Alternatives to Oracle Advanced Security
Compare Oracle Advanced Security alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Oracle Advanced Security in 2026. Compare features, ratings, user reviews, pricing, and more from Oracle Advanced Security competitors and alternatives in order to make an informed decision for your business.
-
1
Satori
Satori
Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements. -
2
Firmex Virtual Data Room
Firmex
More deals, diligence, and compliance get done in Firmex Virtual Data Rooms. With 20,000+ new rooms opened annually, thousands of businesses manage highly sensitive projects and processes with Firmex. Our robust data rooms are designed to give you full control over your documents while being intuitive and easy to use. Firmex is SOC 2, GDPR, and HIPAA-compliant and supports SSO, API, and redaction. You can rest assured that your sensitive information will be safe with our banking-level security and encryption. Our award-winning customer service team is dedicated to helping all Firmex Virtual Data Room users, 24/7/365. Whether you're the data room's admin or a guest, reliable support is a quick phone call, email, or online chat away. Firmex's flexible pricing is unique, offering an unlimited data room subscription or per-use transaction pricing. With a subscription, you can leverage your virtual data room for all of your organization's needs, from investor reporting to audits. -
3
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022. -
4
IRI FieldShield
IRI, The CoSort Company
IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones. -
5
The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.Starting Price: $230 one-time payment
-
6
Rectify
Rectify
Automating privacy with secure redaction for document distribution. Rectify leverages privacy-enabled artificial intelligence to automate the removal of private information when data sharing occurs. We help organizations decrease the human involvement required to identify and remove consumer identities, trade secrets, IP and other private data in data sets that are being sent to third parties. Our experts have protected tens of millions of pages, and counting. Automating data protection with "privacy-enabled AI" deidentification. Break free from manual redaction with Rectify's secure AI redaction. The consequences of sharing sensitive information without using a secure redaction tool can be daunting. Rectify provides a complete end-to-end solution for your redaction needs. Choosing the right redaction service is crucial to the security and privacy of your business. Automate privacy with Rectify's secure redaction.Starting Price: $49.99 per user per month -
7
DataSunrise Database Security
DataSunrise
Data-Centric high-performance database security software. Regulatory Compliance with SOX, HIPAA, GDPR, PCI DSS and other privacy laws and standards. Hybrid and Multi-Cloud Database Security Proxy on AWS, Azure, Google and On-Prem. Sensitive and PII data auditing, discovery and active protection. Data Auditing enables real-time tracking of user actions and changes made to data and databases to ensure compliance-ready environment, increased visibility. Database Firewall, role based & location aware Data Access Control & Protection. Secure corporate databases in cloud & on-prem against hostile, negligent actions. Secures sensitive data in development and testing environments; Encryption; completely eliminates the possibility to reverse engineer the masked data. Real-time role and location based data masking of production data. Prevents exposure of sensitive privacy data while production data is not changed physically. -
8
OpenText Data Privacy & Protection Foundation (Voltage) provides organizations with quantum-ready, format-preserving security that protects sensitive data without disrupting workflows or analytics. It helps companies meet evolving regulatory requirements by securing information at rest, in motion, and in use across hybrid and cloud environments. With NIST-standardized Format-Preserving Encryption and stateless key management, the platform delivers high-performance protection at enterprise scale. Its persistent data security approach ensures that sensitive information remains safeguarded throughout its lifecycle, even as it moves across systems and analytics platforms. Trusted globally across more than 50 countries, the solution is relied on by major financial, healthcare,& retail organizations to secure billions of daily data events. By combining proven cryptography with flexible integrations, OpenText enables organizations to reduce breach risk while maintaining operational agility.
