Best Rectify Alternatives in 2024
Find the top alternatives to Rectify currently available. Compare ratings, reviews, pricing, and features of Rectify alternatives in 2024. Slashdot lists the best Rectify alternatives on the market that offer competing products that are similar to Rectify. Sort through Rectify alternatives below to make the best choice for your needs
-
1
Satori
Satori
86 RatingsSatori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements. -
2
Install-free PDF editing, form filling, redaction, signing, viewing, and more on your website with RAD PDF! Packaged as an easy to use library / WebControl (compatible with .NET 3.5+, .NET Core, and .NET 5+), RAD PDF can be used with just about any flavor of ASP.NET including MVC, Razor, Blazor, WebForms, and more. RAD PDF is compatible with 99% of internet browsers, including those on Linux, Mac OS X, Microsoft Windows, and mobile. No plugins. No Adobe Reader. RAD PDF is more than a PDF to HTML converter. It natively supports all the most common PDF features including annotations, bookmarks, form fields, page labels, and more. With advanced PDF options, RAD PDF allows you to selectively enable and disable features not available with Adobe Acrobat Reader, like protecting a PDF from being downloaded while still viewable online. RAD PDF users can use PDF form fields directly from the web browser by enabling PDF form filling and PDF form saving without having to install any software. Integrating directly with ASP.NET, RAD PDF allows your web application to capture input data, build custom workflows, and provide an intuitive graphical user interface (GUI) for just about any online PDF interaction imaginable!
-
3
Immuta
Immuta
Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals. -
4
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022. -
5
Objective Redact
Objective
$76.49 per monthSecurity conscious organizations can use redaction software. Protect your organization and yourself from accidental disclosure. You know that you have removed any confidential word, phrase, or number. It can be a terrible feeling to realize that you haven't got every word after manually redacting a document. Yes, "find-and-replace" is possible, but only up to a point. Hidden metadata could still lurk in your document. Protect your organization and yourself from accidental disclosure. Objective Redact is a powerful, automated redaction tool that speeds up redaction, makes internal review easier, and protects your most sensitive information. It is ideal for compliance, disclosure, and redaction. It can handle large volumes and complex documents. Permanently remove all text content that has been marked for redaction. This includes hidden metadata like authors, creation dates, and other attributes that could be stored in a file. -
6
Redactable
Redactable
$19/user/ month Our patented software will be the only tool that you ever need to protect sensitive documents. No need for complicated manuals or training, our intuitive redaction wizard will guide you through the redaction process. With us, you can redact documents with confidence. Our redactions do not mask redactions, which can be removed. You can easily redact documents in the cloud, without downloading or installing plugins. Import documents from services you use daily. Our AI technology makes it easy to redact documents. Our software finds confidential information and suggests that it be redacted with just a couple of clicks. We make it easy to manage your redactions, from task management, to setting up a hierarchy review process. Our cloud-based platform allows you to redact documents with colleagues simultaneously and collaborate on large redactions projects. -
7
FreePDFRedactor
LEGALVERSE
FreeDigital PDF redaction is easy to use and free. Legalverse will save you time and money. You can easily redact, check, and download a securely redacted PDF in just minutes. Use our free online solution instead of Adobe Acrobat for removing text and data or manually printing and scanning legal documents to remove the content. Upload a PDF file. Our web-based editor allows you to easily remove text sections from the PDF document once it is displayed. The document will be stored for the duration your redactor session. Review your redactions after removing Text and Data to ensure that sensitive data has been removed correctly. Download your PDF with hidden metadata and text removed. The redacted areas are blacked out when you produce the PDF document. -
8
AutoRedact
EverMap
$149 one-time paymentRedact SSNs and account numbers. Redaction is the removal of certain types information from documents. In the context documents from United States government agencies, redaction is the process of removing classified data from a document before its publication. Redacting is an important procedure for attorneys to protect confidential information. If a document containing sensitive data must be distributed in the case of a discovery, then all non-discoverable material from that document needs to be removed first. AutoRedact, a "true-redacting" solution, removes sensitive text, images, vector graphics and text form fields from PDF documents, making them safe to distribute. The software includes many powerful tools to increase productivity, automate document redacting, and create workflows for multiple users. -
9
Tungsten Power PDF
Tungsten Automation
$179 one-time fee 1 RatingTungsten PowerPDF provides all the tools you need to create PDF files, convert them, edit them, share them, and esign. Tungsten Power PDF, an award-winning PDF Editor, is designed to be simple to use, secure and low cost. Enjoy a familiar Office-style interface to create, convert and compile your PDF documents within minutes. Power PDF offers advanced functionality, powerful redaction, and security for businesses and individuals of all sizes. Office-style interface optimized to work with Windows 10 desktop, Microsoft Surface, Mac OS Big Sur and Microsoft Surface. Create, edit, and convert PDF files into and from Word Excel PowerPoint JPG HTML and more. All the features are included in a single purchase. Add secure encrypted passwords, permissions and redact sensitive information and private metadata. -
10
Legalverse
Legalverse
Automating large document requests, including subpoenas, makes it easier for your legal team to respond. This complete solution allows legal teams to respond quickly to large document requests, including FOIA and subpoenas. Your team can collect all documents from one source with web-based services. Next, organize, search, tag and review the documents to determine their relevance. Redact sensitive information and keep confidential information secret during the review process. Once your team is ready for a response, you can easily create Bates-numbered PDF documents. This allows you and your team members work together to produce timely, accurate responses. Legalverse is a modern alternative to your legal team manually organizing, reviewing, and preparing documents. This increases the accuracy of the process and reduces the time it takes. Legalverse is a cost-effective solution for medium-sized document requests. It saves legal teams more than $50,000 and innumerable hours. -
11
Oracle Advanced Security
Oracle
Oracle Advanced Security can be used to encrypt application tablespaces and prevent out-of band access to sensitive data. Redaction policies help to prevent sensitive data from being spread and ensure compliance with data protection regulations. Transparent Data Encryption prevents potential attackers from bypassing the database to read sensitive information directly from storage. This is done by enforcing data at rest encryption in the database layer. To protect sensitive data, you can encrypt individual data columns, entire tablesspaces, backups, and database exports. Data Redaction is an extension of TDE. It reduces the risk of data being exposed in applications by redacting sensitive information before it leaves the database. Redaction can be partial or complete to prevent large-scale extraction of sensitive information into spreadsheets and reports. Encryption is implemented at database kernel level, eliminating any need to make changes to applications. -
12
Redact
Fordata
€29/user/ month REDACT is an easy-to-use, secure platform designed for automatic anonymization of personal and sensitive data in documents. Supporting 18 formats like PDF, Word, Excel, PPT, and XML, it ensures fast and precise redaction. Accessible online anytime, no installation needed, and backed by user support. -
13
PHEMI Health DataLab
PHEMI Systems
Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more -
14
Anonomatic
Anonomatic
Store, anonymize mask, mine, redact and share sensitive data securely with 100% accuracy and complete international data privacy compliance. You can save time and money by separating PII from other data. Embed PII Vault into your innovative solutions to reduce time to market and deliver the most PII-secure solutions available. Unlock data for more accurate and targeted messages. All data can be anonymized in one simple step before it reaches the platform. Once anonymized, Poly- Anonymization™ allows you to combine disparate anonymous data sets on an individual basis without receiving any PII. Replace PII by a compliant, multi-valued, non-identifying key that is used to link anonymous data from multiple organizations. -
15
PleaseReview
Ideagen
Ideagen PleaseReview is a document-review, co-authoring, and redaction software program that allows you to manage and control all aspects of the document creation process. It delivers: - Improved operational performance, productivity, and efficiency - Better compliance and business oversight - Mitigation and mitigation of regulatory, legal, and commercial risk Save valuable time and effort in conducting document reviews, get rid of tedious admin and have all comments, changes and discussions from multiple reviewers documented in one place. All contributions are even recorded in a comprehensive reconciliation report ready for auditing. You’ll never look back. -
16
Extract Systems
Extract Systems
