Alternatives to Piiano

Compare Piiano alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Piiano in 2024. Compare features, ratings, user reviews, pricing, and more from Piiano competitors and alternatives in order to make an informed decision for your business.

  • 1
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 2
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 3
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
    Starting Price: $159 per month
  • 4
    Cloud Compliance

    Cloud Compliance

    Cloud Compliance

    Operationalize privacy compliance and data security on Salesforce with the most comprehensive suite of products. The success of privacy programs requires thorough data inventory and risk assessment. However, most organizations end up overlooking pockets of data and struggle with manual processes and spreadsheets. Our Personal Data Inventory product is designed to automate and streamline DPIA and enterprise data inventory flows. Make it easy for your organization to have an accurate data inventory and clear risk assessment. Most organizations are seeing an increase in privacy right requests. Trying to meet these requests manually is inconsistent, error-prone, and increases the risk of non-compliance. Our Privacy Rights Automation product enables self-service and automates all privacy rights related activities. Mitigate the risk of non-compliance with a standardized and error-free solution.
  • 5
    PK Protect

    PK Protect

    PKWARE

    Automate the DSAR response process to meet requirements faster and on budget. Find data that can and/or should legally be archived or deleted due to age or lack of use. Create rules that will delete or redact sensitive data as soon as it is found. Detect and confirm breaches with monitoring, then accurately estimate and report on the breach’s impact. Enable pseudonymization, anonymization, and de-identification of private personal data. Continuously monitor endpoints, servers, and enterprise solutions for privacy data. Organizations are required to keep up with the ever-changing privacy landscape and protect personally identifiable information they interact with. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation. Once PK Privacy discovers data, it can automatically encrypt, mask, redact, delete, or otherwise remediate personal information.
  • 6
    Mage Platform

    Mage Platform

    Mage Data

    Mage Data™ is the leading solutions provider of data security and data privacy software for global enterprises. Built upon a patented and award-winning solution, the Mage platform enables organizations to stay on top of privacy regulations while ensuring security and privacy of data. Top Swiss Banks, Fortune 10 organizations, Ivy League Universities, and Industry Leaders in the financial and healthcare businesses protect their sensitive data with the Mage platform for Data Privacy and Security. Deploying state-of-the-art privacy enhancing technologies for securing data, Mage Data™ delivers robust data security while ensuring privacy of individuals. Visit the website to explore the company’s solutions.
  • 7
    BigID

    BigID

    BigID

    BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2
  • 8
    Dataguise

    Dataguise

    Dataguise

    Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses,
  • 9
    PHEMI Health DataLab

    PHEMI Health DataLab

    PHEMI Systems

    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden. PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools.
  • 10
    Secuvy AI

    Secuvy AI

    Secuvy AI

    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 11
    Kodex

    Kodex

    Kodex

    Privacy engineering is an emerging field that has intersections with data engineering, information security, software development, and privacy law. Its goal is to ensure that personal data is stored and processed in a legally compliant way that respects and protects the privacy of the individuals this data belongs in the best possible way. Security engineering is on one hand a requirement for privacy engineering but also an independent discipline that aims to guarantee the secure processing and storage of sensitive data in general. If your organization processes data that is either sensitive or personal (or both), you need privacy & security engineering. This is especially true if you do your own data engineering or data science.
  • 12
    Databunker

    Databunker

    Databunker

    Databunker is an open source vault and API that ensures GDPR, HIPAA, ISO 27001, and SOC2 compliance. Protect sensitive user records against GraphQL and SQL injections without the need for expensive custom coding. Databunker acts as a powerful encrypted vault specifically designed to protect sensitive records, including Personally Identifiable Information (PII), personal health information (PHI), and other critical data. Databunker helps organizations meet the data protection requirements of GDPR, HIPAA, SOC2, and ISO 27001 by safeguarding sensitive data from unauthorized access or data breaches. Databunker provides robust access control mechanisms that allow organizations to define and enforce permissions for accessing sensitive data. Databunker offers audit trails and logging features to track and monitor access to sensitive data, providing a comprehensive record of data access and activities.
    Starting Price: Free
  • 13
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 14
    Private AI

