Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Databunker is a lightning-fast, open-source vault developed in Go for secure storage of sensitive personal records. Protect user records from SQL and GraphQL injections with a simple API. Streamline GDPR, HIPAA, ISO 27001, and SOC2 compliance.
Databunker is a special secure storage system designed to protect:
- Personally Identifiable Information (PII)
- Protected Health Information (PHI)
- Payment Card Industry (PCI) data
- Know Your Customer (KYC) records
Databunker introduces a new approach to customer data protection:
- Secure Indexing: Utilizes hash-based indexing for all search indexes
- No Clear Text Storage: Ensures all information is encrypted, enhancing overall security
- Restricted Bulk Retrieval: Bulk retrieval is disabled by default, adding an extra layer of defense
- API-Based Communication: Backend interacts with Databunker through API calls, similar to NoSQL solutions
- Record Token: Databunker creates a secured version of your data object - an object UUID token that is safe to use in your database
Description
SecuPi presents a comprehensive data-centric security solution that includes advanced fine-grained access control (ABAC), Database Activity Monitoring (DAM), and various de-identification techniques such as FPE encryption, physical and dynamic masking, and right to be forgotten (RTBF) deletion. This platform is designed to provide extensive protection across both commercial and custom applications, encompassing direct access tools, big data environments, and cloud infrastructures. With SecuPi, organizations can utilize a single data security framework to effortlessly monitor, control, encrypt, and categorize their data across all cloud and on-premises systems without requiring any modifications to existing code. The platform is agile and configurable, enabling it to adapt to both current and future regulatory and auditing demands. Additionally, its implementation is rapid and cost-effective, as it does not necessitate any alterations to source code. SecuPi's fine-grained data access controls ensure that sensitive information is safeguarded, granting users access solely to the data they are entitled to, while also integrating smoothly with Starburst/Trino to automate the enforcement of data access policies and enhance data protection efforts. This capability allows organizations to maintain compliance and security effortlessly as they navigate their data management challenges.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
MySQL
PostgreSQL
.NET
Aerospike
Apache Kafka
BigID
Docker
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
MySQL
PostgreSQL
.NET
Aerospike
Apache Kafka
BigID
Docker
Pricing Details
Free
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Databunker
Country
United States
Website
databunker.org
Vendor Details
Company Name
SecuPi
Country
United States
Website
secupi.com
Product Features
Data Privacy Management
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Product Features
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance