Best NavInfo Anonymization Alternatives in 2024
Find the top alternatives to NavInfo Anonymization currently available. Compare ratings, reviews, pricing, and features of NavInfo Anonymization alternatives in 2024. Slashdot lists the best NavInfo Anonymization alternatives on the market that offer competing products that are similar to NavInfo Anonymization. Sort through NavInfo Anonymization alternatives below to make the best choice for your needs
-
1
Immuta
Immuta
Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals. -
2
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022. -
3
Gallio
Gallio
€89 per monthFace recognition technology is growing exponentially, and the storage of images and videos containing sensitive data poses significant risks. Gallio offers a unique privacy protection solution based on artificial intelligent. Algorithms blur the faces, making them virtually unrecognisable while maintaining image quality. It effectively anonymizes license plate patterns, making them unreadable. It works with license plate patterns all over the world. You can now store and publish images and recordings without fear that someone might recognize a vehicle and sue for privacy infringement. The editor is easy to use and allows you remove blur from selected faces or license plates. Share videos and images to provide evidence and recordings on request to data subjects while protecting their privacy. -
4
AvePoint
AvePoint
AvePoint is the only provider of complete data management solutions for digital collaboration platforms. Our AOS platform boasts the largest software-as-a-service userbase in the Microsoft 365 ecosystem. AvePoint is trusted by more than 7 million people worldwide to manage and protect their cloud investments. Our SaaS platform offers enterprise-grade support and hyperscale security. We are available in 12 Azure data centers. Our products are available in 4 languages. We offer 24/7 support and have market-leading security credentials like FedRAMP and ISO 27001 in-process. Organizations that leverage Microsoft's comprehensive and integrated product portfolio can get additional value without having to manage multiple vendors. These SaaS products are part of the AOS platform: o Cloud Backup o Cloud Management o Cloud Governance o Cloud Insights o Cloud Records Policies and Insights o MyHub -
5
Brighter AI
Brighter AI Technologies
Public video data collection is becoming more risky due to the increasing capabilities of facial recognition technology. Brighter AI's Precision Blur allows for the most precise face redaction in the world. Deep Natural Anonymization, a privacy solution that uses generative AI, is unique. It creates synthetic facial overlays to protect individuals against recognition while maintaining data quality for machine-learning. You can use the Selective Redaction user interface to anonymize specific information in videos. Some use cases, such as media or law enforcement, do not require all faces to be blurred. After the automatic detections, it is possible to (de)select individual objects. Our Analytics Endpoint provides relevant metadata such as the original objects' bounding box locations, facial landmarks, and person attributes. You can retrieve relevant information using JSON outputs, while also having compliant, anonymized photos or videos. -
6
Celantur
Celantur
Easy to use, integrate and anonymize faces, license plate numbers, vehicles and bodies. Solve privacy issues for a variety of commercial and industrial applications. Our products and expertise are trusted by global industry leaders. We solve anonymization challenges so you can concentrate on your core business. Our team is there to help you along your privacy journey. Data protection is our core business. That's why we have put in place strong measures to comply with GDPR and other data privacy laws. Our cloud service will handle all processing on our infrastructure. You can also use Docker containers to deploy the container on-premises or in your private/public clouds. You will be charged per video or image hour. You can create a free demo account to test it. Blur faces, license plate numbers, persons, and vehicles in images with a simple call to REST. -
7
Private AI
Private AI
Share your production data securely with ML, data scientists, and analytics teams, while maintaining customer trust. Stop wasting time with regexes and free models. Private AI anonymizes 50+ entities PII PCI and PHI in 49 languages, with unmatched accuracy, across GDPR, CPRA and HIPAA. Synthetic data can be used to replace PII, PCI and PHI text in order to create model training data that looks exactly like production data. This will not compromise customer privacy. Remove PII in 10+ file formats such as PDFs, DOCXs, PNGs, and audios to protect customer data and comply privacy regulations. Private AI uses the most advanced transformer architectures for remarkable accuracy right out of the box. No third-party processing required. Our technology outperforms every other redaction service available on the market. Please feel free to request a copy of the evaluation toolkit for you to test with your own data. -
