Best iMask Alternatives in 2024
Find the top alternatives to iMask currently available. Compare ratings, reviews, pricing, and features of iMask alternatives in 2024. Slashdot lists the best iMask alternatives on the market that offer competing products that are similar to iMask. Sort through iMask alternatives below to make the best choice for your needs
-
1
Satori
Satori
86 RatingsSatori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements. -
2
DATPROF
DATPROF
Mask, generate, subset, virtualize, and automate your test data with the DATPROF Test Data Management Suite. Our solution helps managing Personally Identifiable Information and/or too large databases. Long waiting times for test data refreshes are a thing of the past. -
3
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security controls in one solution. This includes highly advanced options such as encrypted search and analytics, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. When attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of at 3+ solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner across multiple categories in four markets (Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022). Titaniam is also a TAG Cyber Distinguished Vendor, and an Intellyx Digital Innovator for 2022. In 2022 Titaniam won the coveted SINET16 Security Innovator Award and was also a winner in four categories for the Global Infosec Awards at RSAC2022. -
4
Immuta
Immuta
Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals. -
5
IRI Voracity
IRI, The CoSort Company
IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs. -
6
IRI DMaaS
IRI, The CoSort Company
$1000 per dayIRI Data Masking as a Service is a professional services engagement to secure PII. Step 1: IRI agrees under NDA terms to classify, analyze, and report on the sensitive, at-risk data in your sources. We will discuss an initial cost estimate then hone it with you during data discovery. Step 2: Transfer the unprotected data to a secure on-premise or cloud-based staging area or provide remote, supervised access to IRI to the data sources(s) at issue. We'll use the tools in the award-winning IRI Data Protector suite to mask that data according to your business rules, on an ad hoc or recurring basis. Step 3: Our experts can also move newly-masked data to incremental replicas in production or to lower non-production environments. From either, the data is now safe for analytic initiatives, development, testing, or training. Tell us if you need additional services, like re-ID risk scoring (expert determination) of the de-identified data. This approach provides the benefits of proven data masking solution technology and services without the need to learn and customize new software from scratch. If you do want to use the software in-house, you will have everything pre-configured for easier long-term self-use and modification. -
7
IRI FieldShield
IRI, The CoSort Company
Varies by component/scope IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps. -
8
iScramble
Mage Data
You have the freedom to choose the anonymization method that best suits your needs - including tokenization, encryption, and masking techniques. This will ensure that sensitive data is protected in a delicate balance between security and performance. You can choose from over 60 different anonymization methods to protect sensitive data. Anonymization methods that provide consistent results across datastores and applications will help you maintain referential integrity. Anonymization methods that provide both performance and protection. You can choose to encrypt, tokenize or mask data depending on the use case. There are many ways to anonymize sensitive data. Each method provides adequate security and data usability. Protect sensitive data across data storage and applications, and maintain referential integrity. You can choose from a range of NIST-approved encryption or tokenization algorithms. -
9
IRI DarkShield
IRI, The CoSort Company
5000IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS. -
10
Adaptive
Adaptive
Adaptive is a platform for data security that prevents sensitive data from being exposed to all entities, human and nonhuman. It features an agentless architecture with zero network reconfiguration, and can be deployed on-premises or in the cloud. The platform allows organizations to share privileged data access without sharing credentials, improving security posture. It allows for just-in time access to a variety of data sources including databases, cloud infrastructure, data warehouses and web services. Adaptive facilitates non-human access to data by connecting third-party ETL pipelines or tools through a central interface, without exposing credentials for data sources. The platform offers data masking and tokenization for nonprivileged users, without changing access workflows. The platform provides a comprehensive audibility by integrating identity-based audit trails into all resources. -
11
BizDataX
Ekobit
BizDataX provides production-level data masking. It allows compliance with GDPR, and other regulations by masking customers' identities while preparing data to be used by testers and developers. The risk of using production data is greatly reduced by using anonymized/masked data. You should be focusing on business requirements, policy management, sensitive data governance, and other regulations. You will need to track the inventory of databases, data sources, tables, and where sensitive data is located. Manage large customer databases and exchange information with online partners shops and parcel delivery businesses. Data anonymization is a way to ensure regulatory compliance in the management of medical records. -
12
TCS MasterCraft DataPlus
Tata Consultancy Services
