Best Data De-Identification Tools in China - Page 2

Find and compare the best Data De-Identification tools in China in 2025

Use the comparison tool below to compare the top Data De-Identification tools in China on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Aircloak Insights Reviews
    Aircloak Insights acts as a secure intermediary between data analysts and the sensitive information they require for their work. Analysts can interact with the system using standard SQL queries or visual dashboards such as Tableau. The system intercepts these queries and customizes them for the underlying data sources, whether they are SQL databases or NoSQL big data repositories. The results are then delivered through the proxy, which guarantees that the data is both aggregated and completely anonymized. Moreover, Aircloak Insights seamlessly fits into your established workflow, enabling you to access sensitive datasets through its user-friendly web interface, Insights Air, or by utilizing business intelligence tools, including Tableau and any other platforms that support the Postgres Message Protocol. Additionally, for those who prefer automation, Aircloak Insights offers the capability to execute queries programmatically via a RESTful API, providing further flexibility in data handling. This comprehensive approach ensures that analysts can work efficiently while maintaining data privacy and security.
  • 2
    xtendr Reviews
    xtendr reveals comprehensive, privacy-focused insights from various independent data sources while ensuring user protection throughout the entire data lifecycle. This innovative platform provides access to previously unreachable data and instills confidence in both privacy and adherence to regulations. Beyond mere anonymity, xtendr addresses the critical gap in multi-party data sharing by offering robust privacy safeguards, effectively serving as a guardian of your data through advanced cryptography, enabling you to unlock your full potential. It represents the pinnacle of privacy-enhancing data collaboration technology, having successfully tackled the long-standing cryptographic challenges associated with data sharing among parties that may not fully trust one another. With xtendr, organizations can advance their operations through an enterprise-level data protection solution that facilitates the formation of data partnerships while safeguarding sensitive information. In today's digital landscape, data is increasingly recognized as a vital currency, with many asserting that it is surpassing oil as the most valuable asset, underscoring its ever-growing significance. As we continue to embrace this digital evolution, the importance of secure data sharing becomes ever more critical for businesses looking to thrive in an interconnected world.
  • 3
    Assure Security Reviews
    Assure Compliance Monitoring is a comprehensive suite of Assure Security functionalities designed to swiftly detect security and compliance challenges by generating alerts and reports based on IBM i system operations, database modifications, and insights into Db2 data. The suite comprises two features that can also be utilized independently. Assure Monitoring and Reporting effectively extracts valuable insights from IBM i journal data, providing alerts and reports regarding security breaches and compliance discrepancies. Monitoring capabilities for both systems and databases can be accessed separately or in conjunction, and you also have the option to channel data directly to your enterprise SIEM solution, enabling IBM i security oversight alongside other enterprise platforms. Additionally, Assure Db2 Data Monitor stands out as an innovative tool that oversees access to highly sensitive Db2 data and can even restrict visibility of certain records. Assure Security offers leading-edge IBM i security solutions that empower your organization to adhere to cybersecurity regulations effectively while ensuring robust protection of your data. This holistic approach to security not only safeguards sensitive information but also streamlines compliance processes across your organization.
  • 4
    Tonic Reviews
    Tonic provides an automated solution for generating mock data that retains essential features of sensitive datasets, enabling developers, data scientists, and sales teams to operate efficiently while ensuring confidentiality. By simulating your production data, Tonic produces de-identified, realistic, and secure datasets suitable for testing environments. The data is crafted to reflect your actual production data, allowing you to convey the same narrative in your testing scenarios. With Tonic, you receive safe and practical data designed to emulate your real-world data at scale. This tool generates data that not only resembles your production data but also behaves like it, facilitating safe sharing among teams, organizations, and across borders. It includes features for identifying, obfuscating, and transforming personally identifiable information (PII) and protected health information (PHI). Tonic also ensures the proactive safeguarding of sensitive data through automatic scanning, real-time alerts, de-identification processes, and mathematical assurances of data privacy. Moreover, it offers advanced subsetting capabilities across various database types. In addition to this, Tonic streamlines collaboration, compliance, and data workflows, delivering a fully automated experience to enhance productivity. With such robust features, Tonic stands out as a comprehensive solution for data security and usability, making it indispensable for organizations dealing with sensitive information.
