Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Tag Inspector serves as a robust platform for auditing and governing tags, offering organizations extensive insights into the tags, pixels, and cookies that are active on their websites. This capability enables firms to evaluate their data collection methods, enhance their tag frameworks, and address privacy risks effectively. With a vast repository of thousands of distinct tags, the platform includes features such as compliance risk assessments to pinpoint platforms that pose significant risks, benchmarking of privacy practices, and the detection of unauthorized personally identifiable information (PII) to flag exposed emails, addresses, and other sensitive information. Additionally, it features monitoring of consent policies that emulate user consent scenarios to identify any breaches of established consent guidelines. Moreover, Tag Inspector excels in server-side tag monitoring, encompassing tags that operate through server-side tag management systems, ensuring that only sanctioned data flows are permitted, regardless of the underlying architecture. This comprehensive approach not only enhances governance but also fortifies overall data integrity and privacy compliance for organizations.

Description

VanishID is a fully automated digital privacy service driven by AI and designed specifically for businesses, delivering a comprehensive managed solution that minimizes the exposure of personally identifiable information (PII) without necessitating integration or involvement from security personnel or staff members. Among its offerings are ongoing removals from data brokers, monitoring for privacy breaches on the dark web, protection against social media impersonation, and complimentary family privacy safeguards, alongside device privacy features. The service enhances digital executive protection by merging automated functionalities with in-depth insights into the tactics used by attackers for reconnaissance, thereby providing proactive measures to protect individuals and their families who may be at higher risk. Essential capabilities include constant surveillance and automated removal of data broker traces, dark web checks for compromised passwords linked to both work and personal accounts, swift identification and counteractions against social media impersonation, as well as instant messaging support. Additionally, this service not only aims to protect sensitive information but also empowers organizations to maintain a robust privacy posture effortlessly.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Active Directory
Google Tag Manager

Integrations

Active Directory
Google Tag Manager

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Tag Inspector

Founded

2010

Country

United States

Website

taginspector.com/product/

Vendor Details

Company Name

VanishID

Founded

2019

Country

United States

Website

vanishid.com

Product Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Product Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Alternatives

Alternatives

TRUENDO Reviews

TRUENDO

TRUENDO Technologies