Best Data De-Identification Tools of 2024

Find and compare the best Data De-Identification tools in 2024

Use the comparison tool below to compare the top Data De-Identification tools on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Sudo Platform Reviews

    Sudo Platform

    Anonyome Labs

    We believe everyone should have full control over their personal information. They should be able to decide what information they share, with whom and when. Our tools make it easy for you to empower your users and give them back control of their personal information. A Sudo is a digital identity that allows your users to interact with other people or organizations while protecting their personal information. Protect your users from hackers, trackers, or other bad actors in modern digital life. Your users have a variety of tools and capabilities with Sudo to protect their privacy. You can do everything, from keeping communications private to protecting their online shopping and payments. It's easy to add privacy capabilities. With just a few lines code, the Sudo Platform makes it easy to add privacy functionality to your product. The Sudo Platform is easy to deploy and our Admin Console makes managing customer accounts simple. The platform is flexible, scalable, and secure so your customers won't be disappointed.
  • 2
    Enigma Vault Reviews

    Enigma Vault

    Enigma Vault

    Enigma Vault is your PCI Level 1 compliant and ISO 27001 certificated payment card, data and file easy button to tokenization and encryption. It is difficult to tokenize and encrypt data at field level. Enigma Vault does all the heavy lifting for you. Your lengthy and expensive PCI audit can be simplified into a simple SAQ. You can greatly reduce your security risk and PCI scope by storing tokens rather than sensitive card data. Modern technologies allow you to search millions of encrypted values in just milliseconds using modern methods. We fully manage the solution and can adapt it to your needs. Enigma Vault tokenizes and encrypts data of any size. Enigma Vault provides true field-level security. Instead of storing sensitive data you store a token. Enigma Vault offers the following services. Enigma Vault makes crypto and PCI compliance easy. You don't have to manage or rotate private keys, nor deal with complicated cryptography.
  • 3
    Private AI Reviews

    Private AI

    Private AI

    Share your production data securely with ML, data scientists, and analytics teams, while maintaining customer trust. Stop wasting time with regexes and free models. Private AI anonymizes 50+ entities PII PCI and PHI in 49 languages, with unmatched accuracy, across GDPR, CPRA and HIPAA. Synthetic data can be used to replace PII, PCI and PHI text in order to create model training data that looks exactly like production data. This will not compromise customer privacy. Remove PII in 10+ file formats such as PDFs, DOCXs, PNGs, and audios to protect customer data and comply privacy regulations. Private AI uses the most advanced transformer architectures for remarkable accuracy right out of the box. No third-party processing required. Our technology outperforms every other redaction service available on the market. Please feel free to request a copy of the evaluation toolkit for you to test with your own data.
  • 4
    Trūata Calibrate Reviews

