Best TrueZero Tokenization Alternatives in 2024
Find the top alternatives to TrueZero Tokenization currently available. Compare ratings, reviews, pricing, and features of TrueZero Tokenization alternatives in 2024. Slashdot lists the best TrueZero Tokenization alternatives on the market that offer competing products that are similar to TrueZero Tokenization. Sort through TrueZero Tokenization alternatives below to make the best choice for your needs
-
1
Keeper Security
Keeper Security
1,542 RatingsPassword security is the foundation of cybersecurity. Keeper's powerful password security platform will protect your business from cyberthreats and data breaches related to passwords. Research shows that 81% of data breaches can be attributed to weak passwords. Password security platforms are an affordable and easy way for companies to address the root cause of most data breaches. Your business can significantly reduce the risk of data breaches by implementing Keeper. Keeper creates strong passwords for all websites and apps, then secures them on all devices. Each employee receives a private vault to store and manage their passwords, credentials and files, as well as private client data. Employees will save time and frustration by not having to remember, reset, reuse, or remember passwords. Industry compliance is achieved through strict and customizable role-based access controls. This includes 2FA, usage auditing, and event reporting. -
2
Enigma Vault
Enigma Vault
Enigma Vault is your PCI Level 1 compliant and ISO 27001 certificated payment card, data and file easy button to tokenization and encryption. It is difficult to tokenize and encrypt data at field level. Enigma Vault does all the heavy lifting for you. Your lengthy and expensive PCI audit can be simplified into a simple SAQ. You can greatly reduce your security risk and PCI scope by storing tokens rather than sensitive card data. Modern technologies allow you to search millions of encrypted values in just milliseconds using modern methods. We fully manage the solution and can adapt it to your needs. Enigma Vault tokenizes and encrypts data of any size. Enigma Vault provides true field-level security. Instead of storing sensitive data you store a token. Enigma Vault offers the following services. Enigma Vault makes crypto and PCI compliance easy. You don't have to manage or rotate private keys, nor deal with complicated cryptography. -
3
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022. -
4
VGS Platform
Very Good Security
The VGS Vault allows users to securely store their tokenized data. This secures your most sensitive data. There is nothing to be stolen in the event of a breach. It's impossible to hack what isn't there. VGS is the modern approach in data security. Our SaaS solution allows you to interact with sensitive and regulated data while avoiding the responsibility of protecting it. You can see the interactive example of how VGS transforms data. You can choose to hide or show data by choosing Reveal or Redact. VGS can help you, whether you're a startup looking for best-in-class security or an established company seeking to eliminate compliance as a barrier to new business. VGS assumes the responsibility of protecting your data, eliminating any risk of data breaches, and reducing compliance overhead. VGS layers protection on the systems for companies that prefer to vault their data. This prevents unauthorized access and leakage. -
5
CipherTrust Tokenization
Thales Cloud Security
CipherTrust Tokenization reduces the cost and effort needed to comply with security policies, regulatory mandates such as PCI DSS and also makes it easy to protect sensitive data including personally identifiable Information (PII). There are no industry standards for tokenization, but most solutions fall into two categories: vaultless or vaulted. Both secure and anonymousize sensitive assets. Tokenization software is available in the datacenter, big data environments, or the cloud. Tokenization can remove cardholder data from PCI DSS with minimal effort and cost, allowing organizations to save costs associated with compliance. Modern IT architectures demand both the use and protection of personally identifiable data (PII). CipherTrust tokenization provides PII security without the need for encryption key management by software developers. -
6
Skyflow
Skyflow
Skyflow allows you to run workflows, logic, and analytics on encrypted data. Skyflow uses multiple encryption and tokenization methods to ensure maximum security. With auditable logs, provenance, and data residency, you can manage access to your data and policy enforcement. Compliance is possible in minutes, not weeks. It's easy with our trusted infrastructure and simple REST or SQL APIs. Tokenization is required for compliance. An encrypted data store allows you to search, analyze, and make use of secure data. Skyflow can be run in any virtual private cloud you prefer. It can be used as a secure gateway, zero trust storage, and many other purposes. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. You can use your sensitive data in any application or workflow without ever having to decrypt it. -