  • 5
    Privitar Reviews
    The Privitar Data Provisioning Platform is an innovative and all-encompassing solution that facilitates collaboration among data owners, consumers, and guardians to provide secure data both internally and externally, significantly faster than traditional methods. By leveraging privacy-enhancing technologies, Privitar is making it easier for organizations like yours to harness sensitive data, thereby improving business performance and customer satisfaction. Join us as we prepare for our launch and discover why Privitar uniquely possesses the technology and expertise necessary to establish a secure and contemporary data provisioning environment. Gaining early access allows you to be among the first to experience how we empower organizations to safely utilize their data. Our platform offers quick, self-service access to secure data, enabling your business to uncover new revenue streams while effortlessly fitting into your current infrastructure, thus minimizing costs and accelerating the realization of value. Don't miss out on the opportunity to transform the way your organization manages and utilizes data.
  • 6
    Privacy Analytics Reviews
    Privacy Analytics specializes in providing cutting-edge data anonymization solutions and software tailored for businesses in the consumer and healthcare sectors. Our services empower you to harness your sensitive data assets securely and ethically, fostering innovation that serves the greater good. With Privacy Analytics, you can effectively de-identify health data to meet the highest standards while maintaining its practical value. As regulatory requirements become increasingly stringent, the timelines for data requests are also shrinking, placing added pressure on organizations to maintain their reputations. The ongoing climate of data privacy is becoming more critical, with consumers and regulators alike holding companies accountable. This heightened scrutiny has amplified the stakes for pharmaceutical companies, necessitating safe disclosures of clinical data and related documents. As the demand for transparency escalates, the challenge of balancing it with the privacy of trial participants becomes even more pronounced, underscoring the need for innovative solutions that ensure both accountability and confidentiality in data handling. Consequently, organizations must adapt swiftly to these evolving expectations to thrive in this challenging environment.
  • 7
    Piiano Reviews
    New privacy regulations frequently clash with the foundational structures of enterprise systems that were not originally intended to safeguard sensitive information. Piiano leads the way in data privacy engineering tailored for the cloud, introducing the first-ever platform focused on personal data protection and management, which revolutionizes how businesses can construct architectures that prioritize privacy and implement effective privacy practices. By offering a ready-made, developer-friendly framework, Piiano significantly simplifies the process of adopting or enhancing enterprise privacy engineering, enabling developers to create architectures designed with privacy in mind. This engineering solution not only protects sensitive customer data but also proactively prevents data breaches and assists businesses in keeping pace with evolving privacy laws. The Vault serves as a specialized and secure database for aggregating sensitive data, which developers can integrate into their enterprise Virtual Private Cloud (VPC). This setup guarantees that the Vault and all its contents remain exclusively accessible to the enterprise, fortifying data security. Consequently, businesses can focus on innovation while ensuring compliance and protection of their users' information.
  • 8
    IBM InfoSphere Optim Data Privacy Reviews
    IBM InfoSphere® Optim™ Data Privacy offers a comprehensive suite of tools designed to effectively mask sensitive information in non-production settings like development, testing, quality assurance, or training. This singular solution employs various transformation methods to replace sensitive data with realistic, fully functional masked alternatives, ensuring the confidentiality of critical information. Techniques for masking include using substrings, arithmetic expressions, generating random or sequential numbers, manipulating dates, and concatenating data elements. The advanced masking capabilities maintain contextually appropriate formats that closely resemble the original data. Users can apply an array of masking techniques on demand to safeguard personally identifiable information and sensitive corporate data within applications, databases, and reports. By utilizing these data masking features, organizations can mitigate the risk of data misuse by obscuring, privatizing, and protecting personal information circulated in non-production environments, thereby enhancing data security and compliance. Ultimately, this solution empowers businesses to navigate privacy challenges while maintaining the integrity of their operational processes.