    Private AI

    Private AI

    Safely share your production data with ML, data science, and analytics teams while safeguarding customer trust. Stop fiddling with regexes and open-source models. Private AI efficiently anonymizes 50+ entities of PII, PCI, and PHI across GDPR, CPRA, and HIPAA in 49 languages with unrivaled accuracy. Replace PII, PCI, and PHI in text with synthetic data to create model training datasets that look exactly like your production data without compromising customer privacy. Remove PII from 10+ file formats, such as PDF, DOCX, PNG, and audio to protect your customer data and comply with privacy regulations. Private AI uses the latest in transformer architectures to achieve remarkable accuracy out of the box, no third-party processing is required. Our technology has outperformed every other redaction service on the market. Feel free to ask us for a copy of our evaluation toolkit to test on your own data.
  • 15
    NMTY Enterprise
    NMTY Enterprise helps you protect all your privacy-sensitive data within your organization, regardless if it is stored in databases or files. Make NMTY Enterprise part of your IT environment and immediately anonymize all data sources that need to be protected. NMTY Enterprise makes it possible to anonymize data regardless of how it is stored, from databases to individual files. Anonymize data stored in a database or in separate files such as CSV and XML. Data is always anonymized directly within the source. This prevents non-anonymized data from being duplicated unnecessarily. Connections to your data sources support integrated authentication and are always encrypted when stored. In addition to anonymizing datasets, it is also possible to directly anonymize data processed within documents and images. Our solutions are developed based on the latest innovations and integrate directly into your existing processes. This way we ensure we always achieve the maximum result.
  • 16
    Bearer

    Bearer

    Bearer

    Automate GDPR compliance by implementing Privacy by Design into your product development processes. Bearer helps you proactively find and fix data security risks and vulnerabilities across your application environment so you can prevent data breaches before they happen. Bearer helps security and development teams implement and monitor their data security policy at scale so they can prevent data breaches. Scan your applications and your infrastructure continuously to map sensitive data flows. Identify, prioritize and assess security risks and vulnerabilities that can lead to a data breach. Monitor your data security policy and empower your developers to fix issues on their own. Bearer’s detection engine supports 120+ data types, including personal, health and financial data, and adapts to your data taxonomy.
  • 17
    Kiprotect

    Kiprotect

    Kiprotect

    KIProtect develops software solutions that help you to process sensitive and personal data in a secure, legally compliant and privacy-friendly manner. Data security and data protection are becoming increasingly important. Unfortunately, they are often neglected, because technical data protection is complex and takes time. We want to change that! With our open source solutions, we help companies to apply modern anonymization and pseudonymization techniques to their data and thus protect it in the best possible way during processing.
  • 18
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
  • 19
    HushHush Data Masking
    Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms.
  • 20
    VGS Platform

    VGS Platform

    Very Good Security

    The VGS Vault enables users to safely store their tokenized data. This creates a safe haven for your most sensitive data. In the event of a breach, there’s nothing to steal. You can’t hack what’s not there. VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it. Use the interactive example to see how data is transformed by VGS. Choose Redact or Reveal to hide or display data, respectively. Whether you’re building a new product and want best-in-class security from the start or are an established company looking to eliminate compliance as a roadblock to new business, VGS can help. VGS takes on the liability of securing your data, eliminating the risk of data breaches and reducing compliance overhead. For companies that prefer to vault their own data, VGS layers on protection to the systems, preventing unauthorized access and leakage.
  • 21
    Manetu

    Manetu

    Manetu

    The Manetu data crypto-vault provides enterprise class personal and sensitive data management services across critical business priorities. A repository where personal and, or sensitive data is ingested, secured and de-identified such that it can be used for analytics, testing, discovery and, other revenue generating capabilities. Data use across organizations compromises security, privacy and, consent. Needs a copy of the data to develop new applications to maintain good client satisfaction. Needs a copy of the data to run new sales plays, grow the business or deliver on goods and services. Needs a copy of the data for analysis to create new, targeted marketing campaigns. Needs a copy of the data to run reports on how the business is doing. Needs a copy of the data to develop new models and algorithms to drive margin expansion. These data usage models propagate risk as more exposure is created throughout an organization.
  • 22
    Baffle

    Baffle

    Baffle

    Baffle provides universal data protection from any source to any destination to control who can see what data. Enterprises continue to battle cybersecurity threats such as ransomware, as well as breaches and losses of their data assets in public and private clouds. New data management restrictions and considerations on how it must be protected have changed how data is stored, retrieved, and analyzed. Baffle’s aim is to render data breaches and data losses irrelevant by assuming that breaches will happen. We provide a last line of defense by ensuring that unprotected data is never available to an attacker. Our data protection solutions protect data as soon as it is produced and keep it protected even while it is being processed. Baffle's transparent data security mesh for both on-premises and cloud data offers several data protection modes. Protect data on-the-fly as it moves from a source data store to a cloud database or object storage, ensuring safe consumption of sensitive data.
  • 23
    SylLab

    SylLab

    SylLab Systems

    SylLab Systems is providing embedded compliance for enterprise data security. Privacy compliance and cybersecurity are expensive and difficult to implement, and many organizations get it wrong. Changes in the architecture, lawyers, consultants are a significant expenditure when facing privacy regulations (HIPAA, GDPR, PDPA, CCPA). Request a demo to learn more. Privacy Regulations are expanding beyond the current framework of IT infrastructure. Adapting to such a change is costly, time-consuming, and requires legal and development expertise. There is a better, more structured approach to data governance that responds and adapts to your complex IT environment, whether it’s on-cloud or on-premise. Take control of your compliance workflow and shape it according to business logic. Learn more about the solution trusted by large financial institutions across the globe.
  • 24
    DatAnswers

    DatAnswers

    Varonis

    Easily respond to data subject access requests by surfacing personal information across cloud and on-prem files with fast and powerful search. Find any file with personal data in seconds with Varonis’ purpose-built search engine. We instantly surface and collect the information you need for DSARs, right to be forgotten, or e-discovery—all with super lean infrastructure. Our DSAR form uses sophisticated logic on the backend to ensure you get high-fidelity results, so you can avoid false positives (and fines). Keep a pulse on how much data you’ve indexed and any failed documents so that you always know the scope of your searches. Sensitive data creation doesn’t stop and privacy regulations are ever-evolving. Privacy automation can help you stay ahead. Easily see where you have overexposed PII with dynamic dashboards that highlight privacy issues. Reduce the risk of breaches and fines by monitoring for unauthorized access to sensitive information and restricting access to least privilege.
  • 25
    IBM InfoSphere Optim Data Privacy
    IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
  • 26
    ServiceNow Privacy Management
    Identify and manage privacy risks across the enterprise with workflow automation. Stay compliant with evolving global data privacy regulations. Operationalize risk and resilience as part of the employee experience. Eliminate privacy risks, respond promptly to emerging threats, and comply with global data privacy regulations, all powered by the Now Platform®, a single system of action for the enterprise. Embed privacy management into daily workflows, making it a natural part of the enterprise fabric. Privacy Management includes AI and other powerful platform capabilities so you can get access to real-time intelligence to improve visibility and data privacy-related decisions. Transform your business with a single, unifying platform for digital business.
  • 27
    PrivacyEngine

    PrivacyEngine

    PrivacyEngine

    The easy-to-use data privacy and GDPR software for all your organization’s Data Privacy compliance needs. We’ve put all our data protection experience and expertise into one software-as-a-service platform, to save you time and money when implementing and managing your data privacy compliance program. Organizations using PrivacyEngine can save between €10,000 and €50,000 annually by eliminating legal fees, in addition to slashing the amount of time spent performing essential data privacy-related processes. Whether your organization needs to manage programs for GDPR, CCPA or any other of the emerging data privacy regulations around the world PrivacyEngine has you covered. PrivacyEngine is a complete data privacy software as a service platform incorporating data privacy management & advisory, data privacy training, and vendor assessment. PrivacyEngine takes care of all your privacy management regulatory needs, including managing individuals’ rights, reporting data breaches and incidents.
    Starting Price: €4,399 per year
  • 28
    Seers