Our intelligent document management platform automates extraction, classification, classification, indexing, and redaction for companies from all industries. Extract's document management platform can read your unstructured documents. Our platform is customizable and intelligently extracts and redacts the information you require and routes your data and original document to their final destination. Our platform runs your source documents through OCR software and rules that we have written specifically for your company. The Extract Systems Platform will extract and redact the information you require. Our intelligent software allows us to send the data and original documents to any destination you choose. This reduces the time required to manually enter data and reduces human error that can be caused by manual data entry. It also speeds up the access to valuable data so you can compare, report, and analyze it. -
17
OpenText Voltage SecureData
OpenText
Secure sensitive data wherever it flows - on premises, in the cloud and in big data analytics platforms. Voltage encryption provides data privacy protection and neutralizes data breaches. It also drives business value through secure data usage. Data protection builds customer trust, and enables compliance with global regulations such as GDPR, CCPA and HIPAA. Privacy regulations recommend anonymization, pseudonymization and encryption to protect personal data. Voltage SecureData allows enterprises to de-identify structured data and supports the use of data within its protected state to safely drive business value. Secure data flows through your enterprise without gaps, encryption, or overhead. SecureData supports a wide range of platforms and encrypts data using any language. Structured Data Manager integrates SecureData to allow businesses to easily and continuously protect data all through its lifecycle, from discovery through encryption. -
18
HushHush Data Masking
HushHush
Businesses today face severe punishment if they fail to meet the ever-increasing privacy standards of regulators and the general public. Vendors must keep up with the latest algorithms to protect sensitive data like PII or PHI. HushHush is at the forefront in privacy protection (Patents US9886593, US20150324607A1, US10339341) thanks to its PII data discovery tool workbench (also known data de-identification software, data masking software, and obfuscation program). It allows you to find sensitive data about your customers and classify it. You can also anonymize it and comply with GDPR and GLBA requirements. To create comprehensive and secure data anonymization solutions, you can use a variety of rule-based atomic addition anonymization components. HushHush components can be used to anonymize both direct identifiers (SSNs, credit cards names, addresses, telephone numbers, etc.). Both fixed and variable algorithms are available for indirect identifiers. -
19
TCS MasterCraft DataPlus
Tata Consultancy Services
Data management software is used mainly by enterprise business teams. Data management software must be intuitive, automated, and intelligent. Data management activities must also adhere to specific industry and data protection regulations. Data must be accurate, consistent, high quality, and easily accessible to enable business teams to make informed, data-driven strategic business decisions. Integrates data privacy, data quality management and test data management. Service engine-based architecture allows for efficient handling of growing data volumes. Uses a user-defined function framework with python adapter to handle niche data processing needs. This provides a minimal layer of governance for data quality and privacy management. -
20
Data Secure
EPI-USE
Protect sensitive SAP data. Find solutions to your SAP data security problems and comply with data privacy legislation, such as the EU's. General Data Protection Regulation (GDPR), South Africa’s POPI Act, and the California Consumer Privacy Act of 2018(CCPA) are all addressed with Data Secure™. Data security is essential in today's business environment. Data Secure™, a part of EPI USE Labs' Data Sync Manager (DSM) suite, solves all your data security problems. Data Secure is a comprehensive protection system that includes pre-defined masking rules. These rules can be used to scramble any non-key SAP field in any client-dependent SAP tables in a variety of ways (such as mapping table view, constant value, clear field), These rules can be extended to meet your security requirements. Data Secure enables your company to meet all well-known data privacy and protection standards such as the General Data Protection Regulation (GDPR), Sarbanes Oxley and the BDSG (Bundesdatenschutzgesetz). -
21
Wizuda
Wizuda
$9.99/month/ user Innovative Solutions that will revolutionize the way your organization shares data externally and internally. Wizuda MFT is designed with efficiency, security, compliance, and efficiency at its core. It enables IT to manage critical data movement within your organization as well as with external parties from one central solution. Wizuda MFT scales to your business and gives you full accountability for all file transfer operations. Share sensitive data with clients and employees of your company in a compliant, secure and compliant manner. File size limits are removed and encryption is enabled by default. This makes it possible to eliminate insecure alternatives like USBs. Wizuda users have the additional flexibility to send emails directly from their Outlook email or via the secure web portal. Wizuda Virtual Data Rooms offer a secure online repository that allows document storage, collaboration, and distribution for your business. Wizuda Virtual Data Rooms are easy to set up and maintain. -
