Alternatives to Flowsecure
Compare Flowsecure alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Flowsecure in 2026. Compare features, ratings, user reviews, pricing, and more from Flowsecure competitors and alternatives in order to make an informed decision for your business.
-
1
Feroot
Feroot Security
Feroot Security is a global leader in AI-powered website compliance and security. Feroot AI protects websites and web applications from hidden threats while enforcing compliance with PCI DSS 4.0.1, HIPAA rules on online tracking technologies, CCPA/CPRA, GDPR, CIPA, and 50+ laws and standards. The Feroot AI Platform replaces manual compliance work with continuous automation, delivering real-time protection and audit-ready evidence in minutes. Feroot unifies JavaScript behavior analysis, web compliance scanning, third-party script monitoring, consent enforcement, and data privacy posture management to stop Magecart, formjacking, and unauthorized tracking. Trusted by enterprises, healthcare providers, retailers, SaaS platforms, payment service providers, and public sector organizations. Feroot AI solutions include PaymentGuard AI, HealthData Shield AI, AlphaPrivacy AI, CodeGuard AI, and MobileGuard AI. Visit feroot for more information. -
2
Authologic
Authologic
Authologic is a global identity orchestration platform that connects all major verification methods through one API — enabling secure, compliant, and seamless digital onboarding worldwide. It combines government databases, e-IDs, digital wallets, bank IDs, document OCR & biometrics into a single flow — helping businesses onboard users faster, reduce fraud & meet KYC, KYB, and AML requirements. Authologic integrates over 50 methods in more than 200 countries, ensuring consistent & compliant identity verification globally. With automated routing, fallback & workflow optimization, it adapts easily to multiple markets without rebuilding onboarding processes. Built for compliance & scalability, Authologic is eIDAS 2.0-ready, PSD2 AISP-licensed, ISO 27001 / 9001 / 22301 certified, and backed by Y Combinator, operating from London, San Francisco & Warsaw. -
3
Square 9
Square 9
Square 9 removes the frustration of extracting data from documents, forms, and all external sources, so you can harness the full power of your information. Release your team from repetitive tasks while your work flows freely in areas like Accounts Payable, Order Processing, Customer and Vendor Onboarding and Contracts Management. -
4
FileCloud
FileCloud
FileCloud is a hyper-secure EFSS (enterprise file sync and share) platform that provides industry leading compliance, data governance, data leak protection, data retention and digital rights management capabilities. Workflow automation and granular control of content sharing across most enterprise platforms are fully integrated into the complete EFSS stack. FileCloud is a leader in content governance and collaboration for unstructured data, trusted and used worldwide across Global 1000 enterprises, educational institutions, government organizations, and service providers. Granular control of content sharing is fully integrated into the stack through comprehensive audit logs and access permissions, and the Compliance Center helps with regulations like GDPR, HIPAA, and NIST 800-171 (among others). FileCloud also provides Zero Trust File Sharing® an industry first innovation that allows users to share sensitive data via an encrypted zip file that cannot be accessed by unauthorized userStarting Price: $6.00/month/user -
5
Tableau
Salesforce
Tableau, now enhanced with AI-powered capabilities and integrated with Salesforce, is an advanced analytics platform that helps businesses turn data into actionable insights. With Tableau Next, users can unlock the full potential of their data by accessing trusted AI-driven analytics. Whether deployed in the cloud, on-premises, or natively within Salesforce CRM, Tableau enables seamless data integration, powerful visualizations, and collaboration. The platform is designed to support organizations of all sizes in making data-driven decisions, while fostering a Data Culture through easy-to-use, intuitive tools for analysts, business leaders, IT leaders, and developers alike.Starting Price: $75/user/month -
6
Fasoo Data Radar
Fasoo
Fasoo Data Radar (FDR) is a data discovery and classification solution that helps organizations locate, analyze, and manage sensitive unstructured data across on-premise servers, cloud storage, and endpoints. It scans and classifies files based on keywords, regex patterns, file formats, and other predefined policies, ensuring organizations maintain control over critical information. With real-time monitoring and centralized policy enforcement, FDR enhances data security by identifying risks, preventing unauthorized access, and assisting with compliance requirements such as GDPR, HIPAA, and CCPA. Its integration with enterprise security frameworks allows organizations to apply consistent data protection policies while improving operation workflows. By automating data classification and governance, FDR increases efficiency and enhances data visibility for security and compliance management. -
7
Fasoo DSPM
Fasoo
Fasoo DSPM (Data Security Posture Management) provides comprehensive visibility and control over sensitive data across cloud, on-premises, and hybrid environments. It automatically discovers and classifies data, identifies risks such as overexposed or shadow data, and continuously assesses security posture. With real-time insights into data location, access, and movement, organizations can detect vulnerabilities, enforce policies, and ensure compliance with regulations like GDPR, HIPAA, and CCPA. Fasoo DSPM helps businesses shift from reactive to proactive data protection strategies, reducing risk and improving governance. -
8
Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
-
9
Fasoo Enterprise DRM
Fasoo
Fasoo Enterprise DRM (FED) is an advanced data-centric security solution designed to protect sensitive information at rest, in transit, and in use. With granular permission control, organizations can define and enforce user-specific access rights to ensure only authorized personnel can view or edit sensitive files. Centralized policy management simplifies the enforcement of consistent security policies across the organization, reducing administrative overhead. FED’s enhanced monitoring capabilities provide real-time visibility into file usage, allowing businesses to identify risks, prevent unauthorized access, and maintain control over their data. By supporting compliance with regulations such as GDPR, HIPAA< and CCPA, Fasoo Enterprise DRM helps organizations enhance data governance. Trusted by global enterprises, FED empowers organizations to secure intellectual properties, mitigate insider threats, and maintain productivity while ensuring the highest levels of data security. -
10
Arctera Insight Capture
Arctera
Arctera Insight Capture is a powerful data capture solution designed to collect and manage communication data from over 120 sources, including emails, social media, and collaboration tools. It ensures full compliance with regulatory requirements by preserving data in its original context and using secure, encrypted collection methods. The platform simplifies data governance by offering features like AI-driven classification, tagging, and OCR for better organization and searchability. Arctera Insight Capture enables businesses to centralize their data, reduce compliance risks, and optimize data retention, while cutting storage costs by filtering unnecessary data. -
11
Privacy1
Privacy1
Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmenStarting Price: $159 per month -
12
JANUSEC Privacy
JANUSEC
JANUSEC Privacy, provides an accountability framework and on-premise IT solutions for privacy compliance governance, including records of processing activities, privacy impact assessments, asset security assessments, control measures, etc., to help enterprises demonstrate privacy compliance with accountability (GDPR, CCPA etc.). Records of Processing Activities (GDPR Article 30). PIA (Privacy Impact Assessment) or DPIA (Data Protection Impact Assessment, GDPR Article 35). Data classification, demonstrate compliance with accountability (GDPR Article 5). JANUSEC Privacy, provides an accountability framework and on-premise IT solutions for privacy compliance governance, including records of processing activities, privacy impact assessments, asset security assessments, control measures, etc., to help enterprises demonstrate privacy compliance with accountability (GDPR etc.).Starting Price: $299/month -
13
SISA Radar
SISA Information Security
Helping organizations improve data protection with data discovery, file analysis and classification. Secure your entire data ecosystem with SISA Radar data discovery and data classification. Organize and classify sensitive data based on the criticality and business needs. Gain contextual information to improve sensitive data management. Gain visibility into structured, semi-structured and unstructured sensitive data. Protect data from unauthorized access. Meet compliance standards of PCI DSS, GDPR, CCPA, POPIA, PDPA, APRA and other privacy regulations Create and customize your own data classification scheme. Embrace a scalable and future-proof approach to next-gen data security. A single platform to discover, identify and contextualize sensitive data. A proprietary data discovery algorithm for faster detection and lower false positives. -
14
Netwrix Endpoint Protector
Netwrix
Netwrix Endpoint Protector is an advanced enterprise-grade Data Loss Prevention (DLP) solution designed to protect sensitive data from unauthorized sharing and malicious extraction from employee endpoints. It offers cross-platform capabilities, supporting Windows, macOS, and Linux operating systems, ensuring comprehensive security across diverse IT environments. The solution provides customizable device control to manage USB and peripheral ports, preventing unauthorized data transfers and mitigating risks associated with data leaks. Additionally, it includes content inspection features that enforce sophisticated policies based on sensitive data categories, keywords, and file types, effectively preventing unauthorized data transfers. Netwrix Endpoint Protector also assists organizations in achieving regulatory compliance with standards such as GDPR, HIPAA, and PCI DSS by securing personally identifiable information, protected health information, and payment card information. -
