Alternatives to Data Secure

Compare Data Secure alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Data Secure in 2026. Compare features, ratings, user reviews, pricing, and more from Data Secure competitors and alternatives in order to make an informed decision for your business.

  • 1
    Feroot

    Feroot

    Feroot Security

    Feroot Security is a global leader in AI-powered website compliance and security. Feroot AI protects websites and web applications from hidden threats while enforcing compliance with PCI DSS 4.0.1, HIPAA rules on online tracking technologies, CCPA/CPRA, GDPR, CIPA, and 50+ laws and standards. The Feroot AI Platform replaces manual compliance work with continuous automation, delivering real-time protection and audit-ready evidence in minutes. Feroot unifies JavaScript behavior analysis, web compliance scanning, third-party script monitoring, consent enforcement, and data privacy posture management to stop Magecart, formjacking, and unauthorized tracking. Trusted by enterprises, healthcare providers, retailers, SaaS platforms, payment service providers, and public sector organizations. Feroot AI solutions include PaymentGuard AI, HealthData Shield AI, AlphaPrivacy AI, CodeGuard AI, and MobileGuard AI. Visit feroot for more information.
    Compare vs. Data Secure View Software
    Visit Website
  • 2
    ArcTitan

    ArcTitan

    TitanHQ

    ArcTitan is an email archiving and email data protection (EDP) solution allowing users to securely archive emails and simply retrieve them. ArcTitan is compliant, fast, secure, and M365 friendly. You can Save up to 75% of email storage space and costs with lightning fast search and retrieval. Significantly enhances Microsoft 365 email Search and Storage functionality with cost and time savings. With ArcTitan, our Cloud-Based Archiving Solution, users can fully offload their email storage requirements to the cloud. Email Archiving provides businesses with unlimited archiving of both inbound and outbound mail, as well as attachments, folders, calendar entries and contacts. The main features of our business email archiving solution include lightning fast search and retrieval, ultimate scalability, and full compliance with GDPR, eDiscovery, Sarbanes–Oxley, HIPAA, and other legislation for e-discovery, retention and audit. Book a demo today.
  • 3
    IRI FieldShield

    IRI FieldShield

    IRI, The CoSort Company

    IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones.
  • 4
    HushHush Data Masking
    Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms.
  • 5
    IBM Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • 6
    Privacera

    Privacera

    Privacera

    At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™.
  • 7
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
    Starting Price: $159 per month
  • 8
    Informatica Dynamic Data Masking
    Your IT organization can apply sophisticated masking to limit sensitive data access with flexible data masking rules based on a user’s authentication level. Blocking, auditing, and alerting your users, IT personnel, and outsourced teams who access sensitive information, it ensures compliance with your security policies and industry and civil privacy regulations. Easily customize data-masking solutions for different regulatory or business requirements. Protect personal and sensitive information while supporting offshoring, outsourcing, and cloud-based initiatives. Secure big data by dynamically masking sensitive data in Hadoop.
  • 9
    Nymiz

    Nymiz

    Nymiz

    Hours spent anonymizing data manually is time taken away from actual work. When data isn’t easily shareable, information gets trapped, creating silos within the organization and leading to poor knowledge management. The constant worry of whether shared data is compliant with ever-evolving regulations (GDPR, CCPA, HIPAA & more). Nymiz securely anonymizes personal data, through reversible or irreversible methods. The original data is replaced with asterisks, tokens or synthetic surrogates to improve privacy while maintaining the value of the information. By recognizing context-specific data like names, phone numbers, and social security numbers, we achieve superior results compared to tools that lack artificial intelligence capabilities. Additional security layer at the data level. Anonymized or pseudonymized information has no practical value if it is stolen through a security breach or exposed by human errors.
  • 10
    Viacryp