-
9
Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
-
10
Redact
Fordata
REDACT is a secure and intuitive platform for automatic anonymization of personal data and other sensitive information in documents. Redact allows you to quickly and accurately redact confidential data in 25 file formats, including PDF, Word, Excel, PPT, and XML, JPG, scans. Available online 24/7, with no need for implementation or installation. It is offered with technical support for users. Automatically. Precisely. With AI. Redact guarantees top-level security with SSL-secured connections and AES 256-bit encryption. Its ISO 27001:2022 certification reflects a commitment to continuous improvement and regulatory compliance. Data is stored on TIER III-standard servers, and Redact’s advanced technology ensures fast, professional anonymization. With Redact, documents are secure and expertly processed in no time.Starting Price: €18/month -
11
Trellix Database Security
Trellix
Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access. Discover sensitive and proprietary information in databases across the environment. Improve regulatory compliance by blocking unauthorized access to sensitive data. Address vulnerabilities quickly, with little to no downtime. Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment. Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities, and receive detailed remediation advice. Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment. -
12
Randtronics DPM easyData
Randtronics
DPM easyData is a high-performance data spoofing or de-identification engine. Data spoofing examples include masking, tokenization, anonymization, pseudonymization and encryption. DPM data spoofing processes replace whole or parts of sensitive data with a non-sensitive equivalent (creates fake data) and is a very powerful data protection tool. DPM easyData is a software data security solution that allows web and app server applications and databases to tokenize and anonymize data and apply masking policies for unauthorized users when retrieving sensitive data. The software allows a high level of granularity, defining which authorized users have access to which protection policies, and what operations they may perform with those protection policies. DPM easyData is extremely customizable and is able to protect and tokenize many different types of data. The software has been designed to be flexible and users are free to define any format of input data and token format. -
13
Redactable
Redactable
Redactable is a cloud-based tool that helps organizations remove sensitive information from PDF documents. Powered by AI, it automates the redaction process, offering significant time savings and improved data protection over manual methods. Designed for businesses, legal firms, and government agencies, Redactable overcomes the common challenges of manual redaction. It eliminates the risk of incomplete redaction that often leaves sensitive data exposed. Redactable solves two key issues: incomplete data removal from black box overlays and the neglect of hidden metadata. By fully redacting both visible content and metadata, Redactable provides a complete solution for document security. Key features include AI-driven automated redaction, permanent removal of sensitive data, OCR for scanned PDFs, metadata protection, and integration with cloud services like Box, Clio and OneDrive. Redactable meets rigorous security standards, including SOC 2 Type II, GDPR, and HIPAA compliance.Starting Price: $19/user/month -
14
FastRedaction
FastRedaction
FastRedaction is an AI-driven, web-based video redaction software designed to streamline the process of securely editing and blurring sensitive video content for law enforcement, legal professionals, and other industries that require confidentiality. This platform automatically blurs faces and tracks objects as videos upload, cutting redaction time by up to 90%. It supports the redaction of various media, including body-worn and dashcam videos, 911 calls, and photographs, without the need for special hardware or software. FastRedaction is highly secure, featuring multi-factor authentication, session timeout settings, and robust access control in compliance with the FBI’s CJIS security policy. Data is encrypted both in transit and at rest using FIPS 140-2 compliant standards, and all access attempts are logged for at least one year. FastRedaction operates on AWS for reliable cloud storage and does not retain credit card information.Starting Price: $19 per minute of video -
15
Oracle Data Safe
Oracle
Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database. Oracle Database Cloud Service (exadata, virtual machine, or bare metal), or Oracle Databases on-premises in your own data center, Data Safe delivers essential data security capabilities that help you reduce risk and improve security. Assess user risk by highlighting critical users, roles and privileges. Configure audit policies and collect user activity to identify unusual behavior. Discover sensitive data and understand where it is located. Remove risk from non-production data sets by masking sensitive data. -
