, etc.
    Starting Price: €488 per month
  • 32
    Gallio

    Gallio

    Gallio

    As face recognition technology is growing at an exponential pace, the storage of image and video files containing sensitive information poses significant risks. Gallio provides you with a unique solution for privacy protection based on artificial intelligence. Algorithms blur faces making them virtually impossible to recognize while leaving image quality intact. Efficiently anonymizes license plates making them illegible. Works with license plate patterns from all around the world. From now on you can store and publish your images and recordings without worrying that someone will recognize a given vehicle and sue you for privacy infringement. The easy-to-use editor allows you to remove blur from selected faces and license plates. Share videos and images as evidence and provide recordings on demand to data subjects, while protecting the privacy of anyone else.
    Starting Price: €89 per month
  • 33
    Xtendr

    Xtendr

    Xtendr

    XtendR unhides detailed, privacy-preserving insights across multiple independent data sources. XtendR enables access to thus far inaccessible data, and protects you during your entire data lifecycle, giving you confidence in complete privacy and regulatory compliance. XtendR is more than anonymity, it’s the critical missing piece for multi-party data sharing with true privacy protection - it is cryptography on duty so you can reach your full potential. The most advanced privacy-enhancing data collaboration technology. Xtendr solved the decades-long cryptography challenge of data sharing between mutually mistrustful parties. Take your business further with an enterprise-grade data protection offering that allows individual organizations to form data partnerships while protecting sensitive data. Data is the currency of our digital age. Some argue that it is replacing oil as the world's most valuable resource and there is no doubt about its growing importance.
  • 34
    Data Identification Manager™

    Data Identification Manager™

    Data443 Risk Mitigation, Inc.

    Data Identification Manager™ takes the effort out of classifying your data by applying the same rules, technology, machine learning, and ongoing classification stewardship throughout the organization. This ensures always-accurate, continually relevant data security for your whole IT estate. Get the breakdown of how many files have no duplicates, are original files, or how many files are exact duplicate files for better data management. See your files broken down into several ways, including file growth over time, how old the files are and the size and type of file present.
  • 35
    MinerEye DataTracker
    MinerEye’s DataTracker enables organizations to overcome the information governance and protection challenge. It automatically scans, indexes, analyzes, virtually labels and categorizes every piece of unstructured and dark data contained in the organization’s data repositories. With proprietary Interpretive AI™, machine learning, and computer vision, the solution locates relevant files out of the billions that are stored, accurately evaluates them, qualifies them by significance and purpose, and automatically sends alerts with next best action recommendations in cases of conflicts, duplications, or potential violations. This way, data protection is profoundly enhanced while risk and operational costs are reduced.
    Starting Price: $2000/1TB/month
  • 36
    ManageEngine DataSecurity Plus
    Take charge of your sensitive data with ManageEngine DataSecurity Plus. Get a snapshot of recent user activity, file activity, and access trends. Know the essential four Ws for every access: Who accessed what, when, and from where. Focus on events that matter most, such as sudden permission changes, file deletions, and renaming events. Identify the most active users, most accessed files, and most modified files within your file server. rigger instant alerts whenever there's sudden spikes in file or folder access or modification events. Get real-time notifications whenever there's multiple failed access attempts to critical files. Monitor changes made to sensitive files after business hours. Selectively monitor critical files, folders, shares, and user activities. Get real-time alerts whenever unauthorized modifications are made to critical files. Spot privilege misuse and unusual activity by configuring threshold-based alerts to monitor user-generated events.
    Starting Price: $745 per year
  • 37
    TRUENDO

    TRUENDO

    TRUENDO Technologies

    The TRUENDO Consent Management Platform (CMP) is a highly automated, flexible, and reliable software that can be implemented on any website. It allows for easy management of any personal data collected on your website by tools such as cookies, pixels, and scripts. Its control panel allows website managers to prove compliance within minutes, according to data protection regulations worldwide (GDPR, ePrivacy, CCPA etc.) The CMP scans your website regularly to detect any compliance violations while blocking data collection tools until consent is given by visitors. It automatically adjusts the privacy policy according to the latest legislation making sure that your website is always compliant. Some of its key features: - Unlimited page views and sessions - Integrated privacy policy and cookie policy - Easy integration and fully automated - Customizable: adjust the color scheme to fit your website's design - Statistics and insights – learn more about your website traffic
  • 38
    Baffle