    Viacryp

    Viacryp

    Experience the convenience of a Trusted Third Party ( TTP ) for the careful pseudonymization of personal data, so that you can perform data analysis within the framework of the GDPR. Our basic service consists of pseudonymizing personal data. For this, we apply the principles of irreversible pseudonyms and thickening of behavior. The pseudonymized data is the source of further processing by our clients. Our filter service offers the possibility to share personal data proportionally and therefore with respect for privacy. We filter the information based on an expertly pseudonymized whitelist and only forward the information of individuals who appear on the whitelist. Viacryp provides privacy advice regarding the protection and security of personal data. Together with our partners, we advise on the measures to be taken as an organization to comply with the frameworks of the GDPR. This concerns both technical measures and organizational and process measures.
  • 11
    iSecurity Safe-Update

    iSecurity Safe-Update

    Raz-Lee Security

    iSecurity Safe-Update protects IBM i business critical data against updates by unauthorized programs. Such programs are those who come from a library which is not used to store production programs, file editors, DFU and Start SQL (STRSQL). It ensures that updates are made by pre-confirmed programs or by programs that are not known as file editors. Government and industry regulations, including Sarbanes-Oxley (SOX), GDPR, PCI, and HIPAA, stipulate measures that companies must take to ensure proper data security and monitoring. ​They require that only specifically permitted programs can make updates to business-critical data in production environments. Safe-Update guards against unauthorized updates by dangerous programs – programs were not designed for the organization’s business rules and do not comply with them. If an unauthorized update is attempted, a window appears requesting the entry of a ticket.
  • 12
    WebsitePolicies

    WebsitePolicies

    WebsitePolicies

    Create a privacy policy custom-tailored to your needs in minutes to make your websites and apps compliant with the laws across multiple countries and legislations. Most countries have privacy laws to protect their citizens' personal information. Avoid hefty fines and claims that can be imposed on you and your business for non-compliance with General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), California Online Privacy Protection Act (CalOPPA), Children's Online Privacy Protection Act (COPPA), And many more privacy laws around the world. If you monitor your website traffic, display ads, have affiliate links or accept payments, we'll make sure your privacy policy meets all the necessary requirements to comply with Amazon Associates, Google Analytics, Google AdSense. Google Play Store, PayPal, Stripe and more. Every privacy policy that we generate is unique and built around the information you provide for the best results.
    Starting Price: $29.95 per policy
  • 13
    Rectify

    Rectify

    Rectify

    Automating privacy with secure redaction for document distribution. Rectify leverages privacy-enabled artificial intelligence to automate the removal of private information when data sharing occurs. We help organizations decrease the human involvement required to identify and remove consumer identities, trade secrets, IP and other private data in data sets that are being sent to third parties. Our experts have protected tens of millions of pages, and counting. Automating data protection with "privacy-enabled AI" deidentification. Break free from manual redaction with Rectify's secure AI redaction. The consequences of sharing sensitive information without using a secure redaction tool can be daunting. Rectify provides a complete end-to-end solution for your redaction needs. Choosing the right redaction service is crucial to the security and privacy of your business. Automate privacy with Rectify's secure redaction.
    Starting Price: $49.99 per user per month
  • 14
    AnalyticDiD
    De-identify sensitive data, including personally identifiable information (PII), through pseudonymization and anonymization for secondary use or analysis, such as comparative effectiveness studies, policy assessment, and life sciences research. This is critical as organizations gather and compile large amounts of business data to understand trends, gain insights into customer preferences, and develop new innovations. Regulations such as HIPAA and GDPR require that data be de-identified, but the challenge is that many de-identification tools focus on eliminating personal identifiers, but make it difficult to use the data. Transform PII into data that cannot be used to identify data while ensuring privacy using data anonymization and pseudonymization techniques. This allows you to effectively analyze large amounts of data without violating privacy regulations. De-identify data using selected methods and privacy models from broad areas of data de-identification and statistics.
  • 15
    PHEMI Health DataLab
    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden. PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools.
  • 16
    Dynamics 365 Customer Insights
    Reduce cost-per-conversion using AI-driven insights and automated workflows with personalized recommendations that maximize customer lifetime value. Easily balance privacy and personalization with consent data that’s automatically updated and classification labels that help keep information secure. Ingest transactional, behavioral, and demographic data to create deep insights and complete, up-to-date customer profiles that honor customer consent. Shorten sales cycles, reduce churn, and keep customers for life by acting on customer signals and feedback in real time. Exceed privacy standards and comply with the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) regulations and accessibility guidelines. The enterprise-grade solution has received more than 70 security and compliance certifications including ISO, EU Model Clauses, HITRUST, SOC, HIPAA, FERPA, and FedRAMP.
    Starting Price: $1,000 per tenant per month
  • 17
    NetSfere