    Trūata Calibrate

    Trūata

    $5,000 per month
    Operationalize data pipelines using privacy-centric data management tools. Truata Calibrate empowers businesses to make data useful while leveraging privacy as an important commercial differentiator. Our cloud-native, frictionless software allows businesses to quickly operationalize privacy-compliant pipelines, so that teams can work with the data responsibly and confidently. Truata Calibrate, powered by intelligent automation and a centralized dashboard, facilitates rapid and effective risk assessment and mitigation. The platform offers a smart and standardized solution to manage privacy risks, and ensures data can be transformed effectively for safe use across your business ecosystem. Before performing forensically-targeted de-identification, you can access dynamic recommendations for data transform and view privacy-utility impacts simulations. Transform data into privacy-enhanced datasets which can be shared, transferred and used responsibly.
  • 5
    Celantur Reviews
    Easy to use, integrate and anonymize faces, license plate numbers, vehicles and bodies. Solve privacy issues for a variety of commercial and industrial applications. Our products and expertise are trusted by global industry leaders. We solve anonymization challenges so you can concentrate on your core business. Our team is there to help you along your privacy journey. Data protection is our core business. That's why we have put in place strong measures to comply with GDPR and other data privacy laws. Our cloud service will handle all processing on our infrastructure. You can also use Docker containers to deploy the container on-premises or in your private/public clouds. You will be charged per video or image hour. You can create a free demo account to test it. Blur faces, license plate numbers, persons, and vehicles in images with a simple call to REST.
  • 6
    Randtronics DPM easyCipher Reviews
    Randronics DPM EasyCipher provides Transparent Data Encryption lock-box protection for files, folders and databases. The contents are automatically decrypted by authorized users. TDE-protected items are locked or unlocked like a lockbox. DPM easyCipher, a centrally-managed, policy-based encryption solution, allows an organization standardize its encryption by defining and implementing encryption policies on any server or laptop that has a DPM easyCipher Agent installed. DPM easyCipher secures all files and directories on servers and laptops. DPM easyCipher protects database servers, web/app server, and file servers. DPM easyCipher is a database-native TDE solution that can be extended or replaced by database vendors in order to secure their DB products. Use easyCipher for information outside the database.
  • 7
    Aircloak Insights Reviews
    Aircloak Insights acts as a transparent proxy between analysts and sensitive data. Analysts can query the system as normal using SQL or dashboards such as Tableau. Aircloak Insights intercepts the query, and tailors it according to the data backend. This could be SQL or a NoSQL large data store. The proxy returns the results, which ensures that they are fully anonymized and aggregated. Aircloak Insights can be integrated directly into your existing workflow. Insights Air allows you to query sensitive data using our web interface Insights. Aircloak Insights also supports connections using business intelligence tools such as Tableau, and other tools that can communicate with Postgres Message Protocol. Aircloak Insights allows you to programmatically run queries using a RESTful interface.
  • 8
    Xtendr Reviews
    XtendR unhides detailed, privacy-preserving insights across multiple independent data sources. XtendR allows you to access previously unaccessible data and protects your data throughout its lifecycle. This gives you complete privacy and regulatory compliance. XtendR provides more than anonymity. It's the missing piece in multi-party data sharing that offers true privacy protection. It is cryptography on duty to help you reach your full potential. The most advanced privacy-enhancing technology for data collaboration. Xtendr solved decades-old cryptography challenges of data sharing among mutually distrusting parties. Enterprise-grade data protection allows you to expand your business by allowing individual organizations to form data partnerships and protecting sensitive data. Data is the currency in our digital age. Some argue that data is replacing oil as the most valuable resource in the world, and there is no doubt about how important it is.
  • 9
    Assure Security Reviews
    Assure Compliance Monitoring is a bundle that includes Assure Security features. They can be used together to quickly identify security and compliance problems by producing alerts, reports, and reports on IBM system activity, database changes, and views of Db2 information. Two features are also included in the bundle, which can be purchased separately. Assure Monitoring & Reporting seamlessly extracts insights directly from IBM i journal data, and generates alerts and reports about security incidents and compliance deviations. You can use the system and database monitoring capabilities separately or together. You can also send data directly to your enterprise SIEM software, allowing IBM security to be monitored on all enterprise platforms. Assure Db2 Security Monitor is an innovative solution that monitors Db2 data views and blocks records. Assure Security offers market-leading IBM i security capabilities that will help you and your organization comply with cybersecurity regulations.
  • 10
    Cloud Compliance Reviews

    Cloud Compliance

    Cloud Compliance

    With the most comprehensive range of products, you can implement privacy compliance and data security in Salesforce. A thorough data inventory and risk assessment are essential for privacy programs to be successful. Most organizations overlook data or struggle with spreadsheets and manual processes. Our Personal Data Inventory product automates and streamlines DPIA and enterprise data inventories flows. Your organization will be able to easily have a clear risk assessment and a data inventory. Many organizations are experiencing an increase in privacy rights requests. It is difficult, inconsistent, and error-prone to respond to these requests manually, increasing the risk of non-compliance. Our Privacy Rights Automation product allows self-service and automates all privacy related activities. A standardised and error-free solution to reduce the risk of non-compliance
  • 11
    Tonic Reviews
    Tonic automatically creates mock datasets that preserve key characteristics of secure data sets so that data scientists, developers, and salespeople can work efficiently without revealing their identities. Tonic creates safe, de-identified data from your production data. Tonic models your production data from your production data to help tell a similar story in your testing environments. Safe and useful data that is scaled to match your real-world data. Safely share data across businesses, teams, and borders to create data that is identical to your production data. PII/PHI identification and obfuscation. Protect your sensitive data by proactive protection with automatic scanning, alerts and de-identification. Advanced subsetting across diverse database types. Fully automated collaboration, compliance, and data workflows.
  • 12
    Privitar Reviews
    The Privitar Data Provisioning platform is a modern, comprehensive data provisioning platform that enables collaboration between data owners, data users, and data guardians to deliver secure data within and outside an organization in a fraction the time it takes compared to traditional methods. Privitar makes sensitive data easily accessible by using privacy enhancing technologies. This allows organizations like yours to optimize their business and customer outcomes. Countdown to launch with Privitar and discover why only Privitar has both the technology and expertise necessary to create a modern and safe data provisioning environment. You will be the first to get a seat on our journey to empower organizations to safely use all their data. We provide self-service access to secure data that allows you to generate new revenue opportunities for your business. All of this while seamlessly integrating into your existing infrastructure to reduce costs and speed up time to value.
  • 13
    Privacy Analytics Reviews