7
AuricVault® Tokenization
Auric Systems International
$300 per yearThe AuricVault®, tokenization service, protects your sensitive financial and personal data. It stores that data safely and replaces it with a token. Tokens are random strings containing numbers and letters that have no relation to the stored data. Even if someone stole all your tokens they would still not have any sensitive data. Data separation is what tokenization does. Data separation ensures that no one entity has all data at once. Auric's tokenization solution allows for fine-grained permissions to allow one or more parties access to sensitive tokenized data. Depending on your business model and other factors, the AuricVault®, tokenization service may exempt your systems or servers from PCI scope. We help businesses secure billions of dollars and millions in transactions safely, securely, and easily. -
8
Baffle
Baffle
Baffle provides data protection that is universal from any source to any destination. You can control who has access to what data. Enterprises continue to fight cybersecurity threats like ransomware and breaches and losses of data assets in private and public clouds. New data management restrictions and considerations about how it must be protected have altered the way data is stored, retrieved and analyzed. Baffle believes data breaches and data loss will not occur. Our last line of defense is to ensure that attackers cannot access unprotected data. Our data protection solutions protect data from the moment it is created and keep it safe while it is being processed. Baffle's transparent security mesh for cloud and on-premise data offers multiple data protection modes. You can protect data as it moves between a source data store and a cloud database or object storage. This ensures safe consumption of sensitive information. -
9
ShieldConex
Bluefin
Tokenize the PAN (primary customer number) and any associated PII/PHI so that you can maintain compliance with regulations governing sensitive data handling. PCI DSS scope is reduced across all channels and trusted tiers. Tokenization helps your organization comply with evolving security standards by masking data at the point of input. ShieldConex tokenizes every data element vaultlessly, while preserving the format. Payment data including credit or debit cards primary account number (PAN), date, expiration, CVV, name of cardholder, and more. Standardize payment experiences across businesses, locations, and channels, including mobile, online, in-store, and more. -
10
TokenEx
TokenEx
Hackers love to target Personally Identifiable Information (PII), which is also known as Personal Information and Protected Health Information, along with Payment Card Information (PCI). TokenEx can tokenize all types of data, including PII, PHI and PCI. can be safely tucked away from business systems and replaced by tokens that are mathematically indistinguishable to the original data. This makes it useless to data thieves. Tokenization allows you to store, access, and protect sensitive data in a way that is virtually unrestricted. -
11
Rixon
Rixon
$99 per monthCloud-native vaultless tokenization platform maximizes data security and solves data privacy concerns. You can focus on your business with peace of mind and time when you know that your business exceeds compliance requirements. Increasing operating costs, ransomware threats, and ongoing audits of compliance are all challenges that organizations face. Rixon gives you the confidence to take your business to the world, while keeping you safe. The Rixon Privacy platform drives business results by giving organizations the tools to deliver Security, Compliance, and Privacy to the business and applications they support. Rixon's patented tokenization technology eliminates sensitive data from being exposed within your applications. Sensitive data is securely ingested, and converted into smart security tokens that protect the data against unauthorized data access. -
12
HashiCorp Vault
HashiCorp
Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API. -
13
Fortanix Data Security Manager
Fortanix