    NetSfere

    Infinite Convergence

    NetSfere is the leading enterprise mobile messaging service that provides all preferred means of communication - text, video, and voice - all in one encrypted platform. NetSfere provides industry-leading security and message delivery capabilities, including global cloud-based service availability, device-to-device encryption, location-based features and administrative controls. NetSfere is also compliant with regulatory requirements, including the Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR), Sarbanes-Oxley and others. Designed to meet the industry-specific challenges your organization is up against, NetSfere's next-generation approach allows employees to safely communicate business information in real-time via a user-friendly Web interface or mobile messaging app.
    Starting Price: $7 per user per month
  • 18
    SAS for Personal Data Protection
    An end-to-end approach to identifying, governing and protecting personal data. Not only do customers and employees depend on you to protect their personal data, but certain regulations, including the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), require you to do so to avoid harsh penalties. That’s why having the right technology in place is so important. SAS helps you with every step of the process, from gaining access to data sources to auditing the results. Before you can provide the high level of data protection needed to comply with regulations, you first need the ability to locate your data and securely access it. Locate data across different systems and networks, identify personal data and start categorizing the different types of data you have, all from a unified environment. Blend and analyze data from many different file types, including data in unstructured or poorly structured formats, such as social media and web log data.
  • 19
    Control.My.ID

    Control.My.ID

    Control.My.ID

    Control.My.ID for Consumers works by collecting information from numerous online sources to provide you a comprehensive view of your privacy and data security. You can monitor and review this data then decide what you want to do about it! Control.My.ID for Enterprises ensures your company is meeting all privacy regulations and keeps an auditable trail for you. Manage all your Data Subject Requests in one place, ensure they are being handled, and become more efficient and ensure regulatory compliance. It’s not easy managing your enterprise. Each state is enacting their own laws and all have different laws and regulations around consumer PII. Each region has their own rules about how you treat your customer’s data such as the CCPA/CPRA in California or the ADD Act at the US federal level or the GDPR in the European Union. Control.My.ID can also help with privacy by design decisions and privacy impact assessments.
    Starting Price: $8 per month
  • 20
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 21
    Magier

    Magier

    Magier

    Whatever your privacy needs, our AI keeps your data safe. Businesses struggle to keep up with evolving privacy regulations, risking penalties and loss of customer trust. Sensitive information is at risk of being exposed when interacting with AI, raising concerns over data privacy. Organizations find it difficult to control how their data is processed and used by AI systems, leading to potential misuse. Our platform uses AI to automatically identify and protect sensitive information, ensuring your data remains secure. Stay ahead of data privacy regulations by utilizing our platform to meet the latest compliance standards, such as GDPR and CCPA. Automatically redact sensitive information in real time while ensuring seamless interactions and maintaining data integrity. Tailor our privacy solutions to meet your business's unique needs, with flexible options for data protection and redaction.
    Starting Price: $25 per month
  • 22
    Oracle Data Masking and Subsetting
    The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
    Starting Price: $230 one-time payment
  • 23
    OpenText Data Privacy & Protection Foundation
    OpenText Data Privacy & Protection Foundation (Voltage) provides organizations with quantum-ready, format-preserving security that protects sensitive data without disrupting workflows or analytics. It helps companies meet evolving regulatory requirements by securing information at rest, in motion, and in use across hybrid and cloud environments. With NIST-standardized Format-Preserving Encryption and stateless key management, the platform delivers high-performance protection at enterprise scale. Its persistent data security approach ensures that sensitive information remains safeguarded throughout its lifecycle, even as it moves across systems and analytics platforms. Trusted globally across more than 50 countries, the solution is relied on by major financial, healthcare,& retail organizations to secure billions of daily data events. By combining proven cryptography with flexible integrations, OpenText enables organizations to reduce breach risk while maintaining operational agility.
  • 24
    NetMass