15
SylLab
SylLab Systems
SylLab Systems is providing embedded compliance for enterprise data security. Privacy compliance and cybersecurity are expensive and difficult to implement, and many organizations get it wrong. Changes in the architecture, lawyers, consultants are a significant expenditure when facing privacy regulations (HIPAA, GDPR, PDPA, CCPA). Request a demo to learn more. Privacy Regulations are expanding beyond the current framework of IT infrastructure. Adapting to such a change is costly, time-consuming, and requires legal and development expertise. There is a better, more structured approach to data governance that responds and adapts to your complex IT environment, whether it’s on-cloud or on-premise. Take control of your compliance workflow and shape it according to business logic. Learn more about the solution trusted by large financial institutions across the globe. -
16
PK Protect
PKWARE
PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. The platform integrates with various systems to provide a unified approach to managing data security across cloud, on-premises, and hybrid environments. By offering real-time visibility and proactive threat detection, PK Protect helps organizations maintain control over their sensitive data and reduce security vulnerabilities. -
17
Arctera Insight Archiving
Arctera
Arctera Insight Archiving is a cloud-based enterprise data archiving and retention platform designed to help organizations manage and secure their data across various communication channels. It enables the capture and preservation of over 120 content types, including emails, chats, collaboration tools, and social media, ensuring compliance with regulatory requirements such as GDPR, HIPAA, and CCPA. It offers AI-powered capabilities for data classification, retention policy management, and eDiscovery, allowing legal and compliance teams to efficiently discover and analyze relevant information. Arctera Insight Archiving provides flexible deployment options, including on-premises and cloud environments, to meet data sovereignty and security needs. It also supports integration with Microsoft 365, Google Workspace, and on-premises systems, facilitating seamless data management across diverse IT infrastructures. -
18
Privacera
Privacera
At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™. -
19
Klassify
Klassify
Klassify enforces users to clearly identify the sensitivity of information by applying classification labels and protective markings to documents and emails. As users work with the information, visual classification labels encourage them for proper handling as per their organization's information security guidelines. Klassify is a dynamic data classification platform that enables organizations to discover, classify and protect their business-critical data and ensure consistent and proper handling of the data by involving end users. Klassify helps organizations to discover and identify sensitive information in their legacy data across endpoint systems, servers, storage, databases, and cloud platforms for proper data handling in the future. Klassify simplifies the task of complying with regulatory compliances like PCI, GDPR, HIPAA, DPA, etc. View detailed metadata and contextual information to enable improved information governance and organizational efficiency for unstructured data. -
20
DoxAI
DoxAI Australia PTY Ltd
DoxAI is your trusted process automation partner, enabling organisations to transition from outdated systems to cutting-edge AI technology. Our platform streamlines the collection, management, processing, and storage of data, enhancing security, reducing operational costs, and boosting customer engagement. DoxAI empowers providers to automate and secure every step of their data and document handling processes. Our suite of products supports end-to-end workflows ensuring privacy and compliance. We adhere to stringent information security standars to safeguard your sensitive data as part of our certifications - SOC2 Type 2, ISO27001, HIPAA, GDPR,PCI DSS and HIPAA. Our technology is available in UI, iFrame or API. -
21
FormAssembly
FormAssembly
FormAssembly helps organizations take control of the data collection process. With our powerful web form platform, companies can streamline outdated processes and drive essential business initiatives in any industry. Our platform integrates seamlessly with Salesforce and other business platforms to increase efficiency organization-wide, while our advanced security and compliance standards instill confidence and peace of mind.Starting Price: $89/month -
22
Kogni
Kogni