A data-first approach in cybersecurity can minimize costly data breaches and speed up regulatory compliance. Fortanix DSM SaaS is designed for modern data security deployments to simplify and scale. It is protected by FIPS 140-2 level 3 confidential computing hardware, and delivers the highest standards of security and performance. The DSM accelerator can be added to achieve the best performance for applications that are latency-sensitive. A scalable SaaS solution that makes data security a breeze, with a single system of record and pane of glass for crypto policy, key lifecycle management, and auditing. -
14
Salesforce Shield
Salesforce
$25 per monthWith platform encryption, you can natively encrypt sensitive data at rest across all Salesforce apps. AES256-bit encryption ensures data confidentiality. You can create your own encryption keys and manage the key lifecycle. Protect sensitive data from all Salesforce users, including admins. Conform to regulatory compliance requirements. Event monitoring allows you to see who, when, and where critical business data is being accessed. Log files can be used to monitor critical events in real time. Transaction security policies can prevent data loss. Detect insider threats and report anomalies. Audit user behavior and measure the performance of custom applications. You can create a forensic audit trail that includes up to 10 years' worth of data and set triggers for data deletion. Expand tracking capabilities for custom and standard objects. Extended data retention capabilities are available for audit, analysis, and machine learning. Automated archiving can help you meet compliance requirements. -
15
EncryptRIGHT
Prime Factors
$0EncryptRIGHT simplifies the application-level data protection by separating data protection policies and application programming. This allows for a complete separation between information security, application programming, and data security. EncryptRIGHT uses a Data Security Governance approach to define and enforce how data is protected. It also determines who can access the data and what format it will take once access is granted. The unique Data-Centric Security Architecture allows information security professionals to create an EncryptRIGHT Data Protect Policy (DPP) and bind it to data, protecting it no matter where it is stored, used, moved, or stored. Programmers don't need to be experts in cryptography to protect data at the application level. They simply configure authorized applications to call EncryptRIGHT to request that data be appropriately secured or unencrypted according to its policy. -
16
Protegrity
Protegrity
Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods. -
17
FIS Tokenization
FIS
The solution protects card payments by hiding sensitive cardholder data everywhere. FIS®, Tokenization™, dynamically encrypts card payments to ensure ultimate security whether customers pay online, via their phone or at a store. Our payment tokenization solutions help you to comply with the Payment Card Industry Data Security Standard, protect your cardholders, and manage risk by replacing sensitive cardholder information with unique tokens. Reduce fraud risk by replacing sensitive cardholder data with a unique token. Cardholders can load their card credentials into different payment apps securely and quickly. Reduce the scope of PCI DSS-compliant systems to simplify compliance. -
18
Adaptive
Adaptive
Adaptive is a platform for data security that prevents sensitive data from being exposed to all entities, human and nonhuman. It features an agentless architecture with zero network reconfiguration, and can be deployed on-premises or in the cloud. The platform allows organizations to share privileged data access without sharing credentials, improving security posture. It allows for just-in time access to a variety of data sources including databases, cloud infrastructure, data warehouses and web services. Adaptive facilitates non-human access to data by connecting third-party ETL pipelines or tools through a central interface, without exposing credentials for data sources. The platform offers data masking and tokenization for nonprivileged users, without changing access workflows. The platform provides a comprehensive audibility by integrating identity-based audit trails into all resources. -
19
Ubiq
Ubiq Security
$0.001 per encryptEncrypt your sensitive data before leaving the application so that the storage layer and adversaries only see ciphertext. Client-side encryption that is native to the application protects data against sophisticated attackers, supply chain attacks, and internal threats. Most at-rest encryption solutions - transparent disk encryption, full disk encryption, etc. They are ineffective for modern threats, because they give admins, key processes and attackers implicit access to plaintext. Ubiq’s developer-first encryption-as code platform eliminates this gap and bridges the divide between engineering and security teams. Lightweight, prepackaged encryption libraries and code that can be easily integrated into any application for native client-side cryptography and set-and forget key management. -