    Seers

    Seers

    Trust the leading privacy and consent management platform to help companies comply with GDPR, PECR, LGPD, CCPA and ePrivacy. Gain access to an extensive range of GDPR, PECR, CCPA & ePrivacy compliance tools, all designed to take the hassle out of complying with the new data protection regulations. We have transformed data privacy & consent management, making it quicker and simpler to become compliant! That is why we are the fastest growing privacy & consent management platform. Seers is the world's leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses. Founded in London in 2018 and now with a team spread around the globe. Seers was created to help SME’s & Enterprises meet the ongoing compliance challenges related to the GDPR, PECR, CCPA, LGPD and other new data privacy regulations. Our innovative solutions cover consent management, assessments, certifications, outsourced DPO, policies and documentation.
    Starting Price: $8.99 per month
  • 29
    WireWheel

    WireWheel

    WireWheel

    WireWheel is a leader in the privacy and data protection space. Leveraging the team’s deep privacy expertise, WireWheel has developed an easy-to-use software-as-a-service platform that enterprises, including large financial institutions, telecoms, and consumer-facing brands use to manage their privacy programs. A central hub to quickly launch and grow your privacy program. Get up and running in minutes with pre-built templates and easy to configure workflows. Use technology to solve your problems, not create them! Accelerate compliance with pre-built templates and workflows for EU GDPR, CCPA, Privacy Shield, LGPD and more. Empower people to build privacy into products and processes from the start. Use WireWheel as a powerful orchestration layer for your privacy program by quickly integrating with existing processes and systems. Automate daily privacy challenges with a simple to use and configurable platform where extended teams can easily collaborate.
  • 30
    Privacy Control Center

    Privacy Control Center

    Privacy Control Center

    Through tailor made modules and workflows, Privacy Control Center bolsters all aspects of protecting and working with personal data. The status of your organization's privacy activities summarized in an easy-to-understand visual representation. The status of your organization's privacy activities summarized in an easy-to-understand visual representation. Extensive, but accessible register for recording processing activities, data subjects' requests and data leaks. The audit and control module has been developed to safeguard your privacy policy in the short and long term. All privacy measures translated into a plan of action and planning. All internal and external documents collected in one place. The knowledge base is supplied with a set of basic documents, which you can expand with internal knowledge and processing agreements. The Privacy Control Center has been developed as a maintenance solution for processing data, through administration, in a structured manner.
  • 31
    CipherTrust Tokenization

    CipherTrust Tokenization

    Thales Cloud Security

    CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including personally identifiable information (PII). While there are no tokenization standards in the industry, most tokenization solutions fall into one of two architectures: vaultless- or vaulted tokenization Both secure and anonymize sensitive assets. Tokenization software can reside in the data center, big data environments or the cloud. Tokenization can remove card holder data from PCI DSS scope with minimal cost and effort, enabling organizations to save on costs associated with compliance with the industry standard. Modern IT architectures require both use and protection of personally identifiable information (PII). With CipherTrust tokenization, PII protection is gained without encryption key management required by the software developer.
  • 32
    LeapYear

    LeapYear

    LeapYear Technologies

    Differential privacy is a mathematically proven standard of data privacy that ensures all data can be used for analytics and machine learning without the risk of compromising information about individual records. LeapYear’s differentially private system protects some of the world’s most sensitive datasets, including social media data, medical information, and financial transactions. The system ensures analysts, data scientists, and researchers can derive value from all of the data, including data of highly sensitive fields, while protecting all facts about individuals, entities, and transactions. Traditional approaches, such as aggregation, anonymization, or masking degrade data value and can be easily exploited to reconstruct sensitive information. LeapYear’s implementation of differential privacy provides mathematically proven assurances that information about individual records cannot be reconstructed, while also enabling all of the data to be leveraged for reporting
  • 33
    Privacy Analytics

    Privacy Analytics

    Privacy Analytics

    Privacy Analytics provides data anonymization services and software for organizations in the consumer and healthcare industries. We enable you to use your sensitive data assets safely and responsibly for innovation that benefits everyone. With Privacy Analytics you can safely de-identify health data to the highest standard, while preserving its utility. Regulatory deadlines are getting more stringent. Timelines to fulfill data requests are getting tighter. Pressure to uphold your company’s reputation has never been more apparent. The climate around data privacy continues to intensify. Everyone from consumers to regulators are holding organizations accountable. With so many stakeholders demanding more transparency, the pressure for drug makers to safely disclose clinical data and documents has never been higher. And as pressure rises, so too does the bar for privacy. You need solutions that both maximize transparency and protect the privacy of trial participants.
  • 34
    Ohalo

