Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Databunker is a lightning-fast, open-source vault developed in Go for secure storage of sensitive personal records. Protect user records from SQL and GraphQL injections with a simple API. Streamline GDPR, HIPAA, ISO 27001, and SOC2 compliance.
Databunker is a special secure storage system designed to protect:
- Personally Identifiable Information (PII)
- Protected Health Information (PHI)
- Payment Card Industry (PCI) data
- Know Your Customer (KYC) records
Databunker introduces a new approach to customer data protection:
- Secure Indexing: Utilizes hash-based indexing for all search indexes
- No Clear Text Storage: Ensures all information is encrypted, enhancing overall security
- Restricted Bulk Retrieval: Bulk retrieval is disabled by default, adding an extra layer of defense
- API-Based Communication: Backend interacts with Databunker through API calls, similar to NoSQL solutions
- Record Token: Databunker creates a secured version of your data object - an object UUID token that is safe to use in your database
Description
Truzta is an advanced platform that leverages artificial intelligence to streamline security and compliance automation, enabling organizations to efficiently achieve, sustain, and scale their adherence to key regulatory frameworks like ISO 27001, SOC 2, HIPAA, and GDPR. By automating critical processes such as gap assessments, control implementations, policy creation, evidence gathering, ongoing monitoring, and audit preparedness, Truzta offers a comprehensive dashboard for users. The platform enhances compliance readiness through automated evidence gathering that connects with numerous tools, timely notifications for failing controls, and ongoing penetration testing paired with risk assessments to identify vulnerabilities before they can be exploited. Truzta also encompasses features like secure code reviews, cloud security posture management, API security, automated access evaluations, incident management, third-party risk oversight, and customizable policy templates, significantly minimizing manual tasks and the potential for errors while ensuring that all documentation is always ready for audits. Additionally, it streamlines operational workflows through smooth integrations, organized change management, and centralized reporting, making it an invaluable asset for organizations aiming to enhance their security posture and compliance efforts. Ultimately, Truzta stands out as a solution that not only reduces complexity but also fosters a proactive approach to compliance and security.
API Access
Has API
API Access
Has API
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
Azure DevOps
Coda
Contentful
Docker
Freshdesk
GitLab
Google Workspace
Integrations
Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
Azure DevOps
Coda
Contentful
Docker
Freshdesk
GitLab
Google Workspace
Pricing Details
Free
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Databunker
Country
United States
Website
databunker.org
Vendor Details
Company Name
Truzta
Founded
2021
Country
United Kingdom
Website
truzta.com
Product Features
Data Privacy Management
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Product Features
GDPR Compliance
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
HIPAA Compliance
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management