20
Anonomatic
Anonomatic
Store, anonymize mask, mine, redact and share sensitive data securely with 100% accuracy and complete international data privacy compliance. You can save time and money by separating PII from other data. Embed PII Vault into your innovative solutions to reduce time to market and deliver the most PII-secure solutions available. Unlock data for more accurate and targeted messages. All data can be anonymized in one simple step before it reaches the platform. Once anonymized, Poly- Anonymization™ allows you to combine disparate anonymous data sets on an individual basis without receiving any PII. Replace PII by a compliant, multi-valued, non-identifying key that is used to link anonymous data from multiple organizations. -
21
OpenText Voltage SecureData
OpenText
Secure sensitive data wherever it flows - on premises, in the cloud and in big data analytics platforms. Voltage encryption provides data privacy protection and neutralizes data breaches. It also drives business value through secure data usage. Data protection builds customer trust, and enables compliance with global regulations such as GDPR, CCPA and HIPAA. Privacy regulations recommend anonymization, pseudonymization and encryption to protect personal data. Voltage SecureData allows enterprises to de-identify structured data and supports the use of data within its protected state to safely drive business value. Secure data flows through your enterprise without gaps, encryption, or overhead. SecureData supports a wide range of platforms and encrypts data using any language. Structured Data Manager integrates SecureData to allow businesses to easily and continuously protect data all through its lifecycle, from discovery through encryption. -
22
Visa Token Service
Visa
Visa Token Service helps you to build and maintain digital payment experiences, while protecting sensitive consumer information from fraud. Visa Token Service offers three essential tools that will help you meet consumer demand for mobile payment solutions. Visa offers partners standards, specifications and development tools as well as turnkey mobile solutions that help them build and deploy tokenized apps for cardholders. Visa Token Service SDK allows you to create your own mobile payments application. Payment solutions can be developed that integrate directly with the token management tools. Visa Token Service makes it easy and secure to make contactless mobile payments. Visa PayWave and Near Field Communication (NFC), which uses NFC technology, make it easy to make secure purchases. With compatible iOS devices, you can make convenient purchases on the go. -
23
ACI Omni-Tokens
ACI
ACI's single- and multiple-use tokens will help you to secure your customers, reduce compliance burden and maintain flexibility and independence in managing your business. ACI's omni tokens can be used with cards and alternative payment methods. Our omni tokens allow customers to easily link their tokenized payment methods, while protecting their sensitive personal data. Tokenization is a key component of data security. Point-to-point (P2PE) encryption, which encrypts card information and customer information on the terminal, is the perfect partner. Hackers are targeting the data that merchants use to process payments as it moves from the terminal to the processor. To ensure that your customer data is protected, combine tokenization with P2PE capabilities. -
24
PK Protect
PKWARE
PK Protect is a platform for data protection that helps organizations protect sensitive information in a variety of environments. It offers robust tools for data discovery and classification, encryption and monitoring. This ensures that critical data will be protected at rest and during transit. PK Protect's automated policies and compliance controls help businesses meet regulatory requirements such as GDPR and HIPAA, while minimizing data breach risks. The platform integrates into various systems, allowing for a unified management of data security across cloud environments, on-premises environments, and hybrid ones. PK Protect offers real-time visibility, proactive threat detection and helps organizations reduce security vulnerabilities. -
25
ALTR
ALTR
$10 per user per monthSnowflake makes it easy to manage sensitive data quickly and easily. This will allow you to get more value in less time than waiting months. ALTR allows you to automatically classify sensitive data by checking a box on import. You can add controls such as data masking using a drop-down menu. From a single screen, you can set alerts and limits for data access by user, amount and IP address. There are no extra costs or hassles on the prem, no proxies that can be broken with platform changes, and no managed services disguised under SaaS. ALTR was created in the cloud and integrates seamlessly with platforms such as Snowflake. ALTR's complete control over data allows you to visualize data usage, detect anomalies, alert on them, block threats, and tokenize important data. All your data is protected. ALTR is cloud-based so there's no upfront cost. You can start ALTR for free and then upgrade as necessary. -