    Ohalo

    Ohalo

    Ohalo's Data X-Ray platform automates data governance tasks like: - Data Discovery & Classification - Data Mapping & Cataloguing - Redacting Files containing sensitive personal information - File Analysis & Data Extraction ⚡️ML-Driven Data Governance | 100,000 words/second | 300+ built-in Integrations | Integration with any DLP/SIEM | 360-degree Unstructured Data Visibility | Agentless | Supports 100s of formats | Find PII, payment card information (PCI), and protected health information (ePHI). | Custom connectors for individual data sources (bespoke/legacy) ⚡️ Designed for enterprises, Data X-Ray is provided as a self-managed or fully-managed service. Our customers rely on Data X-Ray for file activity monitoring, security enhancement, and privacy compliance. ⚡️ Deploy Data X-Ray in hours in cloud and on-premise environments ⚡️ Find sensitive data in minutes ⚡️ Easily classify files and records from multiple file repositories and locations
    Starting Price: -
  • 35
    Anonomatic

    Anonomatic

    Anonomatic

    Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations.
  • 36
    PieEye

    PieEye

    PieEye

    PieEye simplifies the complex process of managing user consent and compliance with privacy regulations, such as GDPR and CPRA/CCPA. The quickest, easiest, most efficient, and most automated solution for any ecommerce business; large, medium, or small. There is no need to do headstands and spend weeks or even months on tedious compliance work when our platform can get you up and running in minutes. Easy-to-install, easy-to-install, and automate, PieEye allows you to streamline your compliance efforts and focus on what really matters: growing your business. Discover how effortless compliance can be. With more data privacy laws, cookie compliance is more important than ever. Our cutting-edge cookie banner makes your website fully compliant with all regulations, safeguarding your customers’ data rights and protecting you. Our automated platform streamlines the entire process, enabling you to easily manage requests and ensure compliance with all relevant regulations.
    Starting Price: $29 per month
  • 37
    Proteus NextGen Data Privacy
    Proteus NextGen Data Privacy software provides DPOs, Privacy teams and Legal teams with the data privacy management tools required to manage GDPR compliance, CCPA compliance or other data privacy compliance programme, comprehensively and effectively. Designed for enterprise organisations using current, secure technologies, Proteus NextGen is often regarded as the most highly configurable and comprehensive data privacy software on the market. Covering Privacy Impact Assessments, DPIAs, Transfer Impact Assessments, data mapping, reporting (eg Records of Processing Activity reports), Subject Access Request management, breach notification, vendor management, risk assessment and even automated SCC generation to help with Schrems II compliance, plus other features you would and would not expect. With training and consultancy available to get you up and running quickly, we aim for ultimate customer satisfaction. Go to our website to request a demo www.proteuscyber.com
  • 38
    GDPR Plus

    GDPR Plus

    GDPR Plus

    Say goodbye to manual tracking, enable sharing, and secure storing of data. Mighty Trust’s Data Protection Software solutions centralize your accountability requirements for data protection, security, and compliance laws in different jurisdictions. We streamline, centralize, and control everything from consent management to data sharing, allowing your business to operate as a privacy-forward organization. GDPR Plus Software is our data protection & management software containing our proprietary process for GDPR. The product is offered in the cloud, on premises or can be accessed as part of our managed service solution. Our Activity monitoring functionality helps organizations determine who has access to personal data and when it is being accessed or processed. These solutions come with the following features to help manage activity.
  • 39
    Collibra

    Collibra

    Collibra

    With a best-in-class catalog, flexible governance, continuous quality, and built-in privacy, the Collibra Data Intelligence Cloud is your single system of engagement for data. Support your users with a best-in-class data catalog that includes embedded governance, privacy and quality. Raise the grade, by ensuring teams can quickly find, understand and access data across sources, business applications, BI and data science tools in one central location. Give your data some much-needed privacy. Centralize, automate and guide workflows to encourage collaboration, operationalize privacy and address global regulatory requirements. Get the full story around your data with Collibra Data Lineage. Automatically map relationships between systems, applications and reports to provide a context-rich view across the enterprise. Hone in on the data you care about most and trust that it is relevant, complete and trustworthy.
  • 40
    ContextSpace