  • 9
    Sudo Platform Reviews
    Sudo Platform stands out as an API-centric ecosystem tailored for developers, equipping partners with essential tools to swiftly and thoroughly offer end-users the capabilities needed to safeguard and manage their personal information in the digital landscape. This platform boasts a modular design that is easy to implement and contains a robust suite of key digital privacy and cybersecurity tools, such as secure browsing, password management, VPN services, virtual cards, encrypted communications, and decentralized identity solutions. In addition to these features, the developer-centric platform also provides comprehensive documentation, a first-class API ecosystem, SDK source code available on GitHub, sample applications for testing various functionalities, and vendor-brandable (white-label) apps that facilitate rapid market entry. By fostering a seamless integration experience, Sudo Platform significantly enhances the ability of developers to implement privacy solutions effectively. This commitment to agility and efficiency makes it an indispensable resource in the evolving digital safety landscape.
  • 10
    Baffle Reviews
    Baffle delivers comprehensive data protection solutions that secure data from any origin to any endpoint, allowing organizations to manage visibility over their information. Companies are continually facing cybersecurity challenges, including ransomware attacks, alongside the potential for losing their data assets in both public and private cloud environments. Recent changes in data management regulations and the necessity for enhanced protection have transformed the methods by which data is stored, accessed, and analyzed. By recognizing that data breaches are inevitable, Baffle aims to make such incidents insignificant, offering a crucial layer of defense that guarantees unprotected data remains inaccessible to malicious actors. Our solutions are designed to secure data right from its inception and maintain that security throughout its processing stages. With Baffle's dynamic data security framework applicable to both on-premises and cloud environments, users benefit from various data protection options. This includes the ability to safeguard information in real-time as it transitions from a source data repository to cloud databases or object storage, thereby enabling the safe handling of sensitive information. In this way, Baffle not only protects data but also enhances the overall trust in data management practices.
  • 11
    Anonos Data Embassy Reviews
    For a decade, Anonos dedicated its efforts to the lab, innovating and advancing the concept of Data Embassy to demonstrate that data can be selectively accessed, revealed, and utilized with unprecedented granularity and precision. By tackling the limitations of existing data privacy and security solutions, we empower organizations to leverage sensitive information in their data-driven strategies while ensuring compliance with regulations. The functionality of Data Embassy lies in its ability to convert original data into Variant Twins: these are non-identifiable yet completely accurate data assets designed for specific, authorized applications. With built-in, multi-tiered privacy and security measures that are inherently part of the data and enforced through technology, Variant Twins can be transported freely, including across international borders, thus offering a revolutionary approach to data management and protection. This groundbreaking methodology not only enhances data utility but also reassures stakeholders about the integrity and confidentiality of their sensitive information.
  • 12
    GrowthDot GDPR Compliance Reviews

    GrowthDot GDPR Compliance

    GrowthDot

    $41.70 organization/per month
    The GDPR Compliance application designed for Zendesk facilitates the deletion, anonymization, and retrieval of customer data within Zendesk environments. It boasts an array of essential features, including the capability to efficiently process thousands of tickets and contacts simultaneously, as well as the ability to merge user, ticket, and organizational data into comprehensive lists. Users can generate specific ticket and contact lists for mass processing, ensuring compliance by allowing for the deletion of personal data belonging to users or organizations. Additionally, the app ensures the confidentiality of sensitive information while providing options to compile and download data in CSV format. Users have the flexibility to edit information either individually or in bulk, while sensitive details like credit card numbers and phone numbers can be completely anonymized. The application also offers automation setup and scheduling for various processes, allows users to review statistics, and features an intuitive interface for ease of use. Furthermore, agents can submit requests for data processing, with permissions granted to them for executing these tasks, and it includes configurable options for tag anonymization within tickets. Overall, this app streamlines GDPR compliance efforts for organizations utilizing Zendesk.