26
Sotero
Sotero
Sotero is the first zero trust cloud-native data security platform. It consolidates all your security systems into one simple-to-manage environment. The Sotero data security platform uses an intelligent data security fabric to ensure that your sensitive data is always protected. Sotero automatically protects all data instances and applications regardless of source, location, or lifecycle stage (at rest or in transit or in use). Sotero allows you to move from a fragmented and complex data security system to one unified security fabric that provides 360deg management for your entire data security ecosystem. No longer are you forced to use point solutions to see who has access to your data. A single pane provides 100% control and governance. The Sotero platform protects all data assets, no matter where they are located - on-premise, in the cloud, or as a relational database. -
27
Piiano
Piiano
Start with developers to create a culture and infrastructure that respects privacy and security. This will ensure that PII is prioritized and protected throughout your organization. The Piiano Vault can be deployed to create a secure, centralized PII zone that is only accessible to you in your cloud environment. This will prevent data breaches and ensure privacy best practices are being applied. For unparalleled access visibility, you can control all PII interactions using advanced policy controls, encryption, tokenization, and a privacy-centric scanner. To comply with GDPR, CCPA, and other privacy regulations, centralize data to implement privacy-by design, pseudonymization (RTBF), and data subject access requests. -
28
Kodex
Kodex
Privacy engineering is a new field that intersects with data engineering and information security. It also has intersections in software development, privacy law, and software development. Its goal is ensuring that personal data are stored and processed in the most legal way possible, while respecting and protecting the privacy of those individuals to whom the data belongs. Security engineering is a prerequisite for privacy engineering, but it's also a separate discipline that aims at ensuring the safe processing and storage sensitive data. Privacy & Security Engineering is required if your organization processes sensitive or personal data (or both). This is particularly true if you are doing your own data science or engineering. -
29
xtendr
xtendr
xtendr unhides detailed, privacy-preserving insights across multiple independent data sources. Xtendr gives you access to data that was previously inaccessible and protects your data throughout its entire lifecycle. You can be confident in privacy and regulatory compliance. Xtendr is not just anonymity; it is the missing piece of multi-party data-sharing with true privacy protection. It is cryptography at work so you can reach your potential. The most advanced privacy-enhancing technology for data collaboration. xtendr has solved the cryptography problem of data sharing among parties who are distrustful of each other. Take your business to the next level with a data protection solution that is enterprise-grade and allows organizations to form data partnership while protecting sensitive data. Data is the currency of today's digital age. Some say that it is replacing crude oil as the most valuable resource in the world, but there is no doubt of its importance. -
30
This suite of integrated encryption tools will help you protect your database and file data from misuse, and comply with government and industry regulations. IBM Guardium Data Encryption is an integrated suite of products based on a common architecture. These highly-scalable products provide encryption, tokenization and data masking capabilities, as well as key management, to help protect and manage access to databases, containers and files across the hybrid multicloud, securing assets in cloud, virtual, Big Data and on-premise environments. By encrypting database and file data using features such as data masking, tokenization and key rotation, organizations can ensure compliance with industry and government regulations, such as GDPR, CCPA and PCI DSS. Guardium Data Encryption features, such as data access audit logging and tokenization, data masking, and key management, help organizations meet regulations like HIPAA, CCPA, or GDPR.
