Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Transcend is a data privacy infrastructure that allows companies to give their users control of their personal data. Personal data is scattered, difficult to find, and stored across multiple systems. Companies find it difficult to offer data rights, such as deleting your data. Transcend automatically fulfills data subject request within companies across all data systems and vendors. Transcend also offers their end-users a control panel (or "Privacy Centre") hosted at privacy.<company>.com allows users to manage their privacy preferences, export or delete their data. Transcend makes data subject requests for companies easy. This puts users everywhere in control of their personal data.</company>

Description

Developed and continuously improved by a dedicated team of professionals specializing in differential privacy, this system is actively utilized by organizations such as the U.S. Census Bureau. It operates on the Spark framework, seamlessly handling input tables with billions of entries. The platform offers an extensive and expanding array of aggregation functions, data transformation operations, and privacy frameworks. Users can execute public and private joins, apply filters, or utilize custom functions on their datasets. It enables the computation of counts, sums, quantiles, and more under various privacy models, ensuring that differential privacy is accessible through straightforward tutorials and comprehensive documentation. Tumult Analytics is constructed on our advanced privacy architecture, Tumult Core, which regulates access to confidential data, ensuring that every program and application inherently includes a proof of privacy. The system is designed by integrating small, easily scrutinized components, ensuring a high level of safety through proven stability tracking and floating-point operations. Furthermore, it employs a flexible framework grounded in peer-reviewed academic research, guaranteeing that users can trust the integrity and security of their data handling processes. This commitment to transparency and security sets a new standard in the field of data privacy.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Foursquare
Front
Google Ads
Google Analytics
Heap
Iterable
Java
Mailchimp
Meta Audience Network
Optimizely One
Ours Privacy
Python
SPARK
Salesforce
Segment
Zendesk

Integrations

Foursquare
Front
Google Ads
Google Analytics
Heap
Iterable
Java
Mailchimp
Meta Audience Network
Optimizely One
Ours Privacy
Python
SPARK
Salesforce
Segment
Zendesk

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

Transcend

Founded

2017

Country

United States

Website

transcend.io

Vendor Details

Company Name

Tumult Analytics

Founded

2019

Country

United States

Website

www.tmlt.dev/

Product Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Product Features

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Alternatives

Alternatives

LeapYear Reviews

LeapYear

LeapYear Technologies
Secuvy AI Reviews

Secuvy AI

Secuvy
MineOS Reviews

MineOS

Mine
Mage Platform Reviews

Mage Platform

Mage Data