22
Oracle Data Masking and Subsetting
Oracle
$230 one-time paymentDue to increasing security threats and expanding privacy regulations, it is imperative to limit the exposure of sensitive data. Oracle Data Masking and Subsetting allows database customers to improve security, speed compliance, and lower IT costs. It sanitizes production data for testing, development, and any other activities and easily eliminates unnecessary data. Oracle Data Masking and Subsetting allows for entire copies or subsets to be extracted from the database and obfuscated. This data can then be shared with business partners. Assuring continuity of applications, the integrity of the database is maintained. Application Data Modeling automatically detects columns in Oracle Database tables that contain sensitive information using built-in discovery patterns like national identifiers, credit cards numbers, or other personally identifiable information. It automatically detects parent-child relationships in the database. -
23
Adaptive
Adaptive
Adaptive is a platform for data security that prevents sensitive data from being exposed to all entities, human and nonhuman. It features an agentless architecture with zero network reconfiguration, and can be deployed on-premises or in the cloud. The platform allows organizations to share privileged data access without sharing credentials, improving security posture. It allows for just-in time access to a variety of data sources including databases, cloud infrastructure, data warehouses and web services. Adaptive facilitates non-human access to data by connecting third-party ETL pipelines or tools through a central interface, without exposing credentials for data sources. The platform offers data masking and tokenization for nonprivileged users, without changing access workflows. The platform provides a comprehensive audibility by integrating identity-based audit trails into all resources. -
24
Imperva Data Security Fabric
Imperva
Protect data at scale using a multicloud, hybrid, enterprise-class security solution for all types of data. Extend the data security across hybrid, multicloud and on-premises environments. Discover and classify unstructured, semi-structured & structured data. Prioritize data risks for incident context as well as additional data capabilities. Centralize data management via a single data service or dashboard. Protect data from exposure and avoid breaches. Simplify data-centric compliance, governance, and security. Unify the view to gain insight into at-risk data, users and data. Monitor Zero Trust and policy enforcement. Automated workflows and automation can save you time and money. Support for hundreds file shares and data repositories, including public, datacenter, and third-party cloud service. Cover your immediate needs and future integrations, as you transform or extend cloud use cases. -
25
Randtronics DPM easyData
Randtronics
DPM easyData is a high performance data spoofing and de-identification engine. Data spoofing techniques include masking, tokenization. anonymization, pseudonymization, encryption, and anonymization. DPM data spoofing processes, which replace sensitive data or parts with non-sensitive counterparts (creates fake information), is a powerful tool for data protection. DPM easyData, a software data security solution, allows web and database server applications and databases tokenize and anonymize data. It also applies masking policies to unauthorized users when retrieving sensitive information. The software provides a high degree of granularity by allowing users to be granted access to specific protection policies and the operations they can perform with them. DPM easyData is highly customizable and can protect and tokenize many types of data. The software is flexible, so users can define any input data or token format they wish. -
26
You can convert, create, edit OCR, compare, sign, and even OCR PDFs. You can customize the interface language and its appearance, from light to dark themes, to make it easier to work with PDFs. You can customize your conversions by choosing a page, paragraph, or a single line to convert. Convert complex PDF table data to Microsoft Excel using a custom PDF to Excel converter. Smart Layout Detector allows you to keep the table styles intact. Edit PDF text and pages. Annotate and remove PDF content. Sign PDF documents. Fill, edit, and create PDF forms. Split documents into multiple parts. Convert scanned PDFs into English, French and Spanish. Batch PDF conversion can be automated by storing large numbers of PDF files in queues and even entire directories. Batch create PDFs from a variety of formats and merge them all into one file. Add passwords and file permissions to create secure PDFs from existing pages or blank pages. Able2Extract Professional: Your Swiss Army Knife to create PDF files.