-
31
Virtru
Virtru
You can easily control who has access to sensitive data within your organization via email, file-sharing, and other applications. All powered by the Trusted Data Format, Virtru's industry-leading platform to Zero Trust Data Control. Virtru integrates seamlessly with the apps your teams use, securing workflows in Google and Microsoft 365, Salesforce, Zendesk and other applications. We make military-grade encryption available to everyone. Virtru can be deployed across your organization in under a day. This will help you meet your compliance goals. Granular access controls protect your most valuable asset, your data, throughout its entire lifecycle and wherever it travels. Securely collaborate in Docs, Sheets, and Slides. Drive allows you to store and share files. You can message via Gmail or Google Meet. Secure messages through enterprise and custom applications. Outlook allows you to seamlessly protect email and file sharing. -
32
Informatica Persistent Data Masking
Informatica
While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations. -
33
OmniToken
FIS
OmniToken uses the exact same cryptographic key management principle as industry standards like PCI DSS and PCI Point-to Point Encryption. Best practices in security standards can help reduce your risk of card data theft. OmniToken is compatible with all payment environments, whether in-store or online. It is used with all Worldpay processing and value-added services, such as account updating, fraud prevention, recurring billing, and back-office software. OmniToken is flexible, interoperable and can be used with other third-party providers to meet your complex enterprise needs. -
34
Tonic
Tonic
Tonic automatically creates mock datasets that preserve key characteristics of secure data sets so that data scientists, developers, and salespeople can work efficiently without revealing their identities. Tonic creates safe, de-identified data from your production data. Tonic models your production data from your production data to help tell a similar story in your testing environments. Safe and useful data that is scaled to match your real-world data. Safely share data across businesses, teams, and borders to create data that is identical to your production data. PII/PHI identification and obfuscation. Protect your sensitive data by proactive protection with automatic scanning, alerts and de-identification. Advanced subsetting across diverse database types. Fully automated collaboration, compliance, and data workflows. -
35
Powertech Encryption IBM i protects sensitive data with strong encryption, tokenization and integrated key management. Powertech Encryption allows organizations quickly and efficiently to encrypt data fields, backups, and IFS files using its intuitive screens and proven technology. With its intuitive screens, proven technology, and database encryption software, organizations can quickly and efficiently encrypt data fields, backups, IFS files, and other files. Powertech Encryption is trusted by organizations around the globe to protect confidential data on IBM i (iSeries and AS/400) as well as data from distributed system from both internal and external hackers.
-
36
RansomDataProtect
DROON
€10 per monthBlockchain provides the most innovative and optimal protection for your sensitive and personal data. RansomDataProtect enables pseudonymization of sensitive and personal data. The CNIL recommends pseudonymizing data to comply with GDPR rules, and to combat theft and leakage sensitive data when it comes to ransomware attacks. The combination of blockchain and variable encryption algorithms ensures that your data is safe and untampered with. The data that has not been masked is still accessible for multiple people to continue working together on the document. RansomDataProtect integrates easily with your files via an add-in for Word, Excel, PowerPoint and Outlook. RansomDataProtect allows you to comply with all the regulations relating to data protection. Remove security vulnerabilities caused by password mismanagement in your company. -
37
Unbound CORE Identity Security
Unbound Security
Authenticate users and protect PKI seamlessly across all devices and locations. With maximum security and minimal impact on the user experience, create virtual enclaves that work both on mobile and desktop. CORE virtual secure encryption SDK allows you to authenticate user access and quickly identify users. CORE protects credentials on any device, mobile, desktop, or server-side. Pure software agility allows you to create virtual smartcards and protect mobile apps. No hardware, no one time password, and no software token are required to integrate strong multi-factor and two-factor authentication into a mobile application. To authenticate employees, replace traditional smartcards by virtual ones. This will reduce operational strain and the total cost of ownership. Protect both machine and human electronic identities, and the root certificate authority that oversees them. Protecting PII with maximum security and best user experience -
38
HushHush Data Masking
HushHush