  • 13
    ShieldConex Reviews
    Implement tokenization for primary account numbers (PAN) and related personally identifiable information (PII) or protected health information (PHI) to ensure adherence to regulations that govern the management of sensitive data. This strategy allows for a reduction in PCI DSS scope across various channels and with trusted third-party partners. By employing tokenization at the point of data entry, your organization can adapt to the ever-changing landscape of security requirements. The ShieldConex platform offers a vaultless and format-preserving tokenization solution for each data component, including critical payment information such as credit or debit card PAN, expiration date, CVV, and cardholder name. This approach helps to unify the payment experience not only across different businesses but also across various locations and channels, encompassing mobile, online, and in-store transactions. Embracing such a comprehensive strategy enhances both security and customer trust in your services.
  • 14
    StratoKey Reviews
    StratoKey CASB focuses on securing cloud and SaaS applications through its unique Encryption, Monitoring, Analytics, and Defence (EMADâ„¢) framework. By utilizing StratoKey CASB, businesses can operate securely and adhere to compliance standards in the cloud environment. The platform is designed to be application agnostic and remains unobtrusive for users, enabling employees to utilize their preferred online tools while ensuring the protection of sensitive information. Serving as your vigilant guardian in the cloud, StratoKey offers comprehensive oversight of user interactions with various applications. Additionally, StratoKey's Compliance Control Management (CCM) assists organizations in transitioning from sporadic compliance efforts to a well-organized, structured, and auditable compliance framework. This structured compliance approach is fundamentally enhanced by the principles of Discovery, Automation, Tasking, and Reporting, ensuring that organizations can maintain a robust compliance posture. Ultimately, StratoKey empowers businesses to safeguard their data while embracing the advantages of cloud technologies.
  • 15
    Viacryp Reviews
    Discover the advantages of utilizing a Trusted Third Party (TTP) for the meticulous pseudonymization of personal data, enabling you to conduct data analysis while adhering to GDPR regulations. Our fundamental offering revolves around the pseudonymization of personal data, utilizing techniques that ensure irreversible pseudonyms and the enhancement of behavioral data. The pseudonymized dataset serves as the foundation for subsequent processing by our clients. Additionally, our filtering service allows for the proportional sharing of personal data, ensuring privacy is maintained throughout the process. We carefully filter information through a rigorously managed pseudonymized whitelist, guaranteeing that only data pertaining to individuals on this list is shared. Viacryp also provides expert privacy consultation focused on the safeguarding and security of personal data. In collaboration with our partners, we offer guidance on the necessary measures organizations should implement to meet GDPR compliance, addressing both technical solutions and organizational protocols. By prioritizing these compliance strategies, businesses can enhance their data protection practices effectively.
  • 16
    Assure QuickEDD Reviews
    Safeguard essential IBM i applications from interruptions and prevent data loss with comprehensive, scalable disaster recovery solutions. Assure QuickEDD ensures that IBM i data and objects are replicated in real-time to both local and remote backup servers, which are always prepared to take over production tasks or restore historical data. The system can be expanded to include multiple nodes and is compatible with various replication setups. It accommodates a range of IBM i OS versions and storage configurations, making it suitable for businesses of all sizes, from small to large enterprises. Featuring a user-friendly graphical interface that supports seven languages and a 5250 interface, it allows for customizable switching procedures that can be executed either interactively, step-by-step, or in batch mode. Furthermore, it includes tools for monitoring, analysis, and specific configuration adjustments, enabling users to generate reports about their high availability environment, job logs, and other critical metrics. Additionally, users can receive alerts via email, MSGQ, and SNMP to stay informed about system performance and issues. Overall, Assure QuickEDD provides a robust solution for maintaining the integrity and availability of IBM i systems.