-
27
e-Redact
Footprint Solutions
The UK's most advanced document redaction solution will save you time and increase efficiency by 84% E-Redact is trusted by thousands of private and public sector companies across the country as a secure document-removal product. e-Redact has over 25 years of experience and instantly and irreversibly removes confidential information from any source. It does this quickly and reliably. You can search for phrases and expressions in seconds and have them redacted. This allows you to share confidential data with others outside your company. -
28
Cloud Compliance
Cloud Compliance
With the most comprehensive range of products, you can implement privacy compliance and data security in Salesforce. A thorough data inventory and risk assessment are essential for privacy programs to be successful. Most organizations overlook data or struggle with spreadsheets and manual processes. Our Personal Data Inventory product automates and streamlines DPIA and enterprise data inventories flows. Your organization will be able to easily have a clear risk assessment and a data inventory. Many organizations are experiencing an increase in privacy rights requests. It is difficult, inconsistent, and error-prone to respond to these requests manually, increasing the risk of non-compliance. Our Privacy Rights Automation product allows self-service and automates all privacy related activities. A standardised and error-free solution to reduce the risk of non-compliance -
29
Informatica Dynamic Data Masking
Informatica
Your IT organization can use flexible masking rules to limit sensitive data with flexible masking rules based upon the authentication level of a user. It ensures compliance by blocking, auditing and alerting users, IT personnel and outsourced teams that access sensitive information. Data masking solutions can be easily customized to meet different regulatory or business needs. Protect sensitive and personal information while supporting cloud-based, offshoring and outsourcing initiatives. Secure big data using dynamic masking of sensitive data in Hadoop. -
30
Informatica Persistent Data Masking
Informatica
While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations. -
31
Dataguise
Dataguise
Data privacy and security should not be a hindrance to your analytics-driven innovation efforts. Dataguise offers flexible encryption and masking options to protect sensitive data. This will ensure that your business is protected. Fast-track delivery of data sets can be achieved for analysis in real time, allowing for better insights and better decisions. Customers of Dataguise have many and changing needs. We know that our customers need more than just the solutions and services we offer. This is why we have built a strong network with carefully selected partners. This executive guide will show you how to maximize data value while protecting data privacy. Dataguise is more reliable than other data discovery tools, has a longer history, supports a wider range of data types, repositories, delivers lower false positive results, and scans data at a larger scale more reliably. Dataguise gives businesses the confidence to act in the best interest of their data. -
32
Viacryp
Viacryp
Enjoy the convenience of using a Trusted Third Party to carefully pseudonymize personal data so that you can perform analysis within the GDPR framework. Our basic service is to pseudonymize personal data. We use the principles of irreversible pseudonyms, thickening behavior and thickening of words. The pseudonymized information is used by our clients to further process the data. Our filter service allows you to share your personal data in a proportionate manner and respecting privacy. We filter information using a pseudonymized expert whitelist, and only send information about individuals that appear on this list. Viacryp offers privacy advice in relation to the protection and security personal data. Together with our partners we provide advice on the steps that an organization can take to comply with the GDPR frameworks. This includes both technical and organizational and processes measures. -
33
Lenses
Lenses.io
$49 per monthAllow everyone to view and discover streaming data. Up to 95% of productivity can be increased by sharing, documenting, and cataloging data. Next, create apps for production use cases using the data. To address privacy concerns and cover all the gaps in open source technology, apply a data-centric security approach. Secure and low-code data pipeline capabilities. All darkness is eliminated and data and apps can be viewed with unparalleled visibility. Unify your data technologies and data meshes and feel confident using open source production. Independent third-party reviews have rated Lenses the best product for real time stream analytics. We have built features to allow you to focus on what is driving value from real-time data. This was based on feedback from our community as well as thousands of engineering hours. You can deploy and run SQL-based real-time applications over any Kafka Connect, Kubernetes or Kubernetes infrastructure, including AWS EKS. -
34
IRI DMaaS
IRI, The CoSort Company
$1000 per dayIRI Data Masking as a Service is a professional services engagement to secure PII. Step 1: IRI agrees under NDA terms to classify, analyze, and report on the sensitive, at-risk data in your sources. We will discuss an initial cost estimate then hone it with you during data discovery. Step 2: Transfer the unprotected data to a secure on-premise or cloud-based staging area or provide remote, supervised access to IRI to the data sources(s) at issue. We'll use the tools in the award-winning IRI Data Protector suite to mask that data according to your business rules, on an ad hoc or recurring basis. Step 3: Our experts can also move newly-masked data to incremental replicas in production or to lower non-production environments. From either, the data is now safe for analytic initiatives, development, testing, or training. Tell us if you need additional services, like re-ID risk scoring (expert determination) of the de-identified data. This approach provides the benefits of proven data masking solution technology and services without the need to learn and customize new software from scratch. If you do want to use the software in-house, you will have everything pre-configured for easier long-term self-use and modification. -