Businesses today face severe punishment if they fail to meet the ever-increasing privacy standards of regulators and the general public. Vendors must keep up with the latest algorithms to protect sensitive data like PII or PHI. HushHush is at the forefront in privacy protection (Patents US9886593, US20150324607A1, US10339341) thanks to its PII data discovery tool workbench (also known data de-identification software, data masking software, and obfuscation program). It allows you to find sensitive data about your customers and classify it. You can also anonymize it and comply with GDPR and GLBA requirements. To create comprehensive and secure data anonymization solutions, you can use a variety of rule-based atomic addition anonymization components. HushHush components can be used to anonymize both direct identifiers (SSNs, credit cards names, addresses, telephone numbers, etc.). Both fixed and variable algorithms are available for indirect identifiers. -
39
NMTY Enterprise
NMTY
NMTY Enterprise protects all privacy-sensitive data in your organization, whether it is stored on databases or files. NMTY Enterprise can be integrated into your IT environment to anonymize data sources. NMTY Enterprise allows you to anonymize data, regardless of the format it is stored in. This includes databases and individual files. Anonymize data in a database, or in files such as CSV or XML. Data is anonymized at the source. This prevents duplicates of non-anonymized information. The connections to your data sources are encrypted and support integrated authentication. It is possible to directly anonymize images and documents. Our solutions are based on the most recent innovations and can be integrated directly into your processes. We can always expect the best results. -
40
Privacy Analytics
Privacy Analytics
Privacy Analytics offers data anonymization software and services for healthcare and consumer organizations. Privacy Analytics allows you to safely and responsibly use your sensitive data assets for innovation that benefits all. Privacy Analytics allows you to safely de-identify your health data to the highest standards while still preserving its utility. The regulatory deadlines are becoming more stringent. Data requests are becoming more urgent. There is greater pressure to maintain your company's reputation than ever before. The climate surrounding data privacy continues to get more intense. Everybody, from regulators to consumers, is holding organizations accountable. Drug makers are under increasing pressure to disclose clinical data and documents. As the pressure mounts, so does the demand for privacy. Solutions that maximize transparency while protecting the privacy of trial participants are needed. -
41
Private AI
Private AI
Share your production data securely with ML, data scientists, and analytics teams, while maintaining customer trust. Stop wasting time with regexes and free models. Private AI anonymizes 50+ entities PII PCI and PHI in 49 languages, with unmatched accuracy, across GDPR, CPRA and HIPAA. Synthetic data can be used to replace PII, PCI and PHI text in order to create model training data that looks exactly like production data. This will not compromise customer privacy. Remove PII in 10+ file formats such as PDFs, DOCXs, PNGs, and audios to protect customer data and comply privacy regulations. Private AI uses the most advanced transformer architectures for remarkable accuracy right out of the box. No third-party processing required. Our technology outperforms every other redaction service available on the market. Please feel free to request a copy of the evaluation toolkit for you to test with your own data. -
42
eperi Gateway
Eperi
You alone have complete control over the encryption. All Systems - One solution. The patented template concept allows you to use the eperi® Gateway to protect your data for all of your (cloud-based) applications. The eperi®, Gateway allows your employees to continue working normally while it encrypts the data transparently, preserving the central functions (such as sorting and searching) of your applications. Cloud applications can be used while remaining compliant with financial industry regulations, such as privacy-preserving analytics. IoT is a collection of smart machines and products which collect data automatically and independently. You can protect your data and ensure compliance with the law by using encryption. -
43
Acra
Cossack Labs
$10000 per yearIt's easy to prevent data leakage in your app. Acra encryption suite offers data protection in distributed apps, web and mobile applications with PostgreSQL MySQL, KV backends. Regulations (GDPR, HIPAA and PCI DSS) require encryption of sensitive and personal data. It can be tedious to integrate cryptography into distributed applications. This has limited security benefits and requires many architectural trade-offs. Acra is here for that. Acra is a tool that covers 9 data security measures. Acra is designed to protect data from leakage and provide protection throughout the entire data lifecycle. Acra is easy-to-integrate, requires no modifications to the existing code, provides reliable security, and reduces MTTD/MTTR. Acra is an integration library that can encrypt all records with AcraServer key. -
44
SecurDPS Enterprise
comforte AG
By protecting data transfer and usage from the initial data capture until its final destruction, you limit your exposure to attacks, accidents, oversights or unauthorized access. This is done to ensure that these benefits are available throughout the data lifecycle and to help meet compliance objectives faster. Data-centric security requires that you implement a platform which not only offers protection options that fit your specific use cases but also allows for the identification and classification of datasets, and data analytics across them. The solution should be able exceed minimum viable compliance, minimum viable security and deliver maximum agility. The solution must also allow you to easily integrate these capabilities into your existing cyber security infrastructure and enterprise applications. The ease of integration can often be the deciding factor when it comes to determining the costs and risks associated with any data security project. -
