Best Data De-Identification Tools for Google Cloud BigQuery

Find and compare the best Data De-Identification tools for Google Cloud BigQuery in 2025

Use the comparison tool below to compare the top Data De-Identification tools for Google Cloud BigQuery on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Immuta Reviews
    Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals.
  • 2
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 3
    STRM Reviews

    STRM

    STRM

    Free
    It is difficult to create and manage data policies. With PACE, you can ensure that data is used in a secure manner. You can apply data policies to code, no matter where it is located. Say goodbye to costly meetings and long waits, and hello to your new open-source data security engine. Data policies aren't only about controlling access, they are also about extracting value from the data with the correct guardrails. PACE allows you to collaborate on the why, and when automating the code. With PACE, you can programmatically apply data policies across multiple platforms. Integrate into your data platform or catalog (optional) and leverage the native capabilities that you already have. PACE automates the application of policies across major data platforms and catalogs, easing your governance processes. Centralize control and decentralize the execution of policies. Auditing obligations can be met by demonstrating how controls are implemented.
  • 4
    Tonic Reviews
    Tonic automatically creates mock datasets that preserve key characteristics of secure data sets so that data scientists, developers, and salespeople can work efficiently without revealing their identities. Tonic creates safe, de-identified data from your production data. Tonic models your production data from your production data to help tell a similar story in your testing environments. Safe and useful data that is scaled to match your real-world data. Safely share data across businesses, teams, and borders to create data that is identical to your production data. PII/PHI identification and obfuscation. Protect your sensitive data by proactive protection with automatic scanning, alerts and de-identification. Advanced subsetting across diverse database types. Fully automated collaboration, compliance, and data workflows.
  • 5
    Mage Platform Reviews
    Protect, Monitor, and Discover enterprise sensitive data across multiple platforms and environments. Automate your subject rights response and demonstrate regulatory compliance - all in one solution
  • Previous
  • You're on page 1
  • Next