    Baffle

    Baffle

    Baffle provides universal data protection from any source to any destination to control who can see what data. Enterprises continue to battle cybersecurity threats such as ransomware, as well as breaches and losses of their data assets in public and private clouds. New data management restrictions and considerations on how it must be protected have changed how data is stored, retrieved, and analyzed. Baffle’s aim is to render data breaches and data losses irrelevant by assuming that breaches will happen. We provide a last line of defense by ensuring that unprotected data is never available to an attacker. Our data protection solutions protect data as soon as it is produced and keep it protected even while it is being processed. Baffle's transparent data security mesh for both on-premises and cloud data offers several data protection modes. Protect data on-the-fly as it moves from a source data store to a cloud database or object storage, ensuring safe consumption of sensitive data.
  • 39
    Kiprotect

    Kiprotect

    Kiprotect

    KIProtect develops software solutions that help you to process sensitive and personal data in a secure, legally compliant and privacy-friendly manner. Data security and data protection are becoming increasingly important. Unfortunately, they are often neglected, because technical data protection is complex and takes time. We want to change that! With our open source solutions, we help companies to apply modern anonymization and pseudonymization techniques to their data and thus protect it in the best possible way during processing.
  • 40
    Trūata Calibrate
    Operationalize your data pipelines with privacy-centric data management software. Trūata Calibrate empowers organizations to make data usable while leveraging privacy as a commercial differentiator. Our frictionless, cloud-native software enables businesses to operationalize privacy-compliant data pipelines at speed, so teams can work with data responsibly and confidently. Powered by intelligent automation, Trūata Calibrate facilitates fast and effective risk measurement and mitigation via a centralized dashboard. The platform provides a smart, standardized solution for managing privacy risks and ensures that data can be effectively transformed for safe use right across your business ecosystem. Access dynamic recommendations for data transformation and view privacy-utility impact simulations before performing forensically targeted de-identification to mitigate risks. Transform data to create privacy-enhanced datasets that can be shared or transferred and used responsibly by teams.
    Starting Price: $5,000 per month
  • 41
    BizDataX

    BizDataX

    Ekobit

    BizDataX is a data masking that provides test data of production-level quality. It enables compliance with GDPR and other regulations by masking customers' identity while preparing data for testers and developers. By using masked/anonymized data instead of production data, the risk is significantly reduced. Focus on policy management, business requirements, sensitive data governance and other regulations. Track inventory of databases, data sources, tables and want to know where sensitive data is located. Manage large customer databases and exchange data with online partner shops and parcel delivery companies. Management of medical records is heavily regulated and regulatory compliance can be achieved with data anonymization.
  • 42
    Secuvy AI

    Secuvy AI

    Secuvy AI

    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 43
    HoundDog.ai

    HoundDog.ai

    HoundDog.ai

    AI-powered code scanner designed to implement a proactive, shift-left strategy for sensitive data protection and privacy compliance. Product development outpaces privacy teams, leading to a constant need to update outdated data maps, which consumes much of their workload. Use HoundDog.ai’s AI-powered code scanner to continuously detect vulnerabilities (currently overlooked by SAST scanners) where sensitive data is exposed in plaintext through mediums such as logs, files, tokens, cookies, or third-party systems. Get essential context and remediation strategies, such as omitting sensitive data, applying masking or obfuscation, or using UUIDs instead of PII. Receive alerts when new data elements are introduced, based on their sensitivity levels, and prevent out-of-scope product changes from going live to avoid privacy incidents. Eliminate the manual and highly error-prone processes typically associated with security tasks.
    Starting Price: $200 per month
  • 44
    Hexamail Flow
    Hexamail Flow is a full email client, with calendaring, tasks and contacts. It operates with Office 365, Gmail, including modern authentication methods (OAUTH) works with Exchange on premises and all IMAP and POP3 servers. The GDPR data protection module offers email and office document redaction features including full PST file import, eml and msg file import, office document import and printing output or PDF generation of redacted content.
  • 45
    Pryv.io
    Personal Data & Privacy Management Software - A ready-to-use solution for personal data and consent management. - Pryv.io is a solid foundation on which you build your own digital health solution, so you can collect, store, share and rightfully use personal data. - Maintained and developed by Pryv. Features - Provides latest Pryv.io core system ready for production - User registration and authentication - Granular consent-based access control rights - Data model made for privacy, aggregation and sharing - Full data life-cycle: collect - store - change - delete - REST & Socket.io API - Ease of software integration and configuration - Seamless connectivity and interoperability
  • 46
    RansomDataProtect
    The optimal and innovative protection of your personal and sensitive data by the blockchain. RansomDataProtect allows for pseudonymizing personal data and sensitive data. Pseudonymization of data is one of the recommendations of the CNIL in terms of compliance with the GDPR rules and the fight against theft and leakage of sensitive data in the context of attacks of the ransomware type. Your data is secure and tamper-proof inside your files thanks to the innovative combination of variable encryption algorithms and a blockchain. The data that is not masked remains accessible to continue working on the documents with several people. RansomDataProtect easily integrates with your files using an add-in (Word, Excel, PowerPoint, Outlook, and Gmail). RansomDataProtect helps you to comply with the issues related to the general regulation on data protection. Remove security vulnerabilities due to password mismanagement within your company.
    Starting Price: €10 per month
  • 47
    AuricVault® Tokenization