45
SecuPi
SecuPi
SecuPi is a data-centric platform that provides a comprehensive security solution. It offers fine-grained control of access (ABAC), Database Activity Monitor (DAM), and de-identification through FPE encryption and masking, both physical and dynamic (RTBF). SecuPi covers a wide range of applications including packaged and home-grown, direct access tools, cloud environments, big data and cloud environments, as well as packaged and homegrown applications. One data security platform to monitor, control, encrypt and classify data across cloud & on-prem without code changes. Platform that is agile and configurable to meet current and future audit and regulatory requirements. Implementation is fast and cost-effective with no source-code changes. SecuPi’s fine-grain controls for data access protect sensitive data, so that users only see the data they are allowed to view. Seamlessly integrates with Starburst/Trino to automate data access policies and protection operations. -
46
Viacryp
Viacryp
Enjoy the convenience of using a Trusted Third Party to carefully pseudonymize personal data so that you can perform analysis within the GDPR framework. Our basic service is to pseudonymize personal data. We use the principles of irreversible pseudonyms, thickening behavior and thickening of words. The pseudonymized information is used by our clients to further process the data. Our filter service allows you to share your personal data in a proportionate manner and respecting privacy. We filter information using a pseudonymized expert whitelist, and only send information about individuals that appear on this list. Viacryp offers privacy advice in relation to the protection and security personal data. Together with our partners we provide advice on the steps that an organization can take to comply with the GDPR frameworks. This includes both technical and organizational and processes measures. -
47
Gallio
Gallio
€89 per monthFace recognition technology is growing exponentially, and the storage of images and videos containing sensitive data poses significant risks. Gallio offers a unique privacy protection solution based on artificial intelligent. Algorithms blur the faces, making them virtually unrecognisable while maintaining image quality. It effectively anonymizes license plate patterns, making them unreadable. It works with license plate patterns all over the world. You can now store and publish images and recordings without fear that someone might recognize a vehicle and sue for privacy infringement. The editor is easy to use and allows you remove blur from selected faces or license plates. Share videos and images to provide evidence and recordings on request to data subjects while protecting their privacy. -
48
iSecurity Field Encryption
Raz-Lee Security
iSecurity Field Encryption provides protection for sensitive data with strong encryption, key management, and auditing. Encryption is essential for protecting confidential information and expediting compliance to PCI-DSS and other state privacy laws. Ransomware can attack any file it can access, including connected devices, mapped network driver, shared local networks, cloud storage services, and cloud storage service that are mapped to infected computers. Ransomware doesn't discriminate. Ransomware encrypts all data files it has access to, even the IFS files. Anti-Ransomware quickly detects cyber threats of high volume from an external source and isolates them. It also protects performance and prevents data from being damaged. -
49
Yandex Key Management Service
Yandex
$0.0230 per monthProtect your secrets, sensitive data, and personal information in the cloud with keys. Create and delete key, set access policies, perform rotation via the Management Console, CLI or API. Yandex KMS supports both symmetric and asymetric cryptography. Use the REST API or RPC to encrypt, decrypt, and sign data using eSignature schemes. Yandex KMS manages access to encrypted data while you control the physical security and reliability of keys. Hardware Security Modules are available. SDKs in Java or Go can be used to encrypt small amounts. The service integrates popular encryption libraries such as the AWS EncryptionSDK and Google Tink to encrypt large amounts of data. Yandex Lockbox integration allows you to encrypt secret data with your own keys. Managed Service for Kubernetes also allows you to protect secrets and data using encryption keys. -
50
Vormetric Data Security Platform
Thales e-Security
Vormetric Data Security Platform makes managing data-at-rest security easy and efficient for your entire organization. The data security platform is extensible and can be used to deploy multiple data security products. It also features centralized key management, tokenization, encryption, and advanced encryption. This data security solution prepares you organization for the next security challenge or new compliance requirements at a low cost. Vormetric Data Security Platform, a single data security platform, is centrally managed to deliver comprehensive data security solutions.