  • 17
    NMTY Enterprise Reviews
    NMTY Enterprise provides robust protection for all privacy-sensitive information within your organization, whether it resides in databases or individual files. By incorporating NMTY Enterprise into your IT framework, you can swiftly anonymize any data sources that require safeguarding. The platform allows for the anonymization of data irrespective of its storage method, be it within databases or in files like CSV and XML. Anonymization occurs directly at the source, which effectively prevents the unnecessary duplication of non-anonymized data. Furthermore, connections to your data sources are secured with integrated authentication and encryption during storage. Beyond datasets, NMTY Enterprise can also anonymize data found in documents and images directly. Our cutting-edge solutions are designed to seamlessly integrate with your existing workflows, ensuring that optimal results are consistently achieved. By choosing NMTY Enterprise, you not only enhance your data security but also streamline your data management processes.
  • 18
    NavInfo Anonymization Reviews
    Safeguard the identities captured in your data by anonymizing faces and license plates, ensuring adherence to privacy regulations like GDPR, CCPA, and APPI. Utilize our provided examples to evaluate the effectiveness of anonymization by comparing images before and after the process. If you wish to try the tool with your own image, simply upload a JPEG or PNG file (up to 4MB) to observe how our model effectively removes all identifiable personal information. Our GDPR compliance solution boasts several essential features, maintaining regulatory standards without disrupting downstream operations, and can be customized to suit individual requirements. We provide optimal deployment options designed to enhance processing efficiency and minimize reliance on human oversight, ultimately saving both time and resources. Options for deployment are adaptable, with choices including cloud-based, on-premise, or API integration. Furthermore, the system proficiently blurs faces and license plates, even in complex visual scenarios and varying camera perspectives, ensuring comprehensive protection of personal privacy. This capability is vital in today’s data-driven world, where the importance of privacy compliance cannot be overstated.
  • 19
    Celantur Reviews
    Effortlessly anonymize faces, license plates, bodies, and vehicles with our user-friendly solution that seamlessly integrates across all platforms. Address privacy concerns for a diverse array of commercial and industrial applications. Leading global companies place their confidence in our products and expertise as we tackle anonymization issues, allowing you to concentrate on your primary business objectives. Our dedicated team is committed to supporting you throughout your privacy enhancement process. With a strong emphasis on Data Protection, we implement robust measures to ensure compliance with GDPR and other relevant data protection regulations. You have the option to utilize our cloud service for all processing needs, or deploy our Docker container within your on-premise or private/public cloud environments. Our pricing structure is based on a fee per image or video hour, and we offer a demo account that allows you to test our services free of charge. In just seconds, you can blur faces, license plates, individuals, and vehicles in images using a straightforward REST call, making privacy protection both efficient and accessible. By choosing our solution, you not only safeguard sensitive information but also streamline your operations for better efficiency.
  • 20
    SecuPi Reviews
    SecuPi presents a comprehensive data-centric security solution that includes advanced fine-grained access control (ABAC), Database Activity Monitoring (DAM), and various de-identification techniques such as FPE encryption, physical and dynamic masking, and right to be forgotten (RTBF) deletion. This platform is designed to provide extensive protection across both commercial and custom applications, encompassing direct access tools, big data environments, and cloud infrastructures. With SecuPi, organizations can utilize a single data security framework to effortlessly monitor, control, encrypt, and categorize their data across all cloud and on-premises systems without requiring any modifications to existing code. The platform is agile and configurable, enabling it to adapt to both current and future regulatory and auditing demands. Additionally, its implementation is rapid and cost-effective, as it does not necessitate any alterations to source code. SecuPi's fine-grained data access controls ensure that sensitive information is safeguarded, granting users access solely to the data they are entitled to, while also integrating smoothly with Starburst/Trino to automate the enforcement of data access policies and enhance data protection efforts. This capability allows organizations to maintain compliance and security effortlessly as they navigate their data management challenges.
  • 21
    TrueZero Tokenization Reviews
    TrueZero offers a vaultless data privacy API that substitutes sensitive personally identifiable information (PII) with tokens, enabling organizations to lessen the effects of data breaches, facilitate safer data sharing, and reduce compliance burdens. Our tokenization technology is utilized by top financial institutions. No matter where or how PII is utilized, TrueZero Tokenization effectively secures and replaces that information. This allows for more secure user authentication, information validation, and profile enhancement without disclosing sensitive data such as Social Security Numbers to partners, internal teams, or external services. By minimizing your environments that require compliance, TrueZero can significantly expedite your compliance timeline, potentially saving you millions in development or partnership expenses. With data breaches averaging $164 per compromised record, tokenizing PII is crucial for safeguarding your organization against penalties related to data loss and damage to your brand’s reputation. You can store tokens and perform analytics just as you would with unaltered data, ensuring both functionality and security. In today’s data-driven world, this approach not only enhances privacy but also fosters trust with clients and stakeholders alike.