8
HushHush Data Masking
HushHush
Businesses today face severe punishment if they fail to meet the ever-increasing privacy standards of regulators and the general public. Vendors must keep up with the latest algorithms to protect sensitive data like PII or PHI. HushHush is at the forefront in privacy protection (Patents US9886593, US20150324607A1, US10339341) thanks to its PII data discovery tool workbench (also known data de-identification software, data masking software, and obfuscation program). It allows you to find sensitive data about your customers and classify it. You can also anonymize it and comply with GDPR and GLBA requirements. To create comprehensive and secure data anonymization solutions, you can use a variety of rule-based atomic addition anonymization components. HushHush components can be used to anonymize both direct identifiers (SSNs, credit cards names, addresses, telephone numbers, etc.). Both fixed and variable algorithms are available for indirect identifiers. -
9
GrowthDot GDPR Compliance
GrowthDot
$41.70 organization/per month The GDPR Compliance app is for Zendesk. It allows you to delete, anonymize and retrieve customers' data within Zendesk instances. Here are some basic features of the app: You can process thousands of contacts and tickets quickly and efficiently. Combine user, ticket, and organizational lists For bulk treatment, create a ticket and a contact list Supprime personal data of users or organizations; Confidentialize all or just sensitive information Download CSV files to compile data You can edit information one-by-one or in bulk. You can anonymize your credit card and phone numbers completely Automate and schedule your processes Take a look at the statistics. User-friendly interface; To process the data, submit requests to agents Authorize agents to run processes Configure tag anonymization for tickets -
10
BizDataX
Ekobit
BizDataX provides production-level data masking. It allows compliance with GDPR, and other regulations by masking customers' identities while preparing data to be used by testers and developers. The risk of using production data is greatly reduced by using anonymized/masked data. You should be focusing on business requirements, policy management, sensitive data governance, and other regulations. You will need to track the inventory of databases, data sources, tables, and where sensitive data is located. Manage large customer databases and exchange information with online partners shops and parcel delivery businesses. Data anonymization is a way to ensure regulatory compliance in the management of medical records. -
11
Privacy1
Privacy1
$159 per monthPrivacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level -
12
Anonomatic
Anonomatic
Store, anonymize mask, mine, redact and share sensitive data securely with 100% accuracy and complete international data privacy compliance. You can save time and money by separating PII from other data. Embed PII Vault into your innovative solutions to reduce time to market and deliver the most PII-secure solutions available. Unlock data for more accurate and targeted messages. All data can be anonymized in one simple step before it reaches the platform. Once anonymized, Poly- Anonymization™ allows you to combine disparate anonymous data sets on an individual basis without receiving any PII. Replace PII by a compliant, multi-valued, non-identifying key that is used to link anonymous data from multiple organizations. -
13
Macgence
Macgence
We have made significant progress serving the AI value-chain through projects that span different data types, industries and geographical locations. Our diverse experience allows us to address unique challenges, and optimize solutions in different sectors. Custom data sources with high precision for your model needs, from around the globe, that are in strict compliance with GDPR and ISO standards. Data annotation and labeling is performed with 95% accuracy for all data types. This ensures flawless model performance. In the early stages, determine your model's performance to receive an expert opinion that is unbiased on critical performance measures like bias, duplication and ground truth response. Validate the output of your model by leveraging the validation team's expertise to optimize and improve accuracy. -
14
PieEye
PieEye
$29 per monthPieEye simplifies complex processes of managing user consent, and compliance with privacy laws such as GDPR, CPRA/CCPA. This is the fastest, easiest, most efficient and automated solution for any size ecommerce company. Our platform will get you up-and-running in minutes, without the need to do headstands or spend weeks or months on tedious compliance tasks. PieEye is easy to install, easy to automate and allows you streamline your compliance efforts. Discover how easy compliance can be. Cookie compliance is now more important than ever, with more laws governing data privacy. Our cutting-edge Cookie Banner makes your website fully comply with all regulations. It protects your customers' rights to privacy and you. Our automated platform streamlines your entire process and allows you to manage requests easily while ensuring compliance with all relevant laws. -
