Best Data Privacy Management Software for Linux of 2024

Find and compare the best Data Privacy Management software for Linux in 2024

Use the comparison tool below to compare the top Data Privacy Management software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Windocks Reviews

    Windocks

    Windocks

    $799/month
    6 Ratings
    See Software
    Learn More
    Windocks provides on-demand Oracle, SQL Server, as well as other databases that can be customized for Dev, Test, Reporting, ML, DevOps, and DevOps. Windocks database orchestration allows for code-free end to end automated delivery. This includes masking, synthetic data, Git operations and access controls, as well as secrets management. Databases can be delivered to conventional instances, Kubernetes or Docker containers. Windocks can be installed on standard Linux or Windows servers in minutes. It can also run on any public cloud infrastructure or on-premise infrastructure. One VM can host up 50 concurrent database environments. When combined with Docker containers, enterprises often see a 5:1 reduction of lower-level database VMs.
  • 2
    consentmanager Reviews

    consentmanager

    consentmanager AB

    €19 per month
    2 Ratings
    consentmanager customers often have higher acceptance rates and lower bounce rates. This is important for your business: A high cookie acceptance rate allows you to realise the full potential of your website, and consentmanager offers a solution that gives you a complete overview of what is happening on your website and how visitors are interacting with your cookie consent layer. Our cookie consent platform allows you to test multiple consent layers simultaneously and optimise the one that delivers the best results using intelligent A/B testing, machine learning and staging. With over 10 years of adtech experience and support for over 30 languages, compatible with 2500 tools, you can find the perfect package for your business from the different options we offer.
  • 3
    RiskWatch Reviews

    RiskWatch

    RiskWatch

    $99/month/user
    1 Rating
    RiskWatch compliance management solutions and risk assessment use a survey-based process. A series of questions about an asset are asked and a score calculated based on the responses. You can combine the survey score with additional metrics to value the asset, rate its likelihood, and assess its impact. Based on survey results, assign tasks and manage remediation. Identify the risk factors for each asset you evaluate. Receive notifications for non-compliance to your custom requirements and any relevant standards/regulations.
  • 4
    OvalEdge Reviews

    OvalEdge

    OvalEdge

    $1,300/month
    1 Rating
    OvalEdge, a cost-effective data catalogue, is designed to provide end-to-end data governance and privacy compliance. It also provides fast, reliable analytics. OvalEdge crawls the databases, BI platforms and data lakes of your organization to create an easy-to use, smart inventory. Analysts can quickly discover data and provide powerful insights using OvalEdge. OvalEdge's extensive functionality allows users to improve data access, data literacy and data quality.
  • 5
    MyChat Reviews

    MyChat

    Network Software Solutions

    $6/per user/one-time
    3 Ratings
    Secure instant messaging system that works over local networks and the Internet. Collaboration tools for employee engagement.
  • 6
    Statice Reviews

    Statice

    Statice

    Licence starting at 3,990€ / m
    Statice is a data anonymization tool that draws on the most recent data privacy research. It processes sensitive data to create anonymous synthetic datasets that retain all the statistical properties of the original data. Statice's solution was designed for enterprise environments that are flexible and secure. It incorporates features that guarantee privacy and utility of data while maintaining usability.
  • 7
    MANTA Reviews
    Manta is a unified data lineage platform that serves as the central hub of all enterprise data flows. Manta can construct lineage from report definitions, custom SQL code, and ETL workflows. Lineage is analyzed based on actual code, and both direct and indirect flows can be visualized on the map. Data paths between files, report fields, database tables, and individual columns are displayed to users in an intuitive user interface, enabling teams to understand data flows in context.
  • 8
    Data Rover Reviews
    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
  • 9
    MinerEye DataTracker Reviews

    MinerEye DataTracker

    MinerEye

    $2000/1TB/month
    MinerEye's DataTracker helps organizations overcome the information governance/protection challenge. It automatically scans, indexes and analyzes all unstructured and dark data in an organization's data repository. The solution uses proprietary Interpretive AI™, computer vision, and machine learning to locate relevant files from the billions of stored data. It automatically sends out alerts with the next best action recommendations in case of conflicts, duplicates, or potential violations. This allows data protection to be greatly enhanced and operational costs reduced.
  • 10
    JANUSEC Privacy Reviews

    JANUSEC Privacy

    JANUSEC

    $299/month
    JANUSEC Privacy provides an accountability framework and on premise IT solutions to privacy compliance governance. This includes records of processing activities, asset security assessments, control actions, and other records. This helps enterprises demonstrate privacy compliance with accountability (GDPR/CCPA, etc. ). Record of Processing Activities (GDPR Article 30,) PIA (Privacy and Impact Assessment) or DPIA, Data Protection Impact Assessment, GDPR Article35 Data classification Demonstrate Compliance and Accountability (GDPR Article 5). Dashboard
  • 11
    Pryv.io Reviews
    Software for Privacy and Personal Data Management - A ready-to use solution for consent management and personal data. Pryv.io provides a solid foundation upon which to build your digital health solution. It allows you to collect, store and share personal data, as well as rightfully use it. - Maintained, developed and maintained by Pryv. Features - Pryv.io core system is available for production - User registration and authentication Granular consent-based access control rights - Data model for privacy, aggregation, and sharing - Complete data life-cycle: Collect - Store - Change - Delete - REST & Socket.io API Software integration and configuration made easy - Interoperability and seamless connectivity
  • 12
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 13
    BigID Reviews
    Data visibility and control for security, compliance, privacy, and governance. BigID's platform includes a foundational data discovery platform combining data classification and cataloging for finding personal, sensitive and high value data - plus a modular array of add on apps for solving discrete problems in privacy, security and governance. Automate scans, discovery, classification, workflows, and more on the data you need - and find all PI, PII, sensitive, and critical data across unstructured and structured data, on-prem and in the cloud. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores.
  • 14
    Delphix Reviews
    Delphix is the industry leader for DataOps. It provides an intelligent data platform that accelerates digital change for leading companies around world. The Delphix DataOps Platform supports many systems, including mainframes, Oracle databases, ERP apps, and Kubernetes container. Delphix supports a wide range of data operations that enable modern CI/CD workflows. It also automates data compliance with privacy regulations such as GDPR, CCPA and the New York Privacy Act. Delphix also helps companies to sync data between private and public clouds, accelerating cloud migrations and customer experience transformations, as well as the adoption of disruptive AI technologies.
  • 15
    PrivacyCenter.cloud Reviews