Data management software is used mainly by enterprise business teams. Data management software must be intuitive, automated, and intelligent. Data management activities must also adhere to specific industry and data protection regulations. Data must be accurate, consistent, high quality, and easily accessible to enable business teams to make informed, data-driven strategic business decisions. Integrates data privacy, data quality management and test data management. Service engine-based architecture allows for efficient handling of growing data volumes. Uses a user-defined function framework with python adapter to handle niche data processing needs. This provides a minimal layer of governance for data quality and privacy management. -
13
HushHush Data Masking
HushHush
Businesses today face severe punishment if they fail to meet the ever-increasing privacy standards of regulators and the general public. Vendors must keep up with the latest algorithms to protect sensitive data like PII or PHI. HushHush is at the forefront in privacy protection (Patents US9886593, US20150324607A1, US10339341) thanks to its PII data discovery tool workbench (also known data de-identification software, data masking software, and obfuscation program). It allows you to find sensitive data about your customers and classify it. You can also anonymize it and comply with GDPR and GLBA requirements. To create comprehensive and secure data anonymization solutions, you can use a variety of rule-based atomic addition anonymization components. HushHush components can be used to anonymize both direct identifiers (SSNs, credit cards names, addresses, telephone numbers, etc.). Both fixed and variable algorithms are available for indirect identifiers. -
14
Imperva Data Masking
Imperva
Data masking is a method to create a fake but real version of your organization's data. The goal of data masking is to protect sensitive data while offering a functional alternative for when real data is not required, such as in user training, software testing, and sales demos. Data masking processes alter the data's values while maintaining the same format. The goal is to create a version which cannot be deciphered, reverse engineered, or modified. There are many ways to alter data, including character shuffling and word or character substitution. Data masking can solve several critical threats, including data loss, data exfiltration and insider threats. Cloud adoption reduces the data risk. Data is rendered useless to attackers while still maintaining many of its functional properties. It allows data sharing with authorized users such as testers or developers without exposing production data. -
15
Informatica Dynamic Data Masking
Informatica
Your IT organization can use flexible masking rules to limit sensitive data with flexible masking rules based upon the authentication level of a user. It ensures compliance by blocking, auditing and alerting users, IT personnel and outsourced teams that access sensitive information. Data masking solutions can be easily customized to meet different regulatory or business needs. Protect sensitive and personal information while supporting cloud-based, offshoring and outsourcing initiatives. Secure big data using dynamic masking of sensitive data in Hadoop. -
16
Oracle Data Masking and Subsetting
Oracle
$230 one-time paymentDue to increasing security threats and expanding privacy regulations, it is imperative to limit the exposure of sensitive data. Oracle Data Masking and Subsetting allows database customers to improve security, speed compliance, and lower IT costs. It sanitizes production data for testing, development, and any other activities and easily eliminates unnecessary data. Oracle Data Masking and Subsetting allows for entire copies or subsets to be extracted from the database and obfuscated. This data can then be shared with business partners. Assuring continuity of applications, the integrity of the database is maintained. Application Data Modeling automatically detects columns in Oracle Database tables that contain sensitive information using built-in discovery patterns like national identifiers, credit cards numbers, or other personally identifiable information. It automatically detects parent-child relationships in the database. -
17
Randtronics DPM easyData
Randtronics
DPM easyData is a high performance data spoofing and de-identification engine. Data spoofing techniques include masking, tokenization. anonymization, pseudonymization, encryption, and anonymization. DPM data spoofing processes, which replace sensitive data or parts with non-sensitive counterparts (creates fake information), is a powerful tool for data protection. DPM easyData, a software data security solution, allows web and database server applications and databases tokenize and anonymize data. It also applies masking policies to unauthorized users when retrieving sensitive information. The software provides a high degree of granularity by allowing users to be granted access to specific protection policies and the operations they can perform with them. DPM easyData is highly customizable and can protect and tokenize many types of data. The software is flexible, so users can define any input data or token format they wish. -
18
K2View believes that every enterprise should be able to leverage its data to become as disruptive and agile as possible. We enable this through our Data Product Platform, which creates and manages a trusted dataset for every business entity – on demand, in real time. The dataset is always in sync with its sources, adapts to changes on the fly, and is instantly accessible to any authorized data consumer. We fuel operational use cases, including customer 360, data masking, test data management, data migration, and legacy application modernization – to deliver business outcomes at half the time and cost of other alternatives.