    NetMass

    NetMass

    Our backup services, offered under the operational arm of ServerBackup.com, deliver the highest level of data protection. Your data is encrypted and stored in our secure data centers for quick and easy recovery from any location. Our product and services are SEC, SOX and HIPAA compliant. Our remote offic solutions help you comply with the latest rules including those mandated by Sarbanes-Oxley, HIPAA, SEC Rule 17a, the Patriot Act, and others. Our backup solutions also work with our archive solutions (offered under the operational arm of DataArchiving.com) to provide a fully optimized backup, archive, disaster recovery, and business continuity solution. At NetMass, we engage with customers to holistically examine their business needs. Our assets, solutions, and services are then tailored to meet these requirements, to deliver the key Cloud benefits of data protection and data durability in a robust and secure environment.
    Starting Price: $50 per month
  • 25
    Informatica Persistent Data Masking
    Retain context, form, and integrity while preserving privacy. Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments. As a highly scalable, high-performance data masking solution, Informatica Persistent Data Masking shields confidential data—such as credit card numbers, addresses, and phone numbers—from unintended exposure by creating realistic, de-identified data that can be shared safely internally or externally. It also allows you to reduce the risk of data breaches in nonproduction environments, produce higher-quality test data and streamline development projects, and ensure compliance with data-privacy mandates and regulations.
  • 26
    Dataguise

    Dataguise

    Dataguise

    Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses,
  • 27
    BizDataX

    BizDataX

    Ekobit

    BizDataX is a data masking that provides test data of production-level quality. It enables compliance with GDPR and other regulations by masking customers' identity while preparing data for testers and developers. By using masked/anonymized data instead of production data, the risk is significantly reduced. Focus on policy management, business requirements, sensitive data governance and other regulations. Track inventory of databases, data sources, tables and want to know where sensitive data is located. Manage large customer databases and exchange data with online partner shops and parcel delivery companies. Management of medical records is heavily regulated and regulatory compliance can be achieved with data anonymization.
  • 28
    Hakware Archangel
    Hakware Archangel is an Artificial Intelligence based vulnerability scanner and pentesting tool. Archangel scanner enables organizations to monitor their networks, systems, and applications for security vulnerabilities with advanced Artificial intelligence continuously testing your environment. Why use Archangel? -Identify vulnerabilities before cyber criminals do -Our vulnerability scanning mitigates the risks of a data breach, which will come with a range of costs, including remediation, the loss of customers as a result of reputational damage and fines -Vulnerability scanning is not explicitly required by the GDPR (General Data Protection Regulation) or POPI (Protection Of Personal Information Act), but the -Regulation does require organisations that process personal data to ensure that they have implemented appropriate technical and organisational security measures – which includes identifying vulnerabilities -The international standard for information security, ISO 27001
  • 29
    Vormetric Data Security Platform
    The Vormetric Data Security Platform makes it easy and efficient to manage data-at-rest security across your entire organization. Built on an extensible infrastructure, the data security protection platform features multiple data security products that can be deployed individually or in combination to deliver advanced encryption, tokenization and centralized key management. This data security solution prepares your organization for the next security challenge and new compliance requirements at the lowest TCO. The Vormetric Data Security Platform is one data security platform, centrally managed for delivering comprehensive data security solutions.
  • 30
    PrettyFluid Technologies

    PrettyFluid Technologies

    PrettyFluid Technologies

    Learn how your organization can protect clients, streamline CCPA & GDPR compliance, and reduce data breach risks. PrettyFluid Technologies was founded by lifelong technologists whose mission is to fundamentally change how the world thinks about online privacy. We are compelled to provide data security products and services at a time when protection of data is more important than ever. Thanks to new privacy regulations and greater public awareness there is an overwhelming desire for change in who owns and controls your data. Our promise is to put you first while maintaining high morals and transparency to deliver easy to use solutions that will protect consumers and corporations. Individuals: Sign-up for our free service to opt-out and delete your data from +120 data providers
  • 31
    Mage Static Data Masking
    Mage™ Static Data Masking (SDM) and Test data Management (TDM) capabilities fully integrate with Imperva’s Data Security Fabric (DSF) delivering complete protection for all sensitive or regulated data while simultaneously integrating seamlessly with an organization’s existing IT framework and existing application development, testing and data flows without the requirement for any additional architectural changes.
  • 32
    TCS MasterCraft DataPlus