15
VGS Platform
Very Good Security
The VGS Vault allows users to securely store their tokenized data. This secures your most sensitive data. There is nothing to be stolen in the event of a breach. It's impossible to hack what isn't there. VGS is the modern approach in data security. Our SaaS solution allows you to interact with sensitive and regulated data while avoiding the responsibility of protecting it. You can see the interactive example of how VGS transforms data. You can choose to hide or show data by choosing Reveal or Redact. VGS can help you, whether you're a startup looking for best-in-class security or an established company seeking to eliminate compliance as a barrier to new business. VGS assumes the responsibility of protecting your data, eliminating any risk of data breaches, and reducing compliance overhead. VGS layers protection on the systems for companies that prefer to vault their data. This prevents unauthorized access and leakage. -
16
CipherTrust Tokenization
Thales Cloud Security
CipherTrust Tokenization reduces the cost and effort needed to comply with security policies, regulatory mandates such as PCI DSS and also makes it easy to protect sensitive data including personally identifiable Information (PII). There are no industry standards for tokenization, but most solutions fall into two categories: vaultless or vaulted. Both secure and anonymousize sensitive assets. Tokenization software is available in the datacenter, big data environments, or the cloud. Tokenization can remove cardholder data from PCI DSS with minimal effort and cost, allowing organizations to save costs associated with compliance. Modern IT architectures demand both the use and protection of personally identifiable data (PII). CipherTrust tokenization provides PII security without the need for encryption key management by software developers. -
17
NMTY Enterprise
NMTY
NMTY Enterprise protects all privacy-sensitive data in your organization, whether it is stored on databases or files. NMTY Enterprise can be integrated into your IT environment to anonymize data sources. NMTY Enterprise allows you to anonymize data, regardless of the format it is stored in. This includes databases and individual files. Anonymize data in a database, or in files such as CSV or XML. Data is anonymized at the source. This prevents duplicates of non-anonymized information. The connections to your data sources are encrypted and support integrated authentication. It is possible to directly anonymize images and documents. Our solutions are based on the most recent innovations and can be integrated directly into your processes. We can always expect the best results. -
18
Tonic
Tonic
Tonic automatically creates mock datasets that preserve key characteristics of secure data sets so that data scientists, developers, and salespeople can work efficiently without revealing their identities. Tonic creates safe, de-identified data from your production data. Tonic models your production data from your production data to help tell a similar story in your testing environments. Safe and useful data that is scaled to match your real-world data. Safely share data across businesses, teams, and borders to create data that is identical to your production data. PII/PHI identification and obfuscation. Protect your sensitive data by proactive protection with automatic scanning, alerts and de-identification. Advanced subsetting across diverse database types. Fully automated collaboration, compliance, and data workflows. -
19
Cloud Compliance
Cloud Compliance
With the most comprehensive range of products, you can implement privacy compliance and data security in Salesforce. A thorough data inventory and risk assessment are essential for privacy programs to be successful. Most organizations overlook data or struggle with spreadsheets and manual processes. Our Personal Data Inventory product automates and streamlines DPIA and enterprise data inventories flows. Your organization will be able to easily have a clear risk assessment and a data inventory. Many organizations are experiencing an increase in privacy rights requests. It is difficult, inconsistent, and error-prone to respond to these requests manually, increasing the risk of non-compliance. Our Privacy Rights Automation product allows self-service and automates all privacy related activities. A standardised and error-free solution to reduce the risk of non-compliance -
20
Databunker
Databunker