16
Wald.ai
Wald.ai
Wald.ai is a secure enterprise platform enabling safe, compliant use of AI tools like ChatGPT, Gemini, Claude, and DALL·E. It features real-time contextual data loss prevention (DLP) that redacts sensitive data (like PII and trade secrets) before sending prompts to LLMs, then restores them in responses. Teams can build custom AI assistants trained on internal documents using private LLMs. Wald.ai supports HIPAA, GDPR, CCPA, and more, with admin controls, usage analytics, encryption (BYOK), and audit logs. It also offers a developer API for redaction and secure LLM use in custom apps. All functionality is designed to help businesses leverage AI while keeping proprietary data protected.Starting Price: $19/month -
17
Randtronics DPM Database Manager
Randtronics
Randtronics DPM Database Manager is designed to protect column level data in database. The software is able to do this without having to make any application level code changes - it is totally transparent to database users and applications. DPM Database Manager are able to protect data on Oracle, Microsoft SQL Server and IBM DB for iSeries databases. The software can mask the data in protected column, or tokenise the data when integrating with DPM Token Manager. Rules are designed to be extremely flexible, and it does not matter what level of access a user or application has - the software will even protect against database admins (DBAs) viewing sensitive data. All rules can be dynamically changed using the console, and applied immediately to the data. Masking of column level data in a transparent manner - no application level code changes needed. Tokenisation of column level data by integrating with DPM Token Manager. -
18
Strac
Strac
Strac is a 1-stop shop for all things PII (Personally Identifiable Information). Strac is a Data Loss Prevention software that protects businesses from security and compliance risks by a) automatically detecting and redacting sensitive data across all communication channels like email, slack, zendesk, google drive, one drive, intercom, etc. and b) protecting sensitive data on front end apps and backend servers such that sensitive data never touches servers. Integrate with your SaaS apps in minutes, eliminate data leaks and be compliant with PCI, SOC 2, HIPAA, GDPR, CCPA. Strac's accurate machine learning models, real time notifications, unique redaction experience saves employees time and very productive. -
19
ShareSecret
ShareSecret
Auto-redaction of sensitive data, encrypted data sharing and self-destructing private chats. Share passwords, private keys, API tokens and more with peace of mind. Everything stored in our short-term vault is stored encrypted at-rest using AES-256 encryption. We don’t store keys anywhere in our system. When secrets expire, they’re evicted from our system completely, leaving no traces anywhere in our vault, logs, your email, chat, or anywhere else. ShareSecret expires data after 24 hours, or a maximum of 7 days, completely evicting the data from our system. All data is encrypted at rest with industry-standard 256-bit AES encryption in our short-term vault. Share passwords, API tokens, private keys, credit cards, and any other sensitive data. All encrypted at rest. Securely share sensitive documents like PDFs, zip files, powerpoint / keynote presentations, and anything else. Our Slack bot makes it easy to share sensitive data in Slack without compromising security. -
20
ClinicalWave.ai
Cloudbyz
ClinicalWave.ai built on AWS cloud platform is an integrated AI platform tailored for life sciences organizations. It offers automated redaction and extraction of sensitive data and leverages cutting-edge NLP technology to extract valuable insights from clinical documents, streamlining your workflows like never before. It consists of: 1. ClinRedact AI- Our Redaction product which automatically identifies and redacts sensitive information in clinical documents, saving time and ensuring data integrity. 2. ClinExtract AI- The AI Data Extraction product that utilizes NLP and machine learning to extract relevant data points from clinical documents, providing valuable insights and streamlining workflows. 3. ClinDICOM AI- Experience the power of our feature-rich DICOM data extraction and redaction product offering targeted redaction, customizable rules, intelligent contextual analysis, audit trail compliance, redaction preview, and a user-friendly interface. -
21
Teleskope
Teleskope