    TCS MasterCraft DataPlus

    Tata Consultancy Services

    The users of data management software are primarily from enterprise business teams. This requires the data management software to be highly user-friendly, automated and intelligent. Additionally, data management activities must adhere to various industry-specific and data protection related regulatory requirements. Further, data must be adequate, accurate, consistent, of high quality and securely accessible so that business teams can make informed and data-driven strategic business decisons. Enables an integrated approach for data privacy, data quality management, test data management, data analytics and data modeling. Efficiently addresses growing volumes of data efficiently, through service engine-based architecture. Handles niche data processing requirements, beyond out of box functionality, through a user-defined function framework and python adapter. Provides a lean layer of governance surrounding data privacy and data quality management.
  • 33
    JANUSEC Privacy
    JANUSEC Privacy, provides an accountability framework and on-premise IT solutions for privacy compliance governance, including records of processing activities, privacy impact assessments, asset security assessments, control measures, etc., to help enterprises demonstrate privacy compliance with accountability (GDPR, CCPA etc.). Records of Processing Activities (GDPR Article 30). PIA (Privacy Impact Assessment) or DPIA (Data Protection Impact Assessment, GDPR Article 35). Data classification, demonstrate compliance with accountability (GDPR Article 5). JANUSEC Privacy, provides an accountability framework and on-premise IT solutions for privacy compliance governance, including records of processing activities, privacy impact assessments, asset security assessments, control measures, etc., to help enterprises demonstrate privacy compliance with accountability (GDPR etc.).
    Starting Price: $299/month
  • 34
    MediCat

    MediCat

    TeskaLabs

    CyberSecurity and data protection for healthcare mobile applications. Strong protection of sensitive data that prevent data leakages. Show users that you care about data privacy. MediCat requires no pesky configurations by the user during the onboarding process and provides a frictionless authentication experience in day-to-day use. Technology for your mobile applications that ensures compliance with healthcare regulations such as GDPR and HIPAA. MediCat is used by healthcare providers and hospitals to build secure mobile applications and protect sensitive data. MediCat has been thoroughly reviewed and approved by healthcare cyber-security auditors and data privacy officers. Leave your contact information and our specialist will contact you shortly. Strong protection of sensitive data. Seamless user experience. In compliance with GDPR, and HIPAA. MediCat technology consists of a mobile SDK that is to be added to a mobile application.
  • 35
    SISA Radar

    SISA Radar

    SISA Information Security

    Helping organizations improve data protection with data discovery, file analysis and classification. Secure your entire data ecosystem with SISA Radar data discovery and data classification. Organize and classify sensitive data based on the criticality and business needs. Gain contextual information to improve sensitive data management. Gain visibility into structured, semi-structured and unstructured sensitive data. Protect data from unauthorized access. Meet compliance standards of PCI DSS, GDPR, CCPA, POPIA, PDPA, APRA and other privacy regulations Create and customize your own data classification scheme. Embrace a scalable and future-proof approach to next-gen data security. A single platform to discover, identify and contextualize sensitive data. A proprietary data discovery algorithm for faster detection and lower false positives.
  • 36
    Secuvy AI
    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 37
    DataKlas GDPR
    DataKlas GDPR is the first complete package of tools to help companies comply with the EU regulation. The most stringent regulation ever introduced by the EU. Mandatory for any organization in the EU. Assumes the need to manage a GDPR Register. Available immediately, xentralized and easy to manage, applicable in any field of activity. Multi-user functionality and alert in case of error identification. Are you a DPO, a GDPR consultant, IT security solutions specialist? Join our DataKlas GDPR Certified Partners! The DataKlas GDPR Platform is based on concrete legislative elements and is a practical synthesis of tens of pages of the Regulation, structured in nomenclatures and registers that ease your consultant activity. DataKlas GDPR is a truly complete package of tools that help companies align with the provisions of the EU Personal Data Protection Regulation (2016/679).
  • 38
    Cookie Information