FreeDatabunker is a lightning-fast, open-source vault developed in Go for secure storage of sensitive personal records. Protect user records from SQL and GraphQL injections with a simple API. Streamline GDPR, HIPAA, ISO 27001, and SOC2 compliance. Databunker is a special secure storage system designed to protect: - Personally Identifiable Information (PII) - Protected Health Information (PHI) - Payment Card Industry (PCI) data - Know Your Customer (KYC) records Databunker introduces a new approach to customer data protection: - Secure Indexing: Utilizes hash-based indexing for all search indexes - No Clear Text Storage: Ensures all information is encrypted, enhancing overall security - Restricted Bulk Retrieval: Bulk retrieval is disabled by default, adding an extra layer of defense - API-Based Communication: Backend interacts with Databunker through API calls, similar to NoSQL solutions - Record Token: Databunker creates a secured version of your data object - an object UUID token that is safe to use in your database -
21
PK Protect
PKWARE
PK Protect is a platform for data protection that helps organizations protect sensitive information in a variety of environments. It offers robust tools for data discovery and classification, encryption and monitoring. This ensures that critical data will be protected at rest and during transit. PK Protect's automated policies and compliance controls help businesses meet regulatory requirements such as GDPR and HIPAA, while minimizing data breach risks. The platform integrates into various systems, allowing for a unified management of data security across cloud environments, on-premises environments, and hybrid ones. PK Protect offers real-time visibility, proactive threat detection and helps organizations reduce security vulnerabilities. -
22
xtendr
xtendr
xtendr unhides detailed, privacy-preserving insights across multiple independent data sources. Xtendr gives you access to data that was previously inaccessible and protects your data throughout its entire lifecycle. You can be confident in privacy and regulatory compliance. Xtendr is not just anonymity; it is the missing piece of multi-party data-sharing with true privacy protection. It is cryptography at work so you can reach your potential. The most advanced privacy-enhancing technology for data collaboration. xtendr has solved the cryptography problem of data sharing among parties who are distrustful of each other. Take your business to the next level with a data protection solution that is enterprise-grade and allows organizations to form data partnership while protecting sensitive data. Data is the currency of today's digital age. Some say that it is replacing crude oil as the most valuable resource in the world, but there is no doubt of its importance. -
23
RansomDataProtect
DROON
€10 per monthBlockchain provides the most innovative and optimal protection for your sensitive and personal data. RansomDataProtect enables pseudonymization of sensitive and personal data. The CNIL recommends pseudonymizing data to comply with GDPR rules, and to combat theft and leakage sensitive data when it comes to ransomware attacks. The combination of blockchain and variable encryption algorithms ensures that your data is safe and untampered with. The data that has not been masked is still accessible for multiple people to continue working together on the document. RansomDataProtect integrates easily with your files via an add-in for Word, Excel, PowerPoint and Outlook. RansomDataProtect allows you to comply with all the regulations relating to data protection. Remove security vulnerabilities caused by password mismanagement in your company. -
24
LeapYear
LeapYear Technologies
Differential privacy, a mathematically proven standard for data privacy, ensures that all data can be used to perform analytics and machine learning without compromising individual records. LeapYear's differentially secure system protects some the most sensitive datasets around the globe, including financial transactions, medical information, social media data, and medical information. The system protects all information about individuals, entities, transactions, and businesses, and allows data scientists, analysts, and researchers to derive value from all data. Traditional methods, such as anonymization, aggregation or masking data value, can be easily used to reconstruct sensitive information. LeapYear's differential privacy implementation provides mathematically supported assurances that individual records cannot be reconstructed while allowing all data to be used for reporting. -
25
Assure Security
Precisely