-
19
DOT Anonymizer
DOT Anonymizer
€488 per monthMask your personal information to ensure it looks and behaves like real data. Software development needs realistic test data. DOT Anonymizer masks test data and ensures its consistency across all data sources and databases. The use of personal data or identifying information outside of production is prohibited (development, testing and training, BI, external services providers, etc.). Data leakage is a major concern. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. You can retain the original format of data by anonymizing it. Your teams can work with fictional, but realistic data. Manage your data sources to maintain their usability. Use DOT Anonymizer from your own applications. Consistency in anonymizations across DBMS and platforms. To ensure realistic data, maintain relations between tables. Anonymize any database type and file, such as CSV, XML or JSON. -
20
Dataguise
Dataguise
Data privacy and security should not be a hindrance to your analytics-driven innovation efforts. Dataguise offers flexible encryption and masking options to protect sensitive data. This will ensure that your business is protected. Fast-track delivery of data sets can be achieved for analysis in real time, allowing for better insights and better decisions. Customers of Dataguise have many and changing needs. We know that our customers need more than just the solutions and services we offer. This is why we have built a strong network with carefully selected partners. This executive guide will show you how to maximize data value while protecting data privacy. Dataguise is more reliable than other data discovery tools, has a longer history, supports a wider range of data types, repositories, delivers lower false positive results, and scans data at a larger scale more reliably. Dataguise gives businesses the confidence to act in the best interest of their data. -
21
Solix EDMS
Solix Technologies
The Solix Enterprise Database Management Suite (Solix EDM) brings together all the tools necessary for an effective Information Lifecycle Management program (ILM). The platform provides industry-leading database archiving and test data management, as well as data masking and application retirement solutions. Solix EDMS was designed to reduce costs, improve application performance, availability, and meet compliance goals. It provides universal access to all archived information for business users via full-text search and structured SQL queries, forms, reports, and forms. Solix EDMS allows you to quickly identify historical data that is not frequently accessed from production applications and then'move' it into a secure archive with data integrity, access and preservation. Retention management stores archived data for a specified period of time and purges it automatically or manually if the data retention policy is met. -
22
Cloud Compliance
Cloud Compliance
With the most comprehensive range of products, you can implement privacy compliance and data security in Salesforce. A thorough data inventory and risk assessment are essential for privacy programs to be successful. Most organizations overlook data or struggle with spreadsheets and manual processes. Our Personal Data Inventory product automates and streamlines DPIA and enterprise data inventories flows. Your organization will be able to easily have a clear risk assessment and a data inventory. Many organizations are experiencing an increase in privacy rights requests. It is difficult, inconsistent, and error-prone to respond to these requests manually, increasing the risk of non-compliance. Our Privacy Rights Automation product allows self-service and automates all privacy related activities. A standardised and error-free solution to reduce the risk of non-compliance -
23
Informatica Intelligent Data Management Cloud
Informatica
Our AI-powered Intelligent Data Platform, which is modular and comprehensive, is the best in the industry. It allows you to unlock the potential of data in your enterprise and empowers you with the ability to solve complex problems. Our platform sets a new standard in enterprise-class data management. We offer best-in-class products, and an integrated platform that unifies them. This allows you to power your business with intelligent information. You can connect to any data source, and scale with confidence. A global platform processes more than 15 trillion cloud transactions each month. A global platform that delivers trusted data at scale across all data management use cases will help you future-proof your business. Our AI-powered architecture supports integration patterns, allowing you to grow and develop at your own pace. Our solution is modular and API-driven. -
24
Informatica Persistent Data Masking
Informatica
While protecting privacy, context, form, as well as integrity, must be retained. Data protection can be enhanced by de-sensitizing sensitive data and de-identifying it. Pseudonymize data for privacy compliance, analytics, and analytics. Obscured data preserves context and referential integrity, so that the masked data is usable in testing, analytics, and support environments. Informatica Persistent data masking is a high-performance, scalable data masking solution that protects confidential data such as credit card numbers and addresses. It creates realistic, de-identified data that can then be shared internally or externally. It can also be used to reduce the risk of data breaches occurring in nonproduction environments, create higher-quality test data, streamline development projects, and comply with data privacy regulations. -
25
IRI Data Protector Suite
IRI, The CoSort Company