Teleskope is a modern data protection platform designed to automate data security, privacy, and compliance at enterprise scale. It continuously discovers and catalogs data across cloud, SaaS, structured, and unstructured sources, classifying over 150 entity types such as PII, PHI, PCI, and secrets with high precision and high throughput. Once sensitive data is identified, Teleskope enables automated remediation, such as redaction, masking, encryption, deletion, and access correction, while integrating into developer workflows via its API-first model and supporting deployment as SaaS, managed, or self-hosted. The platform also builds prevention capabilities, embedding into SDLC pipelines to stop sensitive data from entering production systems, support safe AI adoption (without using unchecked sensitive data), handle data subject rights requests (DSARs), and map findings to regulatory standards (GDPR, CPRA, PCI-DSS, ISO, NIST, CIS). -
22
MagicRedact
MagicRedact
Need to redact a PDF or image? Our free and open-source PDF redaction tool makes it easy. With manual redactions, you can black out sensitive text instantly. No sign-ups, no hidden fees. For even faster results, our AI-powered auto-redaction can automatically detect and remove sensitive information from your documents. Process PDFs and images securely—all files are temporarily processed and deleted after redaction. No Adobe required. Try it free today and experience the easiest way to redact PDFs online.Starting Price: $5 -
23
Acra
Cossack Labs
Data leakage prevention in your app made simple. Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. Acra is easy to integrate, doesn't require significant modifications in the existing code, provides reliable data security, reduces MTTD and MTTR. Acra provides an integration library that can encrypt any record with AcraServer’s key.Starting Price: $10000 per year -
24
AutoRedact
EverMap
Redact keywords and text patterns, redact SSNs, account numbers, and more. Redaction, by definition, means removing certain types of information from documents. In the context of United States government agency documents, redaction refers to the process of removing classified information from a document prior to its publication. For attorneys, redacting is a very important procedure for protecting confidential information. In case of discovery a document must be distributed containing sensitive information, all non-discoverable confidential material needs to be redacted from that document first. AutoRedact is a "true redacting" solution that deletes sensitive text, annotations, text form fields, vector graphics, and image information from PDF documents making them completely safe for distribution. The software contains many powerful tools that increase productivity and provide automated document redacting and multi-user redacting workflows.Starting Price: $149 one-time payment -
25
iSecurity Field Encryption
Raz-Lee Security
iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance. -
26
IRI DarkShield
IRI, The CoSort Company
IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.Starting Price: $5000 -
27
Veritone Redact
Veritone
Save time and costs while freeing up valuable resources by using the AI-powered Veritone Redact software to automate the redaction of sensitive information within audio, video, and image-based evidence. The high cost and resource commitment of redacting sensitive information from media evidence is taking its toll on public safety agencies. Yet doing so is required to keep witnesses safe, and comply with freedom of information laws, and other public records requests. Veritone Redact systematically detects human heads, license plates, officer notepads, and laptops (MDTs) as well as enables users to manually define other sensitive imagery and objects within a scene, then automatically redacts this information from audio, video, and image-based evidence. From there, the redacted evidence can quickly be downloaded with logs to support chain of custody requirements and shared with colleagues, public defenders, or other key stakeholders. -
28
Anonomatic
Anonomatic
Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations. -
29
Obynt
Obynt
Obynt is a Software to Manager, Store and protect sensitive data, such as Passwords, credit card numbers, Assets information or any other important Data. Obynt encrypt sensitive data inside client applications and never reveal the encryption keys to the Database Engine (SQL Database or SQL Server). As a result, Obynt provides a separation between those who own the data and can view it, and those who manage the data but should have no access. By ensuring on-premises database administrators or other high-privileged unauthorized users, can't access the encrypted data! Obynt use MSSQL to store the Data centrally for Single or Multi-User.Starting Price: $0 -
30
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and suggest remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities. Guardium Vulnerability Assessment detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after-hours activity. It identifies threats and security gaps in databases that could be exploited by hackers. Discover and classify sensitive data in heterogeneous environments. View detailed reporting on entitlements and risky configurations. Automate compliance audits and exception management.