  • 22
    PK Protect Reviews
    PK Protect is an innovative data protection platform aimed at assisting organizations in securing their sensitive information across a wide range of environments. It offers powerful tools for data discovery, classification, encryption, and monitoring, ensuring that vital data remains secure whether it is stored or transmitted. Through the implementation of automated policies and compliance measures, PK Protect supports businesses in adhering to regulatory standards such as GDPR and HIPAA, thereby lowering the chances of data breaches. The platform seamlessly integrates with various systems, providing a cohesive strategy for managing data security in cloud, on-premises, and hybrid settings. By delivering real-time insights and proactive threat detection capabilities, PK Protect empowers organizations to maintain authority over their sensitive data, effectively mitigating security risks. This comprehensive approach not only enhances data protection but also fosters trust among clients and stakeholders.
  • 23
    ShaipCloud Reviews
    Discover exceptional capabilities with an advanced AI data platform designed to optimize performance and ensure the success of your AI initiatives. ShaipCloud employs innovative technology to efficiently gather, monitor, and manage workloads, while also transcribing audio and speech, annotating text, images, and videos, and overseeing quality control and data transfer. This ensures that your AI project receives top-notch data without delay and at a competitive price. As your project evolves, ShaipCloud adapts alongside it, providing the scalability and necessary integrations to streamline operations and yield successful outcomes. The platform enhances workflow efficiency, minimizes complications associated with a globally distributed workforce, and offers improved visibility along with real-time quality management. While there are various data platforms available, ShaipCloud stands out as a dedicated AI data solution. Its secure human-in-the-loop framework is equipped to gather, transform, and annotate data seamlessly, making it an invaluable tool for AI developers. With ShaipCloud, you not only gain access to superior data capabilities but also a partner committed to your project's growth and success.
  • 24
    Informatica Dynamic Data Masking Reviews
    Your IT department can implement advanced data masking techniques to restrict access to sensitive information, utilizing adaptable masking rules that correspond to the authentication levels of users. By incorporating mechanisms for blocking, auditing, and notifying users, IT staff, and external teams who interact with confidential data, the organization can maintain adherence to its security protocols as well as comply with relevant industry and legal privacy standards. Additionally, you can tailor data-masking strategies to meet varying regulatory or business needs, fostering a secure environment for personal and sensitive information. This approach not only safeguards data but also facilitates offshoring, outsourcing, and cloud-based projects. Furthermore, large datasets can be secured by applying dynamic masking to sensitive information within Hadoop environments, enhancing overall data protection. Such measures bolster the integrity of the organization's data security framework.
  • 25
    Anonomatic Reviews
    Ensure the safe storage, anonymization, masking, mining, redaction, and sharing of sensitive information while achieving complete accuracy and adhering to global data privacy regulations. By effectively separating personally identifiable information (PII) from identified data, you can enjoy substantial time and cost efficiencies without sacrificing functionality. Integrate PII Vault to foster groundbreaking solutions, accelerate your time to market, and provide unparalleled security for PII across all platforms. This approach enables you to harness data for creating more precise and targeted communications. Simplify the process with a straightforward method to anonymize all data prior to its entry into your system. Utilize Poly-Anonymizationâ„¢ to merge various anonymous data sets at the individual level without ever accessing PII post-anonymization. Furthermore, substitute PII with a compliant, multi-valued, non-identifying key that facilitates anonymous data matching across different organizations, enhancing collaborative efforts while maintaining privacy. This comprehensive strategy not only protects individual identities but also empowers organizations to derive meaningful insights from their data securely.