Kogni's Discover feature enables enterprises to locate and detect all sensitive and critical information. Discover sensitive data from any source, in any format and in any type. Employ Kogni’s expert sensitive data discovery software to automate data discovery and classification. Our ease of implementation allows for seamless integration with your enterprise’s data warehouse. Accelerate compliance with international data regulations and industry standards with Kogni’s sensitive data discovery tool. Minimize the risk of data leak and the cost of non-compliance with data protection and privacy regulations like HIPAA, GDPR, CCPA, PCI, and PII amongst others. Scans and pin-points sensitive data from 10+ data sources. Produces a comprehensive sensitive information dashboard with an array of special features. Custom-build your sensitive data classification groups as per your company’s needs. Supports a wide range of data types and formats. -
23
NewBanking Identity
NewBanking
The NewBanking Identity platform makes it easy to collect, verify and store customer data from both private individuals and companies. Secure and ISO 27001 certified handling of personal data. Full compliance with GDPR and AML (Anti-Money Laundering). Manage AML, PEP and KYC on one platform. It’s easy and safe for businesses to handle personal data. Businesses are in compliance with AML and GDPR. Data protection is enforced for both private individuals and companies. The user-friendly NewBanking Identity platform helps your business comply with anti-money laundering laws and regulations. Personal data, data protection and anti-money laundering regulations demand a great deal of businesses today. Our Software-as-a-Service (SaaS) solution solves these issues and creates clarity for a variety of business fields. A smart solution for KYC and GDPR compliance. A platform that makes compliance easy and simple.Starting Price: €120 per month -
24
Tyler Data Collect Mobile
Tyler Technologies
Public safety officers, caseworkers, regulatory inspectors, and other government workers need to record information away from the office, but gathering data in the field can be difficult and inaccurate. Data Collect Mobile is a digital alternative to disconnected and non-secure paper case files, notes, and other field operation tools these workers have used in the past. It capitalizes on the built-in capabilities of mobile phones and tablets to record information accurately, completely, and with verifiable, ironclad security. Data Collect Mobile allows you to open a case file and then use your device’s native functionality to add pertinent information directly to the file. Camera and video capabilities create a visual record. Speech-to-text functionality captures voice notes or interview content. Entries are automatically tagged with GPS, address, weather, date, and time stamps. -
25
Ingext
Ingext
Ingext makes real-time transformation, analysis, metrics, and alerting a feature of data collection. This means that data coming into an SIEM or APM is ready for use, reducing complexity and delay while addressing stoppage and congestion. The ability to run an infrastructure is a continuous flow of data that can be consumed. Ingext focuses on making data operational available as it becomes available. Get started quickly using the AWS marketplace to start your trial. Connecting to your data simply and securely is a tenant of Ingext. Part of getting data into your systems is to get it there in a form that is easily understood. Processing transforms, enriches, and error-checks your data. Connecting streaming processing to data sources and data destinations, which we call sinks, is done independently from the processing. Making things clear and easy to debug. Processing transforms, enriches, and error-checks your data. -
26
Synaps
Synaps
Synaps provides identity verification solutions from personhood validation to regulated KYC/AML and KYB processes. Identification is a challenging task within the crypto industry. Needs vary from eliminating bots to complying with increasing regulations. Synaps has designed a gradual identification flow for web3 to answer any of your identity and compliance challenges while staying true to the privacy-friendly ethos of the crypto industry. Integration of Anima protocol for instant user identification. In-house legal experts and regulatory-compliant solutions. Trustworthy technology to guarantee data privacy. Benefit from custom identity solutions with the highest pass rates worldwide. Provide your customers with a secure and intuitive onboarding experience on Web3 while complying with market regulations. KYC can help crypto projects detect users' perceived affiliation with money laundering and other malicious activities.Starting Price: $1.90 per verification -
27
Enterprise File Fabric
Storage Made Easy
The Enterprise File Fabric™ provides a private, secure, policy-driven multi-cloud content and collaboration solution. It does not ship with storage, it works with a Companies existing storage portfolio whether that is on-cloud or on-premises. The Enterprise File Fabric™ unifies, secures and makes any type of storage (including object storage) easily accessible for end users. It is available in three main product variants: 1.The Enterprise File Fabric for Compliance provides a 'single pane of glass' that presents and secures data from multiple sources, be that on-premises, a data centre, or the Cloud. It Provides intelligent policy based enforcement across all corporate data and helps enforce GDPR / CCPA / HIPAA. 2. The Enterprise File Fabric for Media and Entertainment provide a unified view of media assets that can be dispersed on-cloud and on-premises.Starting Price: $5 per user per month -
