Best Data De-Identification Tools for Tableau

Find and compare the best Data De-Identification tools for Tableau in 2024

Use the comparison tool below to compare the top Data De-Identification tools for Tableau on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 2
    PHEMI Health DataLab Reviews
    Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more
  • 3
    Informatica Persistent Data Masking Reviews
    While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations.
  • 4
    Aircloak Insights Reviews
    Aircloak Insights acts as a transparent proxy between analysts and sensitive data. Analysts can query the system as normal using SQL or dashboards such as Tableau. Aircloak Insights intercepts the query, and tailors it according to the data backend. This could be SQL or a NoSQL large data store. The proxy returns the results, which ensures that they are fully anonymized and aggregated. Aircloak Insights can be integrated directly into your existing workflow. Insights Air allows you to query sensitive data using our web interface Insights. Aircloak Insights also supports connections using business intelligence tools such as Tableau, and other tools that can communicate with Postgres Message Protocol. Aircloak Insights allows you to programmatically run queries using a RESTful interface.
  • 5
    Assure Security Reviews
    Assure Compliance Monitoring is a bundle that includes Assure Security features. They can be used together to quickly identify security and compliance problems by producing alerts, reports, and reports on IBM system activity, database changes, and views of Db2 information. Two features are also included in the bundle, which can be purchased separately. Assure Monitoring & Reporting seamlessly extracts insights directly from IBM i journal data, and generates alerts and reports about security incidents and compliance deviations. You can use the system and database monitoring capabilities separately or together. You can also send data directly to your enterprise SIEM software, allowing IBM security to be monitored on all enterprise platforms. Assure Db2 Security Monitor is an innovative solution that monitors Db2 data views and blocks records. Assure Security offers market-leading IBM i security capabilities that will help you and your organization comply with cybersecurity regulations.
  • 6
    SecuPi Reviews
    SecuPi is a data-centric platform that provides a comprehensive security solution. It offers fine-grained control of access (ABAC), Database Activity Monitor (DAM), and de-identification through FPE encryption and masking, both physical and dynamic (RTBF). SecuPi covers a wide range of applications including packaged and home-grown, direct access tools, cloud environments, big data and cloud environments, as well as packaged and homegrown applications. One data security platform to monitor, control, encrypt and classify data across cloud & on-prem without code changes. Platform that is agile and configurable to meet current and future audit and regulatory requirements. Implementation is fast and cost-effective with no source-code changes. SecuPi’s fine-grain controls for data access protect sensitive data, so that users only see the data they are allowed to view. Seamlessly integrates with Starburst/Trino to automate data access policies and protection operations.
  • Previous
  • You're on page 1
  • Next