-
31
Cleardox
Cleardox
Cleardox offers a redaction software that automates the process of identifying and anonymizing sensitive information within documents. It provides a collaborative platform to streamline document workflows, making it easy for users to redact personal data such as names, addresses, and phone numbers. Cleardox Redact helps organizations ensure data security by simplifying anonymization, reducing the risk of data leaks, and minimizing human error. It is integrated with tools for document collaboration, review, and management, making it ideal for team-based environments. It also features Cleardox AI, which fully automates the anonymization of large volumes of documents. It ensures compliance with privacy regulations by securely managing sensitive information and deleting documents after 30 days for added security. Cleardox’s solution is designed to eliminate the time-consuming and error-prone aspects of traditional manual anonymization, enhancing user experience.Starting Price: $35 per month -
32
ReadyRedact
ReadyRedact
ReadyRedact is an AI-powered automated document redaction software designed to help businesses and organizations comply with privacy laws such as GDPR, CCPA, HIPAA, and others. It uses advanced AI technology to efficiently redact sensitive information in documents like PDFs, JPEGs, TIFFs, and Microsoft Office files, ensuring the confidentiality of private data. ReadyRedact automates the redaction process, removing personal and confidential details to mitigate risks such as identity theft, fraud, and litigation. It includes features like bulk uploads, automated email integration, OCR-based search and redaction, document annotations, and project management tools for secure collaboration. It provides full compliance with privacy regulations, making it ideal for industries like law firms, healthcare, finance, and government agencies. ReadyRedact also allows users to track edits, maintain audit logs, and apply role-based access control for enhanced data security.Starting Price: $14.99 per month -
33
Magier
Magier
Whatever your privacy needs, our AI keeps your data safe. Businesses struggle to keep up with evolving privacy regulations, risking penalties and loss of customer trust. Sensitive information is at risk of being exposed when interacting with AI, raising concerns over data privacy. Organizations find it difficult to control how their data is processed and used by AI systems, leading to potential misuse. Our platform uses AI to automatically identify and protect sensitive information, ensuring your data remains secure. Stay ahead of data privacy regulations by utilizing our platform to meet the latest compliance standards, such as GDPR and CCPA. Automatically redact sensitive information in real time while ensuring seamless interactions and maintaining data integrity. Tailor our privacy solutions to meet your business's unique needs, with flexible options for data protection and redaction.Starting Price: $25 per month -
34
Clario Image Redact AI
Clario
Clario’s Image Redact AI automatically redacts sensitive patient identifiers from videos, photos and PDFs. Our industry-leading solution pairs AI-driven de-identification with expert human oversight of a quality control (QC) team to help you comply with EU GDPR and other privacy regulations for videos. Avoid steep fines and downstream liability from potential data breaches by redacting sensitive patient identifiers. De-identification of every image using our proprietary AI functionality and human visual QC review to verify all appropriate de-identification is complete. Every image is backed up in multiple geographic locations using data centers and systems that adhere to the latest advanced security best practices. Easily access and review your secure videos, photos and PDFs on any device for clinical trial research projects. -
35
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
-
36
DueDel
DueDel
DueDel is an enterprise-grade intelligence platform that unifies AI risk assessment, AI guardrails, and data protection into one secure, compliant ecosystem. The AI Risk Assessment Tool converts complex data into decision-ready summaries, detects early risk signals, uncovers market trends, and delivers predictive insights for investors, executives, and compliance teams. The Data Protection Fabric ensures no sensitive data ever reaches AI models by applying encryption, tokenization, and redaction—maintaining full compliance with RBI, SEBI, DPDP, and internal policies. The AI Guardrail Gateway gives complete control over what AI sees and generates, blocking harmful prompts, preventing hallucinations, enforcing policy-based routing, and securing external LLM usage with audit-grade logs. Together, DueDel enables regulated enterprises to govern AI safely while making faster, smarter, and fully compliant financial decisions.Starting Price: $0 -
37
pdfDocs
Litera