28
IDMERIT
IDMERIT
IDMERIT is an identity verification platform that helps businesses verify customers, prevent fraud, and comply with global regulations. Our identity verification platform supports Identity and Age Verification, AML, KYC, PEP & OFAC screening, Business Verification, and Video KYC across multiple regions. IDMERIT is compliant with GDPR, HIPAA, and CCPA. IDMERIT provides services like ID Verification - To verify user identities using government-issued IDs and other personal documents. AML (Anti-Money Laundering) - To screen individuals or entities against watchlists, politically exposed persons (PEPs), and sanctions lists. KYC (Know Your Customer) - To help businesses meet regulatory requirements by verifying the identity of customers in order to prevent fraud. Age Verification – Ensuring the user meets age requirements, often used in scenarios like age-restricted content or services. -
29
amazee.ai
amazee.ai
amazee.ai provides Sovereign AI Infrastructure engineered for highly regulated enterprises. Unlike public cloud AI, we deliver dedicated inference isolation, ensuring that proprietary data and LLMs operate in a secure, customer-controlled environment. The platform features a Private AI Assistant that enables secure processing of sensitive internal documents, CRM records, and support data without data ever exiting your firewall or contributing to external model training. With a "Privacy-by-Design" architecture, you can select specific regional enclaves (including CH, DE, and the USA) to meet strict GDPR, HIPAA, and CCPA data residency requirements. By leveraging a transparent, open source foundation, we eliminate vendor lock-in, providing a future-proof gateway to state-of-the-art models such as Claude, GPT-4, and Mistral. It serves as an essential compliance layer for finance, healthcare, and government sectors seeking to leverage generative AI without compromising data sovereignty.Starting Price: Free Trial -
30
Accellion
Accellion
The Accellion secure content communication platform prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, compliance and control over the communication of IP, PII, PHI, and other sensitive content across all third-party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. When users click the Accellion button, they know it’s the safe, secure way to share sensitive information with the outside world. With on-premise, private cloud, hybrid and FedRAMP deployment options, the Accellion platform provides the security and governance CISOs need to protect their organizations, mitigate risk, and adhere to rigorous compliance regulations such as NIST 800-171, HIPAA, SOX, GDPR, GLBA, FISMA, and others. Accellion solutions have protected more than 25 million end users at more than 3,000 companies.Starting Price: $15.00/month/user -
31
HCL Customer Data Platform (HCL CDP)
HCLSoftware
HCL CDP is a powerful solution that centralizes customer data from multiple sources, creating a 360-degree view for deeper insights. Its scalable architecture, data lineage capabilities, & compliance with privacy regulations make it a top choice for modern enterprises. 1. Seamless Scalability: HCL CDP effortlessly scales with growing data volumes, ensuring smooth performance as businesses expand, manage more customer interactions, & integrate complex data sources. 2. Data Lineage & Compliance: HCL CDP provides full transparency in data processing, tracking data flow for compliance with GDPR, CCPA, & other regulations. Its zero-copy data architecture enhances security by enabling data access without duplication. 3. Flexible Deployment & No Lock-In: With on-premise, cloud, & hybrid deployment options, HCL CDP offers businesses the freedom to scale without vendor lock-in. 4. Tech-Agnostic Integration: Seamlessly integrating with CRM & marketing automation, & analytics platforms. -
32
Secuvy AI
Secuvy
Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data. -
33
ReadyRedact
ReadyRedact
ReadyRedact is an AI-powered automated document redaction software designed to help businesses and organizations comply with privacy laws such as GDPR, CCPA, HIPAA, and others. It uses advanced AI technology to efficiently redact sensitive information in documents like PDFs, JPEGs, TIFFs, and Microsoft Office files, ensuring the confidentiality of private data. ReadyRedact automates the redaction process, removing personal and confidential details to mitigate risks such as identity theft, fraud, and litigation. It includes features like bulk uploads, automated email integration, OCR-based search and redaction, document annotations, and project management tools for secure collaboration. It provides full compliance with privacy regulations, making it ideal for industries like law firms, healthcare, finance, and government agencies. ReadyRedact also