Renowned startpoint security software products in the IRI Data Protector suite and IRI Voracity data management platform will: classify, find, and mask personally identifiable information (PII) and other "data at risk" in almost every enterprise data source and sillo today, on-premise or in the cloud. Each IRI data masking tool in the suite -- FieldShield, DarkShield or CellShield EE -- can help you comply (and prove compliance) with the CCPA, CIPSEA, FERPA, HIPAA/HITECH, PCI DSS, and SOC2 in the US, and international data privacy laws like the GDPR, KVKK, LGPD, LOPD, PDPA, PIPEDA and POPI. Co-located and compatible IRI tooling in Voracity, including IRI RowGen, can also synthesize test data from scratch, and produce referentially correct (and optionally masked) database subsets. IRI and its authorized partners around the world can help you implement fit-for-purpose compliance and breach mitigation solutions using these technologies if you need help. -
26
Anonomatic
Anonomatic
Store, anonymize mask, mine, redact and share sensitive data securely with 100% accuracy and complete international data privacy compliance. You can save time and money by separating PII from other data. Embed PII Vault into your innovative solutions to reduce time to market and deliver the most PII-secure solutions available. Unlock data for more accurate and targeted messages. All data can be anonymized in one simple step before it reaches the platform. Once anonymized, Poly- Anonymization™ allows you to combine disparate anonymous data sets on an individual basis without receiving any PII. Replace PII by a compliant, multi-valued, non-identifying key that is used to link anonymous data from multiple organizations. -
27
This suite of integrated encryption tools will help you protect your database and file data from misuse, and comply with government and industry regulations. IBM Guardium Data Encryption is an integrated suite of products based on a common architecture. These highly-scalable products provide encryption, tokenization and data masking capabilities, as well as key management, to help protect and manage access to databases, containers and files across the hybrid multicloud, securing assets in cloud, virtual, Big Data and on-premise environments. By encrypting database and file data using features such as data masking, tokenization and key rotation, organizations can ensure compliance with industry and government regulations, such as GDPR, CCPA and PCI DSS. Guardium Data Encryption features, such as data access audit logging and tokenization, data masking, and key management, help organizations meet regulations like HIPAA, CCPA, or GDPR.
-
28
Okera
Okera
Complexity is the enemy of security. Simplify and scale fine-grained data access control. Dynamically authorize and audit every query to comply with data security and privacy regulations. Okera integrates seamlessly into your infrastructure – in the cloud, on premise, and with cloud-native and legacy tools. With Okera, data users can use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives. -
29
Data Secure
EPI-USE
Protect sensitive SAP data. Find solutions to your SAP data security problems and comply with data privacy legislation, such as the EU's. General Data Protection Regulation (GDPR), South Africa’s POPI Act, and the California Consumer Privacy Act of 2018(CCPA) are all addressed with Data Secure™. Data security is essential in today's business environment. Data Secure™, a part of EPI USE Labs' Data Sync Manager (DSM) suite, solves all your data security problems. Data Secure is a comprehensive protection system that includes pre-defined masking rules. These rules can be used to scramble any non-key SAP field in any client-dependent SAP tables in a variety of ways (such as mapping table view, constant value, clear field), These rules can be extended to meet your security requirements. Data Secure enables your company to meet all well-known data privacy and protection standards such as the General Data Protection Regulation (GDPR), Sarbanes Oxley and the BDSG (Bundesdatenschutzgesetz). -
30
Randtronics DPM easyCipher
Randtronics
Randronics DPM EasyCipher provides Transparent Data Encryption lock-box protection for files, folders and databases. The contents are automatically decrypted by authorized users. TDE-protected items are locked or unlocked like a lockbox. DPM easyCipher, a centrally-managed, policy-based encryption solution, allows an organization standardize its encryption by defining and implementing encryption policies on any server or laptop that has a DPM easyCipher Agent installed. DPM easyCipher secures all files and directories on servers and laptops. DPM easyCipher protects database servers, web/app server, and file servers. DPM easyCipher is a database-native TDE solution that can be extended or replaced by database vendors in order to secure their DB products. Use easyCipher for information outside the database. -
31
Nymiz
Nymiz
Anonymizing data manually takes time away from actual work. When data is not easily shared, information becomes trapped, leading to poor knowledge sharing and silos within an organization. Constant worry about whether shared data is in compliance with ever-changing regulations (GDPR, CCPA, HIPAA & others). Nymiz anonymizes data using reversible and irreversible methods. The original data are replaced with asterisks or tokens to maintain privacy and value while improving privacy. We achieve superior results by recognizing context-specific information like names, phone number, and social security number. Additional security layer on the data level. Information that is anonymous or pseudonymized has no practical value when it is exposed or stolen by a security breach. -
32
AnalyticDiD
Fasoo