    PrivacyCenter.cloud

    Securiti

    $254/month
    PrivacyCenter.cloud is an all in one solution that will help you create a fully functional privacy centre in minutes. It can also automate key privacy functions. You can also manage: Privacy Notices - Cookies and 3rd party consent - User Preferences Individual Rights Requests Do not sell Do not track signals
  • 16
    Nyxeia Information Governance Suite Reviews
    The Information Governance Suite is a collection of products that help organizations better discover, categorize and enhance their information assets, regardless of which system they are managed. The suite includes: -.discover which connects with information systems to index and categorize structured and unstructured information assets –.policy which allows organizations create full lifecycle policies to preserve and dispose of information - preservation and disposal near the end of an asset's lifecycle -.preserve which allows organizations to retain and dispose digital assets near the end - process which automates content-related actions such as content categorization to help record teams deal with increasing workload.
  • 17
    IBM InfoSphere Optim Data Privacy Reviews
    IBM InfoSphere®, Optim™, Data Privacy offers extensive capabilities to mask sensitive data in non-production environments such as development, testing, QA, or training. This single offering offers a variety transformation techniques that can replace sensitive information with fully functional, functionally masked data. Substrings, arithmetic, sequential or random number generation, date ageing, and concatenation are all examples of masking techniques. The context-aware masking capabilities allow data to be retained in a similar format as the original. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking tools can be used to prevent misuse of information. They allow you to mask, obfuscate, and privatize personal information that is distributed across non-production environments.
  • 18
    SeaCat Reviews
    Cyber-security and data privacy platform to protect mobile and IoT apps. The app can be built and operated without any cyber-security incidents. SeaCat is a cyber security platform that was developed by experts. It includes all the data privacy and cyber-security must-haves. SeaCat deployment is easy and straightforward. SeaCat instantly increases your security level without the need for custom development. The user experience should not be compromised by cyber-security. SeaCat does not require any complicated configurations or procedures from the user. SeaCat uses all the latest cyber-security features such as biometrical authorization and hardware security modules. SeaCat's cyber-security platform consists a SeaCat SDK, which is to be added into a mobile or IoT app, the SeaCat Gateway, which is to be installed in the demilitarized area (DMZ) in front the application backend server, and SeaCat PKI, which is a service that provides access, enrolment, and identity management.
  • 19
    Tumult Analytics Reviews
    Built and maintained by a group of differential privacy experts and used in production at institutions such as the U.S. Census Bureau. Spark-based and supports input tables with billions of rows. Supports an ever-growing number of aggregation operators, data transformation operators and privacy definitions. Perform public and privacy joins, filters or user-defined function on your data. Calculate counts, sums and quantiles under multiple privacy models. Our simple tutorials and extensive documentation make it easy to differentiate privacy. Tumult Analytics was built on Tumult Core - our sophisticated privacy foundation. Tumult Core mediates access to sensitive information and means that each program and application has an embedded proof of security. Composed of small, easily-reviewable components. Stability tracking and floating point primitives that are proven to be safe. Generic framework based on peer reviewed research.
  • 20
    NMTY Enterprise Reviews
    NMTY Enterprise protects all privacy-sensitive data in your organization, whether it is stored on databases or files. NMTY Enterprise can be integrated into your IT environment to anonymize data sources. NMTY Enterprise allows you to anonymize data, regardless of the format it is stored in. This includes databases and individual files. Anonymize data in a database, or in files such as CSV or XML. Data is anonymized at the source. This prevents duplicates of non-anonymized information. The connections to your data sources are encrypted and support integrated authentication. It is possible to directly anonymize images and documents. Our solutions are based on the most recent innovations and can be integrated directly into your processes. We can always expect the best results.
  • 21
    PK Protect Reviews
    Automate the DSAR response to meet requirements faster, and within budget. Find data that should be archived, or deleted legally due to age or inactivity. Create rules to delete or redact sensitive information as soon as they are found. Monitoring allows you to detect and confirm breaches, and then accurately estimate the impact of the breach. Enable pseudonymization and anonymization of private personal information. Monitor endpoints, enterprise solutions, and servers for privacy data. Organizations must keep up with the constantly changing privacy landscape and protect any personally identifiable information that they interact with. PK Privacy allows organizations to automate data discovery, reporting and other mechanisms to reduce the operational complexity of privacy legislation. Once PK Privacy has discovered data, it can automatically encrypt or mask personal information, redact it, delete it, or perform other remedial actions.
  • Previous
  • You're on page 1
  • Next