    ContextSpace

    ContextSpace

    Make the shift from a slow, expensive, and reactive privacy programme to an agile, effective, and affordable privacy enforcement solution. It's a dynamic approach that can replace dozens of point solutions, offering holistic and integrated privacy & data protection enforcement. We directly produce comprehensive compliance outcomes, preventing over 90% of GDPR and other regulatory infringements from ever happening, proactively preventing unlawful data processing and data disclosure, proactively preventing external data breaches fulfilling all personal data subject rights, generating detailed records of processing, and updating all necessary compliance documentation. At the heart of the "Data Protection by Design" concept is the requirement to proactively enforce privacy policies in real-time, preventing privacy and data protection infringements. Your data might live everywhere, but we can connect to it.
  • 41
    Clarip

    Clarip

    Clarip

    Clarip is an AI (Artificial Intelligence) based data privacy platform that helps companies and consumers manage data privacy. With machine learning, text analytics, and data science, Clarip makes it easier for consumers to understand what is going on, and for companies to get a handle on the piling data from multiple channels and sources. Using algorithms Clarip is constantly working and getting better to make data privacy manageable and just. Our cloud native architecture helps enterprises scale on demand seamlessly. Clarip brings companies and consumers together and makes engagement better.
    Starting Price: $99.00 per month
  • 42
    Iconfirm

    Iconfirm

    Iconfirm

    Ensuring high precision privacy provides greater opportunity for data-driven value creation and reduces the risk of a breach. This requires a systemic approach and to organize the work in the right way. Many organizations struggle with lack of competence and resources and a growing gap between policies and practice. This represents an unnecessary risk and organizations need to operationalize and automate. Privacy cannot be organized segregated from ordinary activities, but must be embedded where the processing of data actually happens. Iconfirm ensures efficient and structured collaboration between individuals, systems and organizations to automate privacy documentation and adherence. A high precision tool for consents or confirmations. Efficient management of data processors and vendors. Data subjects privacy portal builds trust and makes it easy to collaborate. Secure storage, sharing and automated erasure across systems.
  • 43
    Wizuda

    Wizuda

    Wizuda

    Powerful Solutions to revolutionize how your organization shares data internally and externally. Designed with security, compliance and efficiency at its core, Wizuda MFT enables IT to manage the movement of critical data within your organization and with external parties, from one centralized solution. Wizuda MFT scales with your business and provides full end-to-end accountability of all file transfer operations. Provide people in your organization and clients with an easy, secure and compliant way to share sensitive data. With no file size limitations and encryption by default, using insecure alternatives such as USBs can be a thing of the past. Users have the added flexibility of sending emails with Wizuda either straight from their Outlook email or the secure web portal. Wizuda Virtual Data Rooms provide your business with a secure online repository for document storage, collaboration and distribution. Built with ‘privacy by design’, Wizuda VDRs can be set up in minutes.
    Starting Price: $9.99/month/user
  • 44
    Privacy360

    Privacy360

    CENTRL

    Discover, measure and mitigate data privacy risk to quickly get in compliance with the growing number of privacy regulations, from GDPR to CCPA and beyond, in a single, end-to-end, enterprise-grade platform. Comply with GDPR, CCPA, LGPD, PDPA and the hundreds of evolving global privacy laws. Automate the capture and fulfillment of consumer and data subject access rights (DSAR) requests. Leverage intelligent risk mitigation to uncover and remediate risks faster and more comprehensively. Embed branded request forms on your website, or inside of your product. Leverage intelligent templates and manage request dates and extensions per regulation (GDPR, CCPA & beyond). Quickly track down data through connectors and quickly collaborate with data process owners to resolve. Monitor the entire process with a dashboard, revealing patterns or requests and ways to optimize the process. Quickly benefit from a comprehensive view of all your privacy data, locations, and all your processing activities.
  • 45
    Dataships