De-identify sensitive information, including personally identifiable data (PII), by pseudonymization or anonymization, for secondary use and analysis, such as comparative efficacy studies, policy assessments, and life science research. This is crucial as organizations collect and compile large volumes of business data in order to understand trends, gain insight into customer preferences, or develop new innovations. Regulations like HIPAA and the GDPR require data to be deidentified. However, many deidentification tools are designed to remove personal identifiers but make it difficult for users of the data. Data anonymization and pseudonymization can be used to transform PII into data which cannot be used for identification. This ensures privacy. This allows you analyze large data sets without violating privacy laws. De-identify your data using a variety of privacy models and methods from the broad area of statistics and data de-identification. -
33
Wizuda
Wizuda
$9.99/month/ user Innovative Solutions that will revolutionize the way your organization shares data externally and internally. Wizuda MFT is designed with efficiency, security, compliance, and efficiency at its core. It enables IT to manage critical data movement within your organization as well as with external parties from one central solution. Wizuda MFT scales to your business and gives you full accountability for all file transfer operations. Share sensitive data with clients and employees of your company in a compliant, secure and compliant manner. File size limits are removed and encryption is enabled by default. This makes it possible to eliminate insecure alternatives like USBs. Wizuda users have the additional flexibility to send emails directly from their Outlook email or via the secure web portal. Wizuda Virtual Data Rooms offer a secure online repository that allows document storage, collaboration, and distribution for your business. Wizuda Virtual Data Rooms are easy to set up and maintain. -
34
CipherTrust Data Security Platform
Thales Cloud Security
Thales has been pushing the boundaries with the CipherTrust Data Security Platform. This platform removes complexity from data security, speeds up compliance time, and protects cloud migrations. This next-generation platform, built on a modern microservices architecture, was designed for cloud computing. It includes Data Discovery and Classification and fuses together the best features of the Vormetric Data Security Portal, KeySecure, and connector products. CipherTrust Data Security Platform combines data classification, data protection, unprecedented granular access control, and centralized key management all in one platform. This means that your business will have fewer resources for data security operations, fewer compliance controls, and a significantly lower risk. The CipherTrust Security Platform integrates a range of data-centric security products that combine data protection, discovery, and control into one platform. -
35
InfoSum
InfoSum
InfoSum unlocks data’s unlimited potential. InfoSum uses patented privacy-first technology to connect customer records between companies without sharing data. InfoSum is trusted by customers in financial services, content distribution and connected television as well as gaming, entertainment, and gaming. It seamlessly and compliantly connects customer data to other partners via privacy-safe, permission-controlled data networks. InfoSum's technology has many uses, from the standard 'data-onboarding" to more complex use cases that allow the creation of own identity platforms, the development and sale of new products and data, and the creation of completely new markets. InfoSum was established in 2015. InfoSum was founded in 2015. The company is poised to experience exponential growth. -
36
IRI CoSort
IRI, The CoSort Company
From $4K USD perpetual useFor more four decades, IRI CoSort has defined the state-of-the-art in big data sorting and transformation technology. From advanced algorithms to automatic memory management, and from multi-core exploitation to I/O optimization, there is no more proven performer for production data processing than CoSort. CoSort was the first commercial sort package developed for open systems: CP/M in 1980, MS-DOS in 1982, Unix in 1985, and Windows in 1995. Repeatedly reported to be the fastest commercial-grade sort product for Unix. CoSort was also judged by PC Week to be the "top performing" sort on Windows. CoSort was released for CP/M in 1978, DOS in 1980, Unix in the mid-eighties, and Windows in the early nineties, and received a readership award from DM Review magazine in 2000. CoSort was first designed as a file sorting utility, and added interfaces to replace or convert sort program parameters used in IBM DataStage, Informatica, MF COBOL, JCL, NATURAL, SAS, and SyncSort. In 1992, CoSort added related manipulation functions through a control language interface based on VMS sort utility syntax, which evolved through the years to handle structured data integration and staging for flat files and RDBs, and multiple spinoff products. -
37
Doculayer
Doculayer
You can forget about manual content classification or data entry. Doculayer.ai provides a configurable workflow that includes document processing services such as OCR, document type classification and topic classification, as well data extraction and masking. Doculayer.ai allows business users to take control of their learning and training by providing an intuitive user interface that makes labeling documents and data easy. Our hybrid data extraction approach allows machine learning models to be combined with patterns, rules, and library scripts to produce better results in less time. Data masking is an option to anonymize or pseudonymize sensitive data in documents. Doculayer.ai provides document intelligence to your Content Services Platform and Business Process Management systems. Your existing IT environment can be augmented for document processing by machine learning, natural language processing and computer vision technologies. -
