Best Data De-Identification Tools for Windows of 2024

Find and compare the best Data De-Identification tools for Windows in 2024

Use the comparison tool below to compare the top Data De-Identification tools for Windows on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Titaniam Reviews
    Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022.
  • 2
    Privacy1 Reviews

    Privacy1

    Privacy1

    $159 per month
    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level
  • 3
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 4
    Wizuda Reviews

    Wizuda

    Wizuda

    $9.99/month/user
    Innovative Solutions that will revolutionize the way your organization shares data externally and internally. Wizuda MFT is designed with efficiency, security, compliance, and efficiency at its core. It enables IT to manage critical data movement within your organization as well as with external parties from one central solution. Wizuda MFT scales to your business and gives you full accountability for all file transfer operations. Share sensitive data with clients and employees of your company in a compliant, secure and compliant manner. File size limits are removed and encryption is enabled by default. This makes it possible to eliminate insecure alternatives like USBs. Wizuda users have the additional flexibility to send emails directly from their Outlook email or via the secure web portal. Wizuda Virtual Data Rooms offer a secure online repository that allows document storage, collaboration, and distribution for your business. Wizuda Virtual Data Rooms are easy to set up and maintain.
  • 5
    Babel Obfuscator Reviews

    Babel Obfuscator

    babelfor.NET

    €350 one-time payment
    Babel Obfuscator for Microsoft.NET Framework is a powerful tool to protect your code. The reverse engineering of.NET programs, such as Visual Basic.NET and C#, is relatively easy because they compile into MSIL (Microsoft Intermediate Language), a processor-independent instruction language that is embedded in.NET assemblies along with metadata allowing for the reconstruction of source code. Babel Obfuscator can transform assemblies to hide the code. Reversing this is very difficult. This transformation is called obfuscation. Protect your software from reverse engineering in order to protect the intellectual property of code. Runs on Windows, MAC OSX and Linux operating systems. Fully managed code encryption. Simplify deployment of your application by merging or embedding dependencies into one file. Code optimization is performed by reducing metadata and removing unused codes.
  • 6
    RansomDataProtect Reviews

    RansomDataProtect

    DROON

    €10 per month
    Blockchain provides the most innovative and optimal protection for your sensitive and personal data. RansomDataProtect enables pseudonymization of sensitive and personal data. The CNIL recommends pseudonymizing data to comply with GDPR rules, and to combat theft and leakage sensitive data when it comes to ransomware attacks. The combination of blockchain and variable encryption algorithms ensures that your data is safe and untampered with. The data that has not been masked is still accessible for multiple people to continue working together on the document. RansomDataProtect integrates easily with your files via an add-in for Word, Excel, PowerPoint and Outlook. RansomDataProtect allows you to comply with all the regulations relating to data protection. Remove security vulnerabilities caused by password mismanagement in your company.
  • 7
    DOT Anonymizer Reviews

    DOT Anonymizer

    DOT Anonymizer

    €488 per month
    Mask your personal information to ensure it looks and behaves like real data. Software development needs realistic test data. DOT Anonymizer masks test data and ensures its consistency across all data sources and databases. The use of personal data or identifying information outside of production is prohibited (development, testing and training, BI, external services providers, etc.). Data leakage is a major concern. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. You can retain the original format of data by anonymizing it. Your teams can work with fictional, but realistic data. Manage your data sources to maintain their usability. Use DOT Anonymizer from your own applications. Consistency in anonymizations across DBMS and platforms. To ensure realistic data, maintain relations between tables. Anonymize any database type and file, such as CSV, XML or JSON.
  • 8
    Gallio Reviews

    Gallio

    Gallio

    €89 per month
    Face recognition technology is growing exponentially, and the storage of images and videos containing sensitive data poses significant risks. Gallio offers a unique privacy protection solution based on artificial intelligent. Algorithms blur the faces, making them virtually unrecognisable while maintaining image quality. It effectively anonymizes license plate patterns, making them unreadable. It works with license plate patterns all over the world. You can now store and publish images and recordings without fear that someone might recognize a vehicle and sue for privacy infringement. The editor is easy to use and allows you remove blur from selected faces or license plates. Share videos and images to provide evidence and recordings on request to data subjects while protecting their privacy.
  • 9
    Brighter AI Reviews

