Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Don't allow concerns about data security or privacy to obstruct your innovation efforts driven by analytics. Dataguise offers robust protection for personal and sensitive information through adaptable masking and encryption solutions, ensuring you can maximize business value. With data sets prepared for analysis delivered in near real-time, you can gain fresher insights and make informed decisions based on a complete understanding of your data landscape. Recognizing the diverse and evolving needs of our customers, Dataguise has built a strong network of carefully selected partners to provide more comprehensive solutions, services, and expertise. This executive guide illustrates how to safeguard data privacy while enhancing data value. When looking at various data discovery solutions, it's clear that Dataguise has a longer history, accommodates a wider array of data types and repositories, achieves lower false-positive rates, and consistently scans data at scale more effectively. By choosing Dataguise, organizations can confidently harness their data to drive decisions that best serve their business objectives, ultimately fostering a culture of informed and strategic decision-making.

Description

Delphix is the industry leader for DataOps. It provides an intelligent data platform that accelerates digital change for leading companies around world. The Delphix DataOps Platform supports many systems, including mainframes, Oracle databases, ERP apps, and Kubernetes container. Delphix supports a wide range of data operations that enable modern CI/CD workflows. It also automates data compliance with privacy regulations such as GDPR, CCPA and the New York Privacy Act. Delphix also helps companies to sync data between private and public clouds, accelerating cloud migrations and customer experience transformations, as well as the adoption of disruptive AI technologies.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
Amazon RDS
Clonetab
Cloudera
Couchbase
IBM Cloud
IBM Informix
Jtest
Liquibase
MongoDB
MySQL
Puppet Enterprise
Redgate SQL Monitor
SAP Cloud Platform
ServiceNow
TrustArc

Integrations

Amazon Web Services (AWS)
Google Cloud Platform
Microsoft Azure
Amazon RDS
Clonetab
Cloudera
Couchbase
IBM Cloud
IBM Informix
Jtest
Liquibase
MongoDB
MySQL
Puppet Enterprise
Redgate SQL Monitor
SAP Cloud Platform
ServiceNow
TrustArc

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Dataguise

Founded

2007

Country

United States

Website

www.dataguise.com

Vendor Details

Company Name

Perforce

Founded

1995

Country

United States

Website

www.perforce.com/products/delphix

Product Features

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Product Features

Application Lifecycle Management

Administrator Level Control
Defect Tracking
Iteration Planning
Project Management
Release Management
Requirements Review
Task Management
Test Case Tracking
User Level Management
Version Control

Continuous Integration

Build Log
Change Management
Configuration Management
Continuous Delivery
Continuous Deployment
Debugging
Permission Management
Quality Assurance Management
Testing Management

Data Fabric

Data Access Management
Data Analytics
Data Collaboration
Data Lineage Tools
Data Networking / Connecting
Metadata Functionality
No Data Redundancy
Persistent Data Management

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Database

Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Master Data Management

Data Governance
Data Masking
Data Source Integrations
Hierarchy Management
Match & Merge
Metadata Management
Multi-Domain
Process Management
Relationship Mapping
Visualization

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Alternatives

IRI FieldShield Reviews

IRI FieldShield

IRI, The CoSort Company

Alternatives

IRI Voracity Reviews

IRI Voracity

IRI, The CoSort Company
IRI Voracity Reviews

IRI Voracity

IRI, The CoSort Company