Assure Compliance Monitoring is a bundle that includes Assure Security features. They can be used together to quickly identify security and compliance problems by producing alerts, reports, and reports on IBM system activity, database changes, and views of Db2 information. Two features are also included in the bundle, which can be purchased separately. Assure Monitoring & Reporting seamlessly extracts insights directly from IBM i journal data, and generates alerts and reports about security incidents and compliance deviations. You can use the system and database monitoring capabilities separately or together. You can also send data directly to your enterprise SIEM software, allowing IBM security to be monitored on all enterprise platforms. Assure Db2 Security Monitor is an innovative solution that monitors Db2 data views and blocks records. Assure Security offers market-leading IBM i security capabilities that will help you and your organization comply with cybersecurity regulations. -
26
Rixon
Rixon
$99 per monthCloud-native vaultless tokenization platform maximizes data security and solves data privacy concerns. You can focus on your business with peace of mind and time when you know that your business exceeds compliance requirements. Increasing operating costs, ransomware threats, and ongoing audits of compliance are all challenges that organizations face. Rixon gives you the confidence to take your business to the world, while keeping you safe. The Rixon Privacy platform drives business results by giving organizations the tools to deliver Security, Compliance, and Privacy to the business and applications they support. Rixon's patented tokenization technology eliminates sensitive data from being exposed within your applications. Sensitive data is securely ingested, and converted into smart security tokens that protect the data against unauthorized data access. -
27
DOT Anonymizer
DOT Anonymizer
€488 per monthMask your personal information to ensure it looks and behaves like real data. Software development needs realistic test data. DOT Anonymizer masks test data and ensures its consistency across all data sources and databases. The use of personal data or identifying information outside of production is prohibited (development, testing and training, BI, external services providers, etc.). Data leakage is a major concern. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. You can retain the original format of data by anonymizing it. Your teams can work with fictional, but realistic data. Manage your data sources to maintain their usability. Use DOT Anonymizer from your own applications. Consistency in anonymizations across DBMS and platforms. To ensure realistic data, maintain relations between tables. Anonymize any database type and file, such as CSV, XML or JSON. -
28
TrueZero Tokenization
Spring Labs
TrueZero’s vaultless API for data privacy replaces sensitive PII (personally identifiable information) with tokens, allowing you reduce the impact of breaches, share data more securely and freely, and minimize compliance overhead. Leading financial institutions use our tokenization solutions. TrueZero Tokenization protects and replaces your data, no matter where it is stored or how it is used. Securely authenticate users, validate information and enrich profiles without revealing sensitive data. SSN) with partners, internal teams, and third-party services. TrueZero reduces your in scope environments, accelerating your time to compliance by months and potentially saving you millions in build/partner cost. Data breaches cost $164 for each breached record. Tokenize PII & safeguard your business against data loss penalties and brand reputation. Store tokens, and run analytics the same way as you would raw data. -
29
Viacryp
Viacryp
Enjoy the convenience of using a Trusted Third Party to carefully pseudonymize personal data so that you can perform analysis within the GDPR framework. Our basic service is to pseudonymize personal data. We use the principles of irreversible pseudonyms, thickening behavior and thickening of words. The pseudonymized information is used by our clients to further process the data. Our filter service allows you to share your personal data in a proportionate manner and respecting privacy. We filter information using a pseudonymized expert whitelist, and only send information about individuals that appear on this list. Viacryp offers privacy advice in relation to the protection and security personal data. Together with our partners we provide advice on the steps that an organization can take to comply with the GDPR frameworks. This includes both technical and organizational and processes measures. -
30
Kiprotect
Kiprotect
KIProtect creates software solutions to help you process sensitive data and personal information in a safe, legal and privacy-friendly way. Data security and protection are becoming more important. Unfortunately, they are often overlooked because technical data protection takes time and is complex. We want to change this! We want to change that! -
31
Privacy Analytics
Privacy Analytics