    Cookie Information

    Cookie Information

    Streamline the way you collect consent across your websites and apps without ever worrying again about complying with global privacy regulations (such as GDPR, ePrivacy, and CCPA). Eliminate the risk of fines by demonstrating full compliance with international data protection regulations with reliable and scalable consent collection on your websites and apps. Maximize revenue and build user trust by proactively monitoring and optimizing consent rates across your digital portfolio. Provide your marketing team with compliant data for analytics and ads. Collect anonymized conversion data with Google Consent Mode and protect your brand reputation by eliminating the risk of data regulation fines. Comply with international privacy regulations and national interpretations. Equip your marketing and IT teams with tools that ensure your data protection compliance. Track and report on compliance and data breaches across all your websites and apps.
    Starting Price: €10 per month
  • 39
    trust-hub

    trust-hub

    trust-hub

    trust-hub is an innovative, hosted platform that enables organizations to capitalize on shifts in the data protection and privacy landscape. The unique framework offers secure storage, processing and rights management for personal data on a case-by-case basis and is designed to support data protection and privacy regulations, including GDPR. Create secure and universally accessible personal data sets in accordance with GDPR. Encrypt and pseudonymize each customer and employee data item uniquely. Store personal data in one of the world’s most secure data storage facilities. Rapidly retrieve personal data as and when required. Increase productivity and efficiency across your organization. Enable accredited individuals and teams to access and share data easily and securely. Provide your Data Protection Officer (DPO) with the tools required to operate effectively. Exploit digital and commercial innovations by facilitating the safe flow of consent-driven customer data.
  • 40
    Clym

    Clym

    Clym

    Clym is an affordable compliance platform that is easy to understand, looks good and protects your business immediately. Manage cookie consent, data subject requests and do not sell my private information requests for global compliance regulations such as GDPR, CCPA and LGPD. One platform for global privacy needs. Clym is the data privacy platform that helps organizations meet their data protection obligations. Cookies, consent, requests, policies and more are all managed in a secure and adaptive application. Clym helps you collect, control and manage the data that is relevant for your company in a transparent way. The platform covers 6 main areas of compliance, namely: data consent management, cookie consent management, company & DPO data management, terms, policies, agreements & procedures, data subjects’ requests, localization and consent receipts. Through all its functionalities, Clym provides a head start in data privacy compliance.
    Starting Price: $45 per month
  • 41
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
    Starting Price: $1000 per day
  • 42
    Exterro

    Exterro

    Exterro

    Comprehensive end-to-end eDiscovery software. From preservation to production, Exterro’s software platform enables you to manage and optimize all your e-discovery activities in one place. Exterro unifies the entire e-discovery process, allowing you to get to the facts of the case sooner at a fraction of the cost. The Exterro Software Platform is a single, fully integrated solution that unifies all of Exterro's E-Discovery and Information Governance products. With over 30 data integrations, quickly collect data from a variety of commonly used data sources to learn more about your case sooner. Save time and money by identifying only relevant material prior to collection, reducing the total data set. Exterro’s Privacy solutions enable your team to quickly and easily orchestrate processes for complying with critical requirements of the European Union’s General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and other privacy regulations.
  • 43
    CipherTrust Data Security Platform
    Thales has pushed the innovation envelope with the CipherTrust Data Security Platform to remove complexity from data security, accelerate time to compliance, and secure cloud migrations. This next-generation platform is built on a modern micro-services architecture, is designed for the cloud, includes Data Discovery and Classification, and fuses together the best capabilities from the Vormetric Data Security Platform and KeySecure and connector products. CipherTrust Data Security Platform unifies data discovery, classification, data protection, and unprecedented granular access controls with centralized key management – all on a single platform. This results in less resources dedicated to data security operations, ubiquitous compliance controls, and significantly reduced risk across your business. The CipherTrust Data Security Platform is an integrated suite of data-centric security products and solutions that unify data discovery, protection and control in one platform.
  • 44
    TestBench for IBM i

    TestBench for IBM i

    Original Software

    Testing and test data management for IBM i, IBM iSeries, AS/400. Complex IBM i applications must be checked from top to bottom, right into the data, wherever it is. TestBench IBM i is a comprehensive, proven test data management, verification and unit testing solution that integrates with other solutions for total application quality. Stop copying the entire live database and hone in on the data you really need. Select or sample data with full referential integrity preserved. Simply decide which fields need to be protected and use a variety of obfuscation methods to protect your data. Track every insert, update and delete including intervening data states. Create rules so that data failures are flagged to you automatically. Avoid the painful save/restores and stop attempting to explain bad test results based on poor initial data. Comparing outputs is a well proven method to verify your test results but it can be laborious and prone to error. This unique solution can save hours.
    Starting Price: $1,200 per user per year
  • 45
    Bit Sentinel