    Dataships

    Dataships

    Outsource your data privacy compliance. Our Privacy Centre is easy to set up and gives you everything you need to become compliant. Comply. Build a Privacy Center with all you need to comply with global Data Protection laws. Trust. Build trust with your users. All great customer relationships are built on a foundation of brand trust. Policies. We'll help you create your Privacy Policies, Cookie policies, Security Policies, Data Processing Addendums and more. Automate. The Data Privacy landscape is consistently evolving. We'll update your policies for you, if and when necessary. Integrations. We've pre-built all integrations so you don't have to. Seamlessly intergrate with the tools you already use. Access. Leverage our Data Access Gateway to give your customers access to the information you hold on them. Rights fulfillment. Earn your users' respect by showing how you go above and beyond to fulfil their Data Privacy Rights. Automate.
  • 46
    PrivacyPerfect

    PrivacyPerfect

    PrivacyPerfect

    Your accountability solution for easy GDPR compliance. Enjoy an easier and smoother regulatory compliance process, empowering privacy professionals worldwide. Empower your privacy program with one smart, easy-to-use, and secure tool, with integrated automation to help to perform all your compliance tasks. Make your compliance visible towards your key stakeholders. Easily communicate your results within the privacy team and towards upper management through pre-designed, automated reports. Gain overview of your entire privacy administration, whilst remaining in full control. Use smart automation wherever you please to help streamline and standardize your processes. Comply with all requirements of the GDPR while simplifying your data protection efforts.
  • 47
    Securiti

    Securiti

    Securiti

    Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized with numerous industry and analyst awards, including "Most Innovative Startup" by RSA, "Top 25 Machine Learning Startups" by Forbes, "Most Innovative AI Companies" by CB Insights, "Cool Vendor in Data Security" by Gartner, and "Privacy Management Wave Leader" by Forrester. For more information, please follow us on LinkedIn and visit Securiti.ai.
  • 48
    Rixon

    Rixon

    Rixon

    Maximize data security & solve data privacy concerns with the fastest cloud-native vaultless tokenization platform. Knowing your business meets and exceeds compliance requirements gives you the time and peace of mind to focus on what is important for your business. Organizations are faced with increasing operating costs, threats from ransomware, and ongoing compliance audits. Rixon enables you to be safe and confident, giving you the freedom to bring your business value to the world. The Rixon privacy platform drives business outcomes by giving organizations the tools they need to deliver security, compliance, and privacy operations to the business and the applications they support. Rixon eliminates sensitive data exposure within your applications by leveraging our patented tokenization process. Sensitive information is securely ingested and converted into smart security tokens which armor the data from unauthorized data access.
    Starting Price: $99 per month
  • 49
    Privacy Nexus

    Privacy Nexus

    Privacy Nexus

    Create and maintain your record of data processing activities with ease and in accordance with article 30 of the GDPR. Use the dashboard to track your progress, identify risks and determine priorities. The dashboard is the perfect starting point for all privacy professionals. Perform data protection impact assessments to identify privacy risks and to take appropriate measures to minimize them. Handle your incidents and data breaches with a clear workflow that guides you through the process from beginning to end. ‍Send out questionnaires to your vendors to periodically assess their compliance with your data processing agreements. ‍Create a clear overview of all the data subject requests your organization has received and monitor their progress. ‍Use the privacy, information security and data management scans to establish how your organization is doing in these areas and receive recommendations for improvement.
    Starting Price: €67.50 per month
  • 50
    Data Privacy Manager

    Data Privacy Manager

    Data Privacy Manager

    Our team of talented and skilled developers started working on Data Privacy Manager with a vision of creating a well-rounded data privacy platform that will be used by our clients to provide them with a single and unique 360 degrees view of their customers’ personal data lifecycle. Data Privacy Manager is a mature platform and is used in many different vertical markets, helping its users, both data controllers and data processors, to regain control over personal data they’ve been entrusted with. In addition to the traditional full-time Data Protection Officer (DPO) scenario, this product is also designed specifically to support the shared-DPO model, where different firms can buy the service of a single DPO, typically from legal or consulting firms. But the real value of this offering is the opportunity to manage security controls for data retention schedule and deletion of data.