pdfDocs by Litera is a comprehensive PDF management application tailored for legal professionals, enabling users to create, edit, collate, bind, redact, and secure PDF documents with ease and efficiency. The platform streamlines productivity by allowing seamless editing without the need for conversion to Word, facilitating quick modifications to text and images, annotation, and the application of digital signatures. Its integration with core business systems ensures a cohesive workflow, enhancing document management processes. pdfDocs also offers robust security features, including permanent redaction, document encryption, and restrictions on printing, copying, and modifying, thereby protecting sensitive information. Add, remove, or rearrange pages. Modify text or images. Annotate, apply digital signatures, and more. Create PDFs optimized to meet legal industry requirements and validate them for PDF/A compliance. -
38
FreePDFRedactor
LEGALVERSE
Digital PDF redaction, easy to use and completely free. Be the first to know about all the ways Legalverse can save your business time and resources. In just minutes, you'll be able to easily redact, verify, and download your securely redacted PDF. Instead of using Adobe Acrobat to remove text and data, or manually printing and scanning legal documents to remove content, use our free online solution. Start by uploading a PDF document. Once the PDF document is displayed, easily draw over the sections of text you want to remove using our web-based editor. The document is stored for the duration of your redactor session. After removing Text and Data, review your redactions for the highest level of confidence and security that your sensitive data was removed properly. Download your PDF document with text and hidden metadata removed. The redacted areas will be blacked out in the produced PDF document.Starting Price: Free -
39
BizDataX
Ekobit
BizDataX is a data masking that provides test data of production-level quality. It enables compliance with GDPR and other regulations by masking customers' identity while preparing data for testers and developers. By using masked/anonymized data instead of production data, the risk is significantly reduced. Focus on policy management, business requirements, sensitive data governance and other regulations. Track inventory of databases, data sources, tables and want to know where sensitive data is located. Manage large customer databases and exchange data with online partner shops and parcel delivery companies. Management of medical records is heavily regulated and regulatory compliance can be achieved with data anonymization. -
40
Objective Redact
Objective
Redaction software for security conscious organizations. Protect yourself and your organization from accidental disclosure. Know that you’ve redacted any confidential word, phrase or number. It’s an awful feeling when, after manually redacting a document, you can’t help but wonder if you’ve got every word. Yes, “find and replace” works, but only to a certain point. Hidden metadata may still be lurking in your document. Protect yourself and your organization from accidental disclosure. Objective Redact is powerful, automated redaction software that makes redaction much faster, internal review much easier, and keeps your most sensitive information safe. It is ideal for compliance and disclosure processes, redaction is easier and faster; and can handle large volumes of and long, complex documents. Permanently remove all text content marked for redaction, including hidden metadata such as authors, creation dates and other attributes that can be stored in a file.Starting Price: $76.49 per month -
41
Cloaked AI
IronCore Labs
Cloaked AI protects sensitive AI data by encrypting it, but keeping it usable. Vector embeddings in vector databases can be encrypted without losing functionality such that only someone with the proper key can search the vectors. It prevents inversion attacks and other AI attacks on RAG systems, facial recognition systems, and more.Starting Price: $599/month -
42
Tungsten Power PDF
Tungsten Automation
Tungsten Power PDF provides everything you need to create, convert, edit, share and e-sign PDF files. Tungsten Power PDF is an award-winning PDF editor designed to be easy to use, secure, and low cost. Enjoy a familiar, Office-style interface that gets you creating, converting and compiling your PDF documents in just minutes. With advanced functionality, powerful security, and redaction capabilities, Power PDF is built for individuals and businesses of all sizes. Office-style interface optimized for Windows 10 desktop and Microsoft Surface, as well as Mac OS Big Sur. Create, edit and convert PDF files to and from Word, Excel, PowerPoint, JPG, HTML and more. Buy once and own forever for all the features you need. Add secure encrypted passwords and permissions, as well as redact sensitive info and private metadata.Starting Price: $179 one-time fee -
43
Privacy1
Privacy1
Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmenStarting Price: $159 per month -
44
VGS Platform
Very Good Security