Privacy Analytics offers data anonymization software and services for healthcare and consumer organizations. Privacy Analytics allows you to safely and responsibly use your sensitive data assets for innovation that benefits all. Privacy Analytics allows you to safely de-identify your health data to the highest standards while still preserving its utility. The regulatory deadlines are becoming more stringent. Data requests are becoming more urgent. There is greater pressure to maintain your company's reputation than ever before. The climate surrounding data privacy continues to get more intense. Everybody, from regulators to consumers, is holding organizations accountable. Drug makers are under increasing pressure to disclose clinical data and documents. As the pressure mounts, so does the demand for privacy. Solutions that maximize transparency while protecting the privacy of trial participants are needed. -
32
Aircloak Insights
Aircloak
Aircloak Insights acts as a transparent proxy between analysts and sensitive data. Analysts can query the system as normal using SQL or dashboards such as Tableau. Aircloak Insights intercepts the query, and tailors it according to the data backend. This could be SQL or a NoSQL large data store. The proxy returns the results, which ensures that they are fully anonymized and aggregated. Aircloak Insights can be integrated directly into your existing workflow. Insights Air allows you to query sensitive data using our web interface Insights. Aircloak Insights also supports connections using business intelligence tools such as Tableau, and other tools that can communicate with Postgres Message Protocol. Aircloak Insights allows you to programmatically run queries using a RESTful interface. -
33
Informatica Persistent Data Masking
Informatica
While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations. -
34
StratoKey
StratoKey
StratoKey CASB is a cloud and SaaS application security solution that combines Encryption Monitoring Analytics and Defence (EMADTM). StratoKey CASB allows organizations to conduct compliant and secure business in the cloud. StratoKey is transparent and application agnostic to your users. This allows your employees to use the best tools online while protecting your sensitive information. StratoKey acts as your eyes and ears on the cloud. You can monitor your users and have complete visibility of their interactions with your apps. StratoKey CCM enables organizations to move from ad-hoc compliance actions into a structured, auditable and organized compliance program. Compliance programs are driven through Discovery, Automation Tasking and Reporting. -
35
Evervault
Evervault
$395 per monthEvervault can help you go from zero to audit ready in less than one day. Evervault is compatible with all cardholder data flows so you can collect PCI data in a compliant manner for processing, issuance or storage. In most cases, our PCI scope will be reduced to the SAQ A set of controls -- the smallest PCI DSS control set. We will work with you to fully understand your architecture, and make recommendations on how to integrate Evervault in order to reduce your compliance scope to the maximum. We'll help you integrate Evervault using one of our templates, and then we'll verify your integration to make sure it's fully-compliant. We will provide you with a PCI DSS policy and procedure bundle that is audit-ready, as well our PCI DSS Attestation Of Compliance (AoC). We'll introduce you to an Evervault-trained auditor. -
36
Sudo Platform
Anonyome Labs
We believe everyone should have full control over their personal information. They should be able to decide what information they share, with whom and when. Our tools make it easy for you to empower your users and give them back control of their personal information. A Sudo is a digital identity that allows your users to interact with other people or organizations while protecting their personal information. Protect your users from hackers, trackers, or other bad actors in modern digital life. Your users have a variety of tools and capabilities with Sudo to protect their privacy. You can do everything, from keeping communications private to protecting their online shopping and payments. It's easy to add privacy capabilities. With just a few lines code, the Sudo Platform makes it easy to add privacy functionality to your product. The Sudo Platform is easy to deploy and our Admin Console makes managing customer accounts simple. The platform is flexible, scalable, and secure so your customers won't be disappointed. -
37
Informatica Dynamic Data Masking
Informatica
Your IT organization can use flexible masking rules to limit sensitive data with flexible masking rules based upon the authentication level of a user. It ensures compliance by blocking, auditing and alerting users, IT personnel and outsourced teams that access sensitive information. Data masking solutions can be easily customized to meet different regulatory or business needs. Protect sensitive and personal information while supporting cloud-based, offshoring and outsourcing initiatives. Secure big data using dynamic masking of sensitive data in Hadoop. -
38
Salesforce Shield
Salesforce
