Learn More

Average Ratings 297 Ratings

Total
ease
features
design
support
Read all reviews

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

API Access

Has API

API Access

Has API

Integrations

ALTR
AdaptiveGRC
Adobe Analytics
Amazon
BMC AMI Data for Db2
Beamy
Bearer
BitSight
CrowdStrike Falcon
DataCommander
Dataguise
Ensighten Manage
Experian Aperture Data Studio
F-Secure Anti-Virus
Marketo
Microsoft Entra ID
ORO
OneTrust ESG and Sustainability Cloud
OrbusInfinity
mParticle

Integrations

ALTR
AdaptiveGRC
Adobe Analytics
Amazon
BMC AMI Data for Db2
Beamy
Bearer
BitSight
CrowdStrike Falcon
DataCommander
Dataguise
Ensighten Manage
Experian Aperture Data Studio
F-Secure Anti-Virus
Marketo
Microsoft Entra ID
ORO
OneTrust ESG and Sustainability Cloud
OrbusInfinity
mParticle

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

SaaS
iPhone
iPad
Android
Windows
Mac
Linux

Deployment

SaaS
iPhone
iPad
Android
Windows
Mac
Linux

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Vendor Details

Company Name

OneTrust

Founded

2016

Country

United States

Website

www.onetrust.com/solutions/privacy-and-data-governance-cloud/

Vendor Details

Company Name

Securiti

Founded

2018

Country

United States

Website

securiti.ai/

Product Features

Consent Management Platforms

Additional Users / Permissions
Automatic Cookie-Blocking
CCPA Compliance
CMS Integration
Cookie Crawling
Design/Branding Customization
Fingerprinting
GDPR Compliance
IAB Compliance
Reporting / Analytics
Responsive Design
Subdomains Compatibility
Tag Manager Integration
Whitelabel Solution

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Product Features

Consent Management Platforms

Additional Users / Permissions
Automatic Cookie-Blocking
CCPA Compliance
CMS Integration
Cookie Crawling
Design/Branding Customization
Fingerprinting
GDPR Compliance
IAB Compliance
Reporting / Analytics
Responsive Design
Subdomains Compatibility
Tag Manager Integration
Whitelabel Solution

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Lineage

Database Change Impact Analysis
Filter Lineage Links
Implicit Connection Discovery
Lineage Object Filtering
Object Lineage Tracing
Point-in-Time Visibility
User/Client/Target Connection Visibility
Visual & Text Lineage View

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Alternatives

Alternatives

MineOS Reviews

MineOS

Mine