    Brighter AI

    Brighter AI Technologies

    Public video data collection is becoming more risky due to the increasing capabilities of facial recognition technology. Brighter AI's Precision Blur allows for the most precise face redaction in the world. Deep Natural Anonymization, a privacy solution that uses generative AI, is unique. It creates synthetic facial overlays to protect individuals against recognition while maintaining data quality for machine-learning. You can use the Selective Redaction user interface to anonymize specific information in videos. Some use cases, such as media or law enforcement, do not require all faces to be blurred. After the automatic detections, it is possible to (de)select individual objects. Our Analytics Endpoint provides relevant metadata such as the original objects' bounding box locations, facial landmarks, and person attributes. You can retrieve relevant information using JSON outputs, while also having compliant, anonymized photos or videos.
  • 10
    HushHush Data Masking Reviews
    Businesses today face severe punishment if they fail to meet the ever-increasing privacy standards of regulators and the general public. Vendors must keep up with the latest algorithms to protect sensitive data like PII or PHI. HushHush is at the forefront in privacy protection (Patents US9886593, US20150324607A1, US10339341) thanks to its PII data discovery tool workbench (also known data de-identification software, data masking software, and obfuscation program). It allows you to find sensitive data about your customers and classify it. You can also anonymize it and comply with GDPR and GLBA requirements. To create comprehensive and secure data anonymization solutions, you can use a variety of rule-based atomic addition anonymization components. HushHush components can be used to anonymize both direct identifiers (SSNs, credit cards names, addresses, telephone numbers, etc.). Both fixed and variable algorithms are available for indirect identifiers.
  • 11
    IBM InfoSphere Optim Data Privacy Reviews
    IBM InfoSphere®, Optim™, Data Privacy offers extensive capabilities to mask sensitive data in non-production environments such as development, testing, QA, or training. This single offering offers a variety transformation techniques that can replace sensitive information with fully functional, functionally masked data. Substrings, arithmetic, sequential or random number generation, date ageing, and concatenation are all examples of masking techniques. The context-aware masking capabilities allow data to be retained in a similar format as the original. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking tools can be used to prevent misuse of information. They allow you to mask, obfuscate, and privatize personal information that is distributed across non-production environments.
  • 12
    NMTY Enterprise Reviews
    NMTY Enterprise protects all privacy-sensitive data in your organization, whether it is stored on databases or files. NMTY Enterprise can be integrated into your IT environment to anonymize data sources. NMTY Enterprise allows you to anonymize data, regardless of the format it is stored in. This includes databases and individual files. Anonymize data in a database, or in files such as CSV or XML. Data is anonymized at the source. This prevents duplicates of non-anonymized information. The connections to your data sources are encrypted and support integrated authentication. It is possible to directly anonymize images and documents. Our solutions are based on the most recent innovations and can be integrated directly into your processes. We can always expect the best results.
  • 13
    PK Protect Reviews
    PK Protect is a platform for data protection that helps organizations protect sensitive information in a variety of environments. It offers robust tools for data discovery and classification, encryption and monitoring. This ensures that critical data will be protected at rest and during transit. PK Protect's automated policies and compliance controls help businesses meet regulatory requirements such as GDPR and HIPAA, while minimizing data breach risks. The platform integrates into various systems, allowing for a unified management of data security across cloud environments, on-premises environments, and hybrid ones. PK Protect offers real-time visibility, proactive threat detection and helps organizations reduce security vulnerabilities.
  • 14
    BizDataX Reviews
    BizDataX provides production-level data masking. It allows compliance with GDPR, and other regulations by masking customers' identities while preparing data to be used by testers and developers. The risk of using production data is greatly reduced by using anonymized/masked data. You should be focusing on business requirements, policy management, sensitive data governance, and other regulations. You will need to track the inventory of databases, data sources, tables, and where sensitive data is located. Manage large customer databases and exchange information with online partners shops and parcel delivery businesses. Data anonymization is a way to ensure regulatory compliance in the management of medical records.
  • Previous
  • You're on page 1
  • Next