35
PDF Buddy
PDF Buddy
$7.99 per monthThe best online PDF Editor you'll use. Fill out forms, add your signature, white out and highlight without breaking sweat. Edit PDFs from your PC, Mac or Chromebook. You don't need to install any software, just use the browser you are using now. PDF Buddy uses Secure Sockets Layers (SSL) to encrypt your files. Stop wasting time with printers and scanning devices every time you want to fill out a form in PDF format. You have better things to do. You can edit up to three PDFs each month for free, or you can try our premium features for unlimited usage. It's a cheaper alternative to Adobe Acrobat. You should be ashamed if you still print out your PDF files. It's time for PDF Buddy to help you go green. You can edit up to three PDF files each month for free by sharing our link with your social networks (Facebook Twitter or Google+). You can also buy credits to edit additional documents or get unlimited access. -
36
Forcepoint SimShield
Forcepoint
Secure data transfer to training and testing environments. The U.S. NCDSMO Baseline is available for SABI environments since 2009. It supports native support for DIS and HLA, TENA and RTP, and conforms to NSA Raise the Bar guidelines and NIST guidelines. The High Performance Computing Modernization Program Office, (HPCMPO), evaluated the connection to Defense Research & Engineering Network and Secure Defense Research & Engineering Network. SimShield allows fully automated, predictable and controlled two-way communication. It also allows for the sanitization and control of events across segmentsed, air-gapped security areas. Always have the latest features without additional cost, vs. Government-Off-The-Shelf (GOTS) solutions. Multiple national agencies and coalition forces can be trained simultaneously in one, real-world environment. Sharing of sanitized information is a faster way to detect and correct errors during Research, Development, Test & Evaluation. -
37
PDF Guru
PDF Guru
84 RatingsConvert, merge, edit and compress PDFs in just a few simple clicks. Download your document quickly with ease. Our PDF converter creates PDF files in just seconds! When you create PDF files on our platform, we use HTTPS encryption to secure your digital data. Redact a pdf, modify text, create new objects and perform many other actions in one place. Our PDF creator has an intuitive interface that allows you to use it without any hassle. Our PDF creator works online on all platforms: Windows, Mac OS, Linux and iOS. You can restrict or lock your file if you don't wish others to be able to open, edit or print it. -
38
AnalyticDiD
Fasoo
De-identify sensitive information, including personally identifiable data (PII), by pseudonymization or anonymization, for secondary use and analysis, such as comparative efficacy studies, policy assessments, and life science research. This is crucial as organizations collect and compile large volumes of business data in order to understand trends, gain insight into customer preferences, or develop new innovations. Regulations like HIPAA and the GDPR require data to be deidentified. However, many deidentification tools are designed to remove personal identifiers but make it difficult for users of the data. Data anonymization and pseudonymization can be used to transform PII into data which cannot be used for identification. This ensures privacy. This allows you analyze large data sets without violating privacy laws. De-identify your data using a variety of privacy models and methods from the broad area of statistics and data de-identification. -
39
Redact
Redact.dev
$34.99Redact allows individuals and businesses alike to remove their user-generated content from virtually every major platform in a private and secure manner. Smart deletion, keyword scanning, and complete content wiping will enhance your privacy and security. Download Redact now and take control of the digital footprint. Redact is a Privacy First company. -
40
ImageGear
Accusoft
This document and image cleanup and processing toolkit allows developers the ability to quickly integrate document handling functions such as image manipulation, compression, manipulation, manipulation, manipulation, editing, manipulation, compression and image enhancement into their applications. ImageGear allows your application to clean up files such as deskew, line, and speckle removal, among others. ImageGear's color-processing tools can be used to improve image quality and reduce compressed file sizes. This SDK for image processing and document cleaning includes many APIs that allow image processing and clean-up. ImageGear can help you add functionality to your applications. Learn how ImageGear can meet all of your document lifecycle requirements. This PDF SDK allows.NET developers add robust PDF functionality to their applications. Users can view, annotate and compress pages. Discover all the PDF manipulation capabilities of ImageGear PDF and how it can enhance your application. -
41
InfoSum
InfoSum
InfoSum unlocks data’s unlimited potential. InfoSum uses patented privacy-first technology to connect customer records between companies without sharing data. InfoSum is trusted by customers in financial services, content distribution and connected television as well as gaming, entertainment, and gaming. It seamlessly and compliantly connects customer data to other partners via privacy-safe, permission-controlled data networks. InfoSum's technology has many uses, from the standard 'data-onboarding" to more complex use cases that allow the creation of own identity platforms, the development and sale of new products and data, and the creation of completely new markets. InfoSum was established in 2015. InfoSum was founded in 2015. The company is poised to experience exponential growth. -
42
Privacy1