    Bit Sentinel

    Bit Sentinel

    Use this free security tool to save time on creating cookie and privacy policies for GDPR and other compliance assets. We created this tool to help you discover all the cookies your website generates. This free scanner navigates through 50 pages of your website to identify and classify all the cookies it can find in the process. Over 1,000 companies from all around Europe are already using this free tool to make GDPR compliance easier! This tool can help you discover all the cookies your website is generating. This way, you will be able to detect privacy issues and improve your Cookies Policy to comply with the new requirements from General Data Protection Regulation (GDPR) and e-Privacy Directive. Get a list of first-party and third-party cookies for your website. Use this list to build or improve your Cookie Policy. Add the list of cookies to your Privacy Policy to comply with the General Data Protection Regulation (GDPR) and the e-Privacy Directive.
  • 46
    TrueVault

    TrueVault

    TrueVault

    TrueVault is the first data security company entirely focused on protecting Personally Identifiable Information (PII). TrueVault decouples consumer identity from consumer behavior to eliminate data security risks and compliance liabilities, giving companies only the data they need. As organizations collect and store more data to drive their businesses forward, they are simultaneously increasing their risk and liability. Our attorney-designed software will guide you step-by-step to CCPA compliance. Whether your business is an online store or a SaaS, TrueVault Polaris will get your business to full compliance for a flat rate. If we can’t, we’ll give you a full refund. No questions asked. From getting compliant for the first time to processing consumer requests, TrueVault Polaris will walk you through everything you need to do one step at a time. If you can file your taxes online, you can get your business to full compliance.
  • 47
    Krontech Single Connect
    Establish a flexible, centrally managed and layered defense security architecture against insider threats with the world's leading Privileged Access Management platform. Single Connect™ Privileged Access Management Suite, known as the fastest to deploy and the most secure PAM solution, delivering IT operational security and efficiency to Enterprises and Telco's globally. Single Connect™ enables IT managers and network admins to efficiently secure the access, control configurations and indisputably record all activities in the data center or network infrastructure, in which any breach in privileged accounts access might have material impact on business continuity. Single Connect™ provides tools, capabilities, indisputable log records and audit trails to help organizations comply with regulations including ISO 27001, ISO 31000: 2009, KVKK, PCI DSS, EPDK, SOX, HIPAA, GDPR in highly regulated industries like finance, energy, health and telecommunications.
  • 48
    Okera

    Okera

    Okera

    Okera, the Universal Data Authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and demonstrate regulatory compliance. The Okera Dynamic Access Platform automatically enforces universal fine-grained access control policies. This allows employees, customers, and partners to use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives. Okera began development in 2016 and now dynamically authorizes access to hundreds of petabytes of sensitive data for the world’s most demanding F100 companies and regulatory agencies. The company is headquartered in San Francisco.
  • 49
    InsightCloudSec
    You transform your business, we’ll keep your cloud services secure. InsightCloudSec enables you to drive innovation through continuous security and compliance. Achieve continuous security and compliance and prevent misconfigurations through unified visibility and monitoring and real-time automated remediation. Secure configurations and workloads through automated cloud security and vulnerability management across dynamic cloud environments. Manage identity and effective access across ephemeral resources, at scale. InsightCloudSec is a fully-integrated cloud-native security platform, your whole cloud security toolbox in a single solution. Consumer privacy (or the lack thereof) is a huge societal concern and the focus on protecting privacy is manifesting itself through many forms, including regulations like the California Consumer Privacy Act and General Data Protection Regulation.
    Starting Price: $66,000 per year
  • 50
    Imperva Data Security Fabric
    Protect data at scale with an enterprise-class, multicloud, hybrid security solution for all data types. Extend data security across multicloud, hybrid, and on-premises environments. Discover and classify structured, semi-structured, & unstructured. Prioritize data risk for both incident context and additional data capabilities. Centralize data management via a single data service or dashboard. Protect against data exposure and avoid breaches. Simplify data-centric security, compliance, and governance. Unify the view and gain insights to at-risk data and users. Supervise Zero Trust posture and policy enforcement. Save time and money with automation and workflows. Support for hundreds of file shares and data repositories including public, private, datacenter and third-party cloud services. Cover both your immediate needs & future integrations as you transform and extend use cases in the cloud.