$25 per monthWith platform encryption, you can natively encrypt sensitive data at rest across all Salesforce apps. AES256-bit encryption ensures data confidentiality. You can create your own encryption keys and manage the key lifecycle. Protect sensitive data from all Salesforce users, including admins. Conform to regulatory compliance requirements. Event monitoring allows you to see who, when, and where critical business data is being accessed. Log files can be used to monitor critical events in real time. Transaction security policies can prevent data loss. Detect insider threats and report anomalies. Audit user behavior and measure the performance of custom applications. You can create a forensic audit trail that includes up to 10 years' worth of data and set triggers for data deletion. Expand tracking capabilities for custom and standard objects. Extended data retention capabilities are available for audit, analysis, and machine learning. Automated archiving can help you meet compliance requirements. -
39
ShaipCloud
ShaipCloud
Experience unmatched functionality with a cutting-edge AI data platform. It works smarter and delivers quality data to launch successful AI projects. ShaipCloud uses patented technology to collect and track workloads, transcribe and monitor audio and utterances and annotate texts, images and videos, as well manage quality control and data transfer. Your AI project will receive the highest-quality data. ShaipCloud not only provides you with high-quality data quickly and at a low cost, but also grows along with your AI project as it grows. This is due to its scalability and integrations of the platform that are required to make your work easier and deliver successful outcomes. The platform reduces friction in working with a global workforce and offers greater visibility and real-time control. There are data platforms. There are AI data platforms. The ShaipCloud Human-in-the Loop platform is a secure platform that allows users to collect, transform, and annotate their data. -
40
ShieldConex
Bluefin
Tokenize the PAN (primary customer number) and any associated PII/PHI so that you can maintain compliance with regulations governing sensitive data handling. PCI DSS scope is reduced across all channels and trusted tiers. Tokenization helps your organization comply with evolving security standards by masking data at the point of input. ShieldConex tokenizes every data element vaultlessly, while preserving the format. Payment data including credit or debit cards primary account number (PAN), date, expiration, CVV, name of cardholder, and more. Standardize payment experiences across businesses, locations, and channels, including mobile, online, in-store, and more. -
41
IBM InfoSphere®, Optim™, Data Privacy offers extensive capabilities to mask sensitive data in non-production environments such as development, testing, QA, or training. This single offering offers a variety transformation techniques that can replace sensitive information with fully functional, functionally masked data. Substrings, arithmetic, sequential or random number generation, date ageing, and concatenation are all examples of masking techniques. The context-aware masking capabilities allow data to be retained in a similar format as the original. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking tools can be used to prevent misuse of information. They allow you to mask, obfuscate, and privatize personal information that is distributed across non-production environments.
-
42
Wizuda
Wizuda
$9.99/month/ user Innovative Solutions that will revolutionize the way your organization shares data externally and internally. Wizuda MFT is designed with efficiency, security, compliance, and efficiency at its core. It enables IT to manage critical data movement within your organization as well as with external parties from one central solution. Wizuda MFT scales to your business and gives you full accountability for all file transfer operations. Share sensitive data with clients and employees of your company in a compliant, secure and compliant manner. File size limits are removed and encryption is enabled by default. This makes it possible to eliminate insecure alternatives like USBs. Wizuda users have the additional flexibility to send emails directly from their Outlook email or via the secure web portal. Wizuda Virtual Data Rooms offer a secure online repository that allows document storage, collaboration, and distribution for your business. Wizuda Virtual Data Rooms are easy to set up and maintain. -
43
AuricVault® Tokenization
Auric Systems International
$300 per yearThe AuricVault®, tokenization service, protects your sensitive financial and personal data. It stores that data safely and replaces it with a token. Tokens are random strings containing numbers and letters that have no relation to the stored data. Even if someone stole all your tokens they would still not have any sensitive data. Data separation is what tokenization does. Data separation ensures that no one entity has all data at once. Auric's tokenization solution allows for fine-grained permissions to allow one or more parties access to sensitive tokenized data. Depending on your business model and other factors, the AuricVault®, tokenization service may exempt your systems or servers from PCI scope. We help businesses secure billions of dollars and millions in transactions safely, securely, and easily. -