Privacy1
$159 per monthPrivacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level -
43
Nymiz
Nymiz
Anonymizing data manually takes time away from actual work. When data is not easily shared, information becomes trapped, leading to poor knowledge sharing and silos within an organization. Constant worry about whether shared data is in compliance with ever-changing regulations (GDPR, CCPA, HIPAA & others). Nymiz anonymizes data using reversible and irreversible methods. The original data are replaced with asterisks or tokens to maintain privacy and value while improving privacy. We achieve superior results by recognizing context-specific information like names, phone number, and social security number. Additional security layer on the data level. Information that is anonymous or pseudonymized has no practical value when it is exposed or stolen by a security breach. -
44
Protegrity
Protegrity
Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods. -
45
CipherTrust Data Security Platform
Thales Cloud Security
Thales has been pushing the boundaries with the CipherTrust Data Security Platform. This platform removes complexity from data security, speeds up compliance time, and protects cloud migrations. This next-generation platform, built on a modern microservices architecture, was designed for cloud computing. It includes Data Discovery and Classification and fuses together the best features of the Vormetric Data Security Portal, KeySecure, and connector products. CipherTrust Data Security Platform combines data classification, data protection, unprecedented granular access control, and centralized key management all in one platform. This means that your business will have fewer resources for data security operations, fewer compliance controls, and a significantly lower risk. The CipherTrust Security Platform integrates a range of data-centric security products that combine data protection, discovery, and control into one platform. -
46
All of our work is focused on making data accessible and safe for businesses. Our Safe Haven platform empowers customer intelligence, engages customers on a large scale, and opens up new opportunities for business growth. Our platform gives enterprises full control over how data is accessed and used with industry-leading software solutions for data activation, identity, and collaboration. You can gain access to data, generate valuable business insights, and drive revenue. However you retain full control over data access and use at all times. You can accurately address your target audiences across any channel, platform or publisher, and safely translate data between identity space spaces to improve results. You can protect your customer data using the most advanced privacy-preserving technologies and advanced techniques that allow for data movement to be minimized while still allowing insight generation.
-
47
Okera
Okera
Complexity is the enemy of security. Simplify and scale fine-grained data access control. Dynamically authorize and audit every query to comply with data security and privacy regulations. Okera integrates seamlessly into your infrastructure – in the cloud, on premise, and with cloud-native and legacy tools. With Okera, data users can use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives. -
48
iScramble
Mage Data
You have the freedom to choose the anonymization method that best suits your needs - including tokenization, encryption, and masking techniques. This will ensure that sensitive data is protected in a delicate balance between security and performance. You can choose from over 60 different anonymization methods to protect sensitive data. Anonymization methods that provide consistent results across datastores and applications will help you maintain referential integrity. Anonymization methods that provide both performance and protection. You can choose to encrypt, tokenize or mask data depending on the use case. There are many ways to anonymize sensitive data. Each method provides adequate security and data usability. Protect sensitive data across data storage and applications, and maintain referential integrity. You can choose from a range of NIST-approved encryption or tokenization algorithms. -
49
iMask
Mage Data
iMask protects sensitive data at the Application Layer as well as the Database Layer. It offers flexible solutions that can be used for all types of use and all users, small, medium and large. Mask sensitive data at both the application and database levels to ensure your data's protection in production. You can set up rules in the product UI to allow role-based and user-based access controls that control who can access your sensitive information. You have the option to choose from more than 40 anonymization methods to maintain data consistency between production and nonproduction instances. You can set authorization rules to restrict who can see sensitive data based on geography, roles, departments, and other factors. Secure anonymization protocols can be enabled without affecting performance. Database embedded approach allows data to be deidentified without any changes in the application architecture or security protocols. -
50
Imperva Data Masking
Imperva
Data masking is a method to create a fake but real version of your organization's data. The goal of data masking is to protect sensitive data while offering a functional alternative for when real data is not required, such as in user training, software testing, and sales demos. Data masking processes alter the data's values while maintaining the same format. The goal is to create a version which cannot be deciphered, reverse engineered, or modified. There are many ways to alter data, including character shuffling and word or character substitution. Data masking can solve several critical threats, including data loss, data exfiltration and insider threats. Cloud adoption reduces the data risk. Data is rendered useless to attackers while still maintaining many of its functional properties. It allows data sharing with authorized users such as testers or developers without exposing production data.