38
PHEMI Health DataLab
PHEMI Systems
Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more -
39
Viacryp
Viacryp
Enjoy the convenience of using a Trusted Third Party to carefully pseudonymize personal data so that you can perform analysis within the GDPR framework. Our basic service is to pseudonymize personal data. We use the principles of irreversible pseudonyms, thickening behavior and thickening of words. The pseudonymized information is used by our clients to further process the data. Our filter service allows you to share your personal data in a proportionate manner and respecting privacy. We filter information using a pseudonymized expert whitelist, and only send information about individuals that appear on this list. Viacryp offers privacy advice in relation to the protection and security personal data. Together with our partners we provide advice on the steps that an organization can take to comply with the GDPR frameworks. This includes both technical and organizational and processes measures. -
40
Lenses
Lenses.io
$49 per monthAllow everyone to view and discover streaming data. Up to 95% of productivity can be increased by sharing, documenting, and cataloging data. Next, create apps for production use cases using the data. To address privacy concerns and cover all the gaps in open source technology, apply a data-centric security approach. Secure and low-code data pipeline capabilities. All darkness is eliminated and data and apps can be viewed with unparalleled visibility. Unify your data technologies and data meshes and feel confident using open source production. Independent third-party reviews have rated Lenses the best product for real time stream analytics. We have built features to allow you to focus on what is driving value from real-time data. This was based on feedback from our community as well as thousands of engineering hours. You can deploy and run SQL-based real-time applications over any Kafka Connect, Kubernetes or Kubernetes infrastructure, including AWS EKS. -
41
Privacy1
Privacy1
$159 per monthPrivacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level -
42
TrueVault
TrueVault
TrueVault is the only data security company that is solely focused on protecting Personally Identifiable Information. TrueVault separates consumer identity and consumer behavior to eliminate compliance risks and liability. This allows companies to only access the data they need. Organizations are increasing their risk and liability as they collect and store more data in order to propel their businesses forward. Our software, designed by an attorney, will guide you step by step to CCPA compliance. TrueVault Polaris can help your business comply with CCPA regulations, no matter if it's an online store or SaaS. We'll refund your entire payment if we can't. No questions asked. TrueVault Polaris will guide you through every step, from getting compliant the first time to processing consumer inquiries. You can file your taxes online to bring your business into compliance. -
43
Rectify
Rectify
$49.99 per user per monthSecure redaction for document distribution and privacy automation Rectify uses privacy-enabled AI to automate the deletion of private information during data sharing. Organizations can reduce the amount of human involvement needed to identify and remove consumers identities, trade secrets and IP from data sets being sent to third parties. Our experts have protected millions of pages and counting. Automate data protection using "privacy enabled AI" deidentification. Rectify's secure Ai redaction allows you to get rid of manual redaction. It can be dangerous to share sensitive information without using a secure tool. Rectify offers a complete redaction solution. It is essential to choose the right redaction service for your business' security and privacy. Rectify's secure Redaction makes it easy to protect your privacy. -
44
Vormetric Data Security Platform
Thales e-Security
Vormetric Data Security Platform makes managing data-at-rest security easy and efficient for your entire organization. The data security platform is extensible and can be used to deploy multiple data security products. It also features centralized key management, tokenization, encryption, and advanced encryption. This data security solution prepares you organization for the next security challenge or new compliance requirements at a low cost. Vormetric Data Security Platform, a single data security platform, is centrally managed to deliver comprehensive data security solutions. -
45
All of our work is focused on making data accessible and safe for businesses. Our Safe Haven platform empowers customer intelligence, engages customers on a large scale, and opens up new opportunities for business growth. Our platform gives enterprises full control over how data is accessed and used with industry-leading software solutions for data activation, identity, and collaboration. You can gain access to data, generate valuable business insights, and drive revenue. However you retain full control over data access and use at all times. You can accurately address your target audiences across any channel, platform or publisher, and safely translate data between identity space spaces to improve results. You can protect your customer data using the most advanced privacy-preserving technologies and advanced techniques that allow for data movement to be minimized while still allowing insight generation.