    AuricVault® Tokenization

    Auric Systems International

    The AuricVault® tokenization service secures your vitally sensitive financial and personal data by safely storing that data and replacing the data in your system with a token. Tokens are random strings of numbers and letters that have no relationship to the stored data. If someone stole all your tokens, they still would not have any of your sensitive data. Tokenization provides what is called data separation. Data separation ensures that no single entity has all the data at one time. Auric's tokenization solution provides fine-grained permissions for one or more parties to access sensitive tokenized data. Depending on your business model, using the AuricVault® tokenization service may exclude your systems and servers from PCI scope. We help businesses protect billions of dollars and millions of transactions securely, safely, and simply.
    Starting Price: $300 per year
  • 48
    Skyflow

    Skyflow

    Skyflow

    Skyflow lets you run workflows, logic and analytics on fully encrypted data. Skyflow leverages multiple encryption and tokenization techniques for optimal security. Manage data residency, access, and policy enforcement, with auditable logs and provenance. Get to compliance in minutes, not weeks. Our trusted infrastructure and simple REST and SQL APIs make it easy. Tokenization for compliance, plus an encrypted data store so you can search, analyze, and use secure data. Run Skyflow in a virtual private cloud you choose. Use it as secure gateway, zero trust data store, and more. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. Leverage the power of your sensitive data in any workflow or application without ever decrypting the data.
  • 49
    Tonic

    Tonic

    Tonic

    Tonic automatically creates mock data that preserves key characteristics of secure datasets so that developers, data scientists, and salespeople can work conveniently without breaching privacy. Tonic mimics your production data to create de-identified, realistic, and safe data for your test environments. With Tonic, your data is modeled from your production data to help you tell an identical story in your testing environments. Safe, useful data created to mimic your real-world data, at scale. Generate data that looks, acts, and feels just like your production data and safely share it across teams, businesses, and international borders. PII/PHI identification, obfuscation, and transformation. Proactively protect your sensitive data with automatic scanning, alerts, de-identification, and mathematical guarantees of data privacy. Advanced sub setting across diverse database types. Collaboration, compliance, and data workflows — perfectly automated.
  • 50
    Klaro

    Klaro

    Klaro

    Simple and robust data protection for your website. Klaro is a powerful tool that protects the privacy and data of your visitors and helps you run a GDPR compliant website. Run a scan of your website to learn more. Klaro is simple, unobtrusive and optimized for both mobile devices and desktop browsers. Klaro disturbs your users as little as possible and helps you to process personal data in a completely transparent and legally compliant manner. The Klaro front-end code is licensed under the liberal BSD-3 license, which means you can use it freely for commercial and non-commercial purposes. This allows you to freely customize every aspect of Klaro. Klaro can manage any third-party services and tracking scripts. New services can be added with just a few lines of code. Klaro supports implicit and explicit consent processes and can ensure that no third-party applications are loaded or collect personal data without the user's consent.
    Starting Price: €19 per month