44
Enigma Vault
Enigma Vault
Enigma Vault is your PCI Level 1 compliant and ISO 27001 certificated payment card, data and file easy button to tokenization and encryption. It is difficult to tokenize and encrypt data at field level. Enigma Vault does all the heavy lifting for you. Your lengthy and expensive PCI audit can be simplified into a simple SAQ. You can greatly reduce your security risk and PCI scope by storing tokens rather than sensitive card data. Modern technologies allow you to search millions of encrypted values in just milliseconds using modern methods. We fully manage the solution and can adapt it to your needs. Enigma Vault tokenizes and encrypts data of any size. Enigma Vault provides true field-level security. Instead of storing sensitive data you store a token. Enigma Vault offers the following services. Enigma Vault makes crypto and PCI compliance easy. You don't have to manage or rotate private keys, nor deal with complicated cryptography. -
45
Protegrity
Protegrity
Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods. -
46
STRM
STRM
FreeIt is difficult to create and manage data policies. With PACE, you can ensure that data is used in a secure manner. You can apply data policies to code, no matter where it is located. Say goodbye to costly meetings and long waits, and hello to your new open-source data security engine. Data policies aren't only about controlling access, they are also about extracting value from the data with the correct guardrails. PACE allows you to collaborate on the why, and when automating the code. With PACE, you can programmatically apply data policies across multiple platforms. Integrate into your data platform or catalog (optional) and leverage the native capabilities that you already have. PACE automates the application of policies across major data platforms and catalogs, easing your governance processes. Centralize control and decentralize the execution of policies. Auditing obligations can be met by demonstrating how controls are implemented. -
47
SecureRedact
SecureRedact
$299 per monthAutomated redaction of video and audio will transform compliance timescales. Intelligent, intuitive editing features to meet all redaction requirements. Automatically blur faces and license plates in recorded and live videos. Automatically blur personal data from CCTV, body-worn cameras, dashcams, and other video sources to manage DSARs and FOIRs quickly, incidents or for wider sharing. Integrate live video anonymization in transport, healthcare, warehouses, and more to provide wider access to security videos, generate real-time notifications, or gather high-quality metadata for video analytics. Overlay alerts and analytics on anonymized live videos to unlock secure and privacy-compliant capabilities. Flexible deployment to meet the needs of each customer, whether they are small-scale or large-scale. Accessible via SaaS or APIs. -
48
PHEMI Health DataLab
PHEMI Systems
Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more -
49
VIDIZMO Redactor
VIDIZMO
$89 per monthSmart redaction software with artificial intelligence that is user-friendly and secure. It supports compliance for FOIA/HIPAA/GDPR, HIPAA and more. Millions of audio recordings may contain personally identifiable information (PII), including names, social security number (SSN), addresses, financial data, and more. VIDIZMO Redactor offers the ability to redact large numbers of audio recordings at once. The data privacy issue has become more pressing with the increase in mass surveillance. Cameras follow people everywhere, on the road or in the supermarket. They also follow them to the classroom and anywhere else. VIDIZMO Redactor allows you to redact videos from bodycams, CCTV cameras and other sources in order to hide faces, license plates, weapons and other objects. Images are not only beautiful, but they also contain data. -
50
Carmen Axis Video Application
Adaptive Recognition
The Carmen® Axis Video Application provides Axis cameras advanced Automatic Number Plate Recognition capabilities (ANPR) and Make and Model Recognition capabilities (MMR). It offers flexible deployment: cloud processing via Carmen® Cloud to provide global coverage and scalability, or on-camera for reliable, secure operation without additional hardware. This application provides real-time vehicle information for traffic monitoring, security systems, and access control systems. It ensures exceptional accuracy when reading license plates around the world. Its seamless licensing and integration options make it a versatile option for various operational requirements.