The VGS Vault enables users to safely store their tokenized data. This creates a safe haven for your most sensitive data. In the event of a breach, there’s nothing to steal. You can’t hack what’s not there. VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it. Use the interactive example to see how data is transformed by VGS. Choose Redact or Reveal to hide or display data, respectively. Whether you’re building a new product and want best-in-class security from the start or are an established company looking to eliminate compliance as a roadblock to new business, VGS can help. VGS takes on the liability of securing your data, eliminating the risk of data breaches and reducing compliance overhead. For companies that prefer to vault their own data, VGS layers on protection to the systems, preventing unauthorized access and leakage. -
45
Qypt AI
Qypt AI
With features like on-device AI-powered document search and granular access control, Qypt AI enhances productivity while safeguarding confidential information. Whether you're handling personal documents like tax recChat & Discuss Documents: Securely, Without Sharing. Qypt AI provides a secure and efficient solution for team communication and collaboration. Designed for both individuals and businesses, Qypt AI offers encrypted messaging, secure file sharing, and advanced document redaction, ensuring sensitive data is protected at every step.ords or business-critical files such as contracts and financial statements, Qypt AI ensures that data breaches and inefficient workflows are a thing of the past.Starting Price: Free -
46
Adaptive
Adaptive
Adaptive is a data security platform designed to prevent sensitive data exposure across all human and non-human entities. It offers a secure control plane to protect and access data, featuring an agentless architecture that requires zero network reconfiguration and can be deployed in the cloud or on-premises. The platform enables organizations to share privileged access to data sources without sharing actual credentials, enhancing security posture. It supports just-in-time access to various data sources, including databases, cloud infrastructure resources, data warehouses, and web services. Adaptive also facilitates non-human data access by connecting third-party tools or ETL pipelines through a central interface without exposing data source credentials. To minimize data exposure, the platform provides data masking and tokenization for non-privileged users without altering access workflows. Comprehensive audibility is achieved through identity-based audit trails across all resources. -
47
CaseGuard
CaseGuard
Using the most advanced AI technologies, automatically redact faces, license plates, screens, phones, notepads, and Personally Identifiable Information like names, addresses, and SSNs from video, audio, documents, and images. All in one place and with one redaction software. Let CaseGuard automatically detect faces, license plates, phone screens, laptops, people, vehicles, and notepads, and then automatically redact them in one click. Mute, bleep, and resample audio with one click. Upload or record audio directly into CaseGuard. In a few steps, you can transform a recording into a fully redacted audio file. Find and remove personally identifying information, including phone numbers or SSNs and sensitive information instantly. Protect personnel, evidence, financial, medical, and classified records. Automatically redact faces, license plates, screens, people, vehicles, and papers instantly in thousands of images. -
48
HashiCorp Vault
HashiCorp
Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve. -
49
KSign SecureDB
KSign
KsignSecureDB for database privacy protection. By reinforcing the management of customer information through the encryption of the customer's personal information held by the organization, the leakage of personal information can be prevented and damage in case of an accident can be minimized. It is a product with guaranteed safety, verified by successful construction and stable operation in a number of public, educational, and financial fields. By supporting various types of encryption from structured data to unstructured encryption, it is possible to apply an encryption method suitable for the internal environment of the customer. It is possible to establish the basis for compliance with various laws on personal information such as the Personal Information Protection Act, the Information and Communication Network Act, the Electronic Financial Transaction Act, and the Credit Information Act and secure compliance. -
50
RedactX
RedactX
When you need to create media that conveys content while protecting privacy, RedactX is the solution businesses and government agencies rely upon. With a high level of accuracy, the software automatically processes your images and video files from any source in over 100 input formats. Users can easily create redacted versions of original files with full control over what gets blurred out and what does not. Protect sensitive visual content by creating copies where only the information you wish to disclose is rendered. RedactX is the only software solution to turn to when you need your desired output files to be accurately and automatically generated with little or no manual effort involved. RedactX simplifies and accelerates the process of generating redacted output files with your desired level of quality. The software is simple to use and can be deployed on-premises or in commercial or government cloud environments. RedactX can help your team do more with fewer resources.