    Privacy Analytics

    Privacy Analytics

    Privacy Analytics offers data anonymization software and services for healthcare and consumer organizations. Privacy Analytics allows you to safely and responsibly use your sensitive data assets for innovation that benefits all. Privacy Analytics allows you to safely de-identify your health data to the highest standards while still preserving its utility. The regulatory deadlines are becoming more stringent. Data requests are becoming more urgent. There is greater pressure to maintain your company's reputation than ever before. The climate surrounding data privacy continues to get more intense. Everybody, from regulators to consumers, is holding organizations accountable. Drug makers are under increasing pressure to disclose clinical data and documents. As the pressure mounts, so does the demand for privacy. Solutions that maximize transparency while protecting the privacy of trial participants are needed.
  • 14
    IBM InfoSphere Optim Data Privacy Reviews
    IBM InfoSphere®, Optim™, Data Privacy offers extensive capabilities to mask sensitive data in non-production environments such as development, testing, QA, or training. This single offering offers a variety transformation techniques that can replace sensitive information with fully functional, functionally masked data. Substrings, arithmetic, sequential or random number generation, date ageing, and concatenation are all examples of masking techniques. The context-aware masking capabilities allow data to be retained in a similar format as the original. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking tools can be used to prevent misuse of information. They allow you to mask, obfuscate, and privatize personal information that is distributed across non-production environments.
  • 15
    Baffle Reviews
    Baffle provides data protection that is universal from any source to any destination. You can control who has access to what data. Enterprises continue to fight cybersecurity threats like ransomware and breaches and losses of data assets in private and public clouds. New data management restrictions and considerations about how it must be protected have altered the way data is stored, retrieved and analyzed. Baffle believes data breaches and data loss will not occur. Our last line of defense is to ensure that attackers cannot access unprotected data. Our data protection solutions protect data from the moment it is created and keep it safe while it is being processed. Baffle's transparent security mesh for cloud and on-premise data offers multiple data protection modes. You can protect data as it moves between a source data store and a cloud database or object storage. This ensures safe consumption of sensitive information.
  • 16
    Anonos Data Embassy Reviews
    Anonos spent ten years in the lab researching and developing Data Embassy. This was to show that it is possible to selectively disclose, access, and use data with a level of precision and granularity never before achieved. We have addressed the issues of data privacy and security point solutions so that organizations can use sensitive data as part of their data-driven initiatives while still being compliant. Data Embassy transforms source data into Variant Twins, which are non-identifiable but 100% accurate data assets that can only be used for authorized purposes. Variant Twins are able to travel internationally because multi-level security and privacy controls are embedded in the data.
  • 17
    GrowthDot GDPR Compliance for Zendesk Reviews

    GrowthDot GDPR Compliance for Zendesk

    GrowthDot

    $41.70 organization/per month
    The GDPR Compliance app is for Zendesk. It allows you to delete, anonymize and retrieve customers' data within Zendesk instances. Here are some basic features of the app: You can process thousands of contacts and tickets quickly and efficiently. Combine user, ticket, and organizational lists For bulk treatment, create a ticket and a contact list Supprime personal data of users or organizations; Confidentialize all or just sensitive information Download CSV files to compile data You can edit information one-by-one or in bulk. You can anonymize your credit card and phone numbers completely Automate and schedule your processes Take a look at the statistics. User-friendly interface; To process the data, submit requests to agents Authorize agents to run processes Configure tag anonymization for tickets
  • 18
    CipherTrust Tokenization Reviews

    CipherTrust Tokenization

    Thales Cloud Security

    CipherTrust Tokenization reduces the cost and effort needed to comply with security policies, regulatory mandates such as PCI DSS and also makes it easy to protect sensitive data including personally identifiable Information (PII). There are no industry standards for tokenization, but most solutions fall into two categories: vaultless or vaulted. Both secure and anonymousize sensitive assets. Tokenization software is available in the datacenter, big data environments, or the cloud. Tokenization can remove cardholder data from PCI DSS with minimal effort and cost, allowing organizations to save costs associated with compliance. Modern IT architectures demand both the use and protection of personally identifiable data (PII). CipherTrust tokenization provides PII security without the need for encryption key management by software developers.
  • 19
    ShieldConex Reviews
    Tokenize the PAN (primary customer number) and any associated PII/PHI so that you can maintain compliance with regulations governing sensitive data handling. PCI DSS scope is reduced across all channels and trusted tiers. Tokenization helps your organization comply with evolving security standards by masking data at the point of input. ShieldConex tokenizes every data element vaultlessly, while preserving the format. Payment data including credit or debit cards primary account number (PAN), date, expiration, CVV, name of cardholder, and more. Standardize payment experiences across businesses, locations, and channels, including mobile, online, in-store, and more.
  • 20
    StratoKey Reviews

    StratoKey

    StratoKey

    StratoKey CASB is a cloud and SaaS application security solution that combines Encryption Monitoring Analytics and Defence (EMADTM). StratoKey CASB allows organizations to conduct compliant and secure business in the cloud. StratoKey is transparent and application agnostic to your users. This allows your employees to use the best tools online while protecting your sensitive information. StratoKey acts as your eyes and ears on the cloud. You can monitor your users and have complete visibility of their interactions with your apps. StratoKey CCM enables organizations to move from ad-hoc compliance actions into a structured, auditable and organized compliance program. Compliance programs are driven through Discovery, Automation Tasking and Reporting.
  • 21
    Viacryp Reviews
    Enjoy the convenience of using a Trusted Third Party to carefully pseudonymize personal data so that you can perform analysis within the GDPR framework. Our basic service is to pseudonymize personal data. We use the principles of irreversible pseudonyms, thickening behavior and thickening of words. The pseudonymized information is used by our clients to further process the data. Our filter service allows you to share your personal data in a proportionate manner and respecting privacy. We filter information using a pseudonymized expert whitelist, and only send information about individuals that appear on this list. Viacryp offers privacy advice in relation to the protection and security personal data. Together with our partners we provide advice on the steps that an organization can take to comply with the GDPR frameworks. This includes both technical and organizational and processes measures.
  • 22
    Assure QuickEDD Reviews
    Disaster recovery products that are simple, scalable and full-featured can protect critical IBM i apps from downtime. Assure QuickEDD copies IBM i objects and data in real-time on local or remote backup servers. These servers are then ready to take over the production role, or recover data including data from previous points in time. Assure Quick EDD can be expanded to multiple nodes, and supports multiple replication topologies. It is also scalable and can be used for a variety IBM i OS versions and storage combinations. The service has a graphical user interface that supports seven different languages, a 5250 interface and customizable switch procedures. These can be run interactively, in batch mode or step-by-step. Tools are available for analysis, monitoring and specific configurations. Reports can be generated on your HA environment and job logs. Alerts can be sent via email, MSGQ and SNMP.
  • 23
    NMTY Enterprise Reviews
    NMTY Enterprise protects all privacy-sensitive data in your organization, whether it is stored on databases or files. NMTY Enterprise can be integrated into your IT environment to anonymize data sources. NMTY Enterprise allows you to anonymize data, regardless of the format it is stored in. This includes databases and individual files. Anonymize data in a database, or in files such as CSV or XML. Data is anonymized at the source. This prevents duplicates of non-anonymized information. The connections to your data sources are encrypted and support integrated authentication. It is possible to directly anonymize images and documents. Our solutions are based on the most recent innovations and can be integrated directly into your processes. We can always expect the best results.
  • 24
    NavInfo Anonymization Reviews
    You can anonymize license plates and faces in your data without worrying about non-compliance to privacy laws like GDPR, CCPA and APPI. Compare the images before and afterwards using our examples. Upload a JPEG image or PNG to test our model. See how our model anonymizes all personal information markers. The solution for GDPR Compliance offers several key features. It can be customized to meet specific requirements and ensure GDPR compliance. We provide the best deployment options to reduce processing time and human intervention. This saves both time and money. There are a variety of deployment options, including cloud, API, and on-premise. The solution blurs faces and license plates even in difficult vision conditions.
  • 25
    SecuPi Reviews
    SecuPi is a data-centric platform that provides a comprehensive security solution. It offers fine-grained control of access (ABAC), Database Activity Monitor (DAM), and de-identification through FPE encryption and masking, both physical and dynamic (RTBF). SecuPi covers a wide range of applications including packaged and home-grown, direct access tools, cloud environments, big data and cloud environments, as well as packaged and homegrown applications. One data security platform to monitor, control, encrypt and classify data across cloud & on-prem without code changes. Platform that is agile and configurable to meet current and future audit and regulatory requirements. Implementation is fast and cost-effective with no source-code changes. SecuPi’s fine-grain controls for data access protect sensitive data, so that users only see the data they are allowed to view. Seamlessly integrates with Starburst/Trino to automate data access policies and protection operations.