Best Data De-Identification Tools for Microsoft Azure

Find and compare the best Data De-Identification tools for Microsoft Azure in 2025

Use the comparison tool below to compare the top Data De-Identification tools for Microsoft Azure on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Databunker Reviews

    Databunker

    Databunker

    Free
    Databunker is a lightning-fast, open-source vault developed in Go for secure storage of sensitive personal records. Protect user records from SQL and GraphQL injections with a simple API. Streamline GDPR, HIPAA, ISO 27001, and SOC2 compliance. Databunker is a special secure storage system designed to protect: - Personally Identifiable Information (PII) - Protected Health Information (PHI) - Payment Card Industry (PCI) data - Know Your Customer (KYC) records Databunker introduces a new approach to customer data protection: - Secure Indexing: Utilizes hash-based indexing for all search indexes - No Clear Text Storage: Ensures all information is encrypted, enhancing overall security - Restricted Bulk Retrieval: Bulk retrieval is disabled by default, adding an extra layer of defense - API-Based Communication: Backend interacts with Databunker through API calls, similar to NoSQL solutions - Record Token: Databunker creates a secured version of your data object - an object UUID token that is safe to use in your database
  • 2
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 3
    PHEMI Health DataLab Reviews
    Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more
  • 4
    Informatica Persistent Data Masking Reviews
    While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations.
  • 5
    Trūata Calibrate Reviews

    Trūata Calibrate

    Trūata

    $5,000 per month
    Operationalize data pipelines using privacy-centric data management tools. Truata Calibrate empowers businesses to make data useful while leveraging privacy as an important commercial differentiator. Our cloud-native, frictionless software allows businesses to quickly operationalize privacy-compliant pipelines, so that teams can work with the data responsibly and confidently. Truata Calibrate, powered by intelligent automation and a centralized dashboard, facilitates rapid and effective risk assessment and mitigation. The platform offers a smart and standardized solution to manage privacy risks, and ensures data can be transformed effectively for safe use across your business ecosystem. Before performing forensically-targeted de-identification, you can access dynamic recommendations for data transform and view privacy-utility impacts simulations. Transform data into privacy-enhanced datasets which can be shared, transferred and used responsibly.
  • 6
    Celantur Reviews
    Easy to use, integrate and anonymize faces, license plate numbers, vehicles and bodies. Solve privacy issues for a variety of commercial and industrial applications. Our products and expertise are trusted by global industry leaders. We solve anonymization challenges so you can concentrate on your core business. Our team is there to help you along your privacy journey. Data protection is our core business. That's why we have put in place strong measures to comply with GDPR and other data privacy laws. Our cloud service will handle all processing on our infrastructure. You can also use Docker containers to deploy the container on-premises or in your private/public clouds. You will be charged per video or image hour. You can create a free demo account to test it. Blur faces, license plate numbers, persons, and vehicles in images with a simple call to REST.
  • 7
    SecuPi Reviews
    SecuPi is a data-centric platform that provides a comprehensive security solution. It offers fine-grained control of access (ABAC), Database Activity Monitor (DAM), and de-identification through FPE encryption and masking, both physical and dynamic (RTBF). SecuPi covers a wide range of applications including packaged and home-grown, direct access tools, cloud environments, big data and cloud environments, as well as packaged and homegrown applications. One data security platform to monitor, control, encrypt and classify data across cloud & on-prem without code changes. Platform that is agile and configurable to meet current and future audit and regulatory requirements. Implementation is fast and cost-effective with no source-code changes. SecuPi’s fine-grain controls for data access protect sensitive data, so that users only see the data they are allowed to view. Seamlessly integrates with Starburst/Trino to automate data access policies and protection operations.
  • 8
    Syntho Reviews
    Syntho is typically deployed in the trusted and safe environment of our clients, so that (sensitive data) never leaves this environment. Our connectors are ready-to-use to connect you to the target environment and source data. Syntho supports 20+ database connectors, 5+ filesystems, and can connect to every leading database and filesystem. Define what type of synthetizations you want to run. Mask or synthesize values realistically. Automatically detect sensitive data types. Use and share protected data in a secure manner, while maintaining compliance and privacy.
  • Previous
  • You're on page 1
  • Next