-
46
Forcepoint SimShield
Forcepoint
Secure data transfer to training and testing environments. The U.S. NCDSMO Baseline is available for SABI environments since 2009. It supports native support for DIS and HLA, TENA and RTP, and conforms to NSA Raise the Bar guidelines and NIST guidelines. The High Performance Computing Modernization Program Office, (HPCMPO), evaluated the connection to Defense Research & Engineering Network and Secure Defense Research & Engineering Network. SimShield allows fully automated, predictable and controlled two-way communication. It also allows for the sanitization and control of events across segmentsed, air-gapped security areas. Always have the latest features without additional cost, vs. Government-Off-The-Shelf (GOTS) solutions. Multiple national agencies and coalition forces can be trained simultaneously in one, real-world environment. Sharing of sanitized information is a faster way to detect and correct errors during Research, Development, Test & Evaluation. -
47
Apache Atlas
Apache Software Foundation
Atlas is a flexible and extensible set core foundational governance services that enable enterprises to efficiently and effectively meet their compliance requirements within Hadoop. It also allows integration with the entire enterprise data ecosystem. Apache Atlas offers open metadata management and governance capabilities that allow organizations to create a catalog of their data assets, classify, govern and provide collaboration capabilities around these assets for data scientists, analysts, and the data governance group. Pre-defined types to manage various Hadoop and non Hadoop metadata. Ability to create new types to manage metadata. Types can inherit from other types, and can have simple attributes, complex attributes, and object references. Type instances, also known as entities, are able to capture metadata object details and their relationships. REST APIs allow for easier integration with types and instances. -
48
OpenText Voltage SecureData
OpenText
Secure sensitive data wherever it flows - on premises, in the cloud and in big data analytics platforms. Voltage encryption provides data privacy protection and neutralizes data breaches. It also drives business value through secure data usage. Data protection builds customer trust, and enables compliance with global regulations such as GDPR, CCPA and HIPAA. Privacy regulations recommend anonymization, pseudonymization and encryption to protect personal data. Voltage SecureData allows enterprises to de-identify structured data and supports the use of data within its protected state to safely drive business value. Secure data flows through your enterprise without gaps, encryption, or overhead. SecureData supports a wide range of platforms and encrypts data using any language. Structured Data Manager integrates SecureData to allow businesses to easily and continuously protect data all through its lifecycle, from discovery through encryption. -
49
Oracle Advanced Security
Oracle
Oracle Advanced Security can be used to encrypt application tablespaces and prevent out-of band access to sensitive data. Redaction policies help to prevent sensitive data from being spread and ensure compliance with data protection regulations. Transparent Data Encryption prevents potential attackers from bypassing the database to read sensitive information directly from storage. This is done by enforcing data at rest encryption in the database layer. To protect sensitive data, you can encrypt individual data columns, entire tablesspaces, backups, and database exports. Data Redaction is an extension of TDE. It reduces the risk of data being exposed in applications by redacting sensitive information before it leaves the database. Redaction can be partial or complete to prevent large-scale extraction of sensitive information into spreadsheets and reports. Encryption is implemented at database kernel level, eliminating any need to make changes to applications. -
50
Imperva Data Security Fabric
Imperva
Protect data at scale using a multicloud, hybrid, enterprise-class security solution for all types of data. Extend the data security across hybrid, multicloud and on-premises environments. Discover and classify unstructured, semi-structured & structured data. Prioritize data risks for incident context as well as additional data capabilities. Centralize data management via a single data service or dashboard. Protect data from exposure and avoid breaches. Simplify data-centric compliance, governance, and security. Unify the view to gain insight into at-risk data, users and data. Monitor Zero Trust and policy enforcement. Automated workflows and automation can save you time and money. Support for hundreds file shares and data repositories, including public, datacenter, and third-party cloud service. Cover your immediate needs and future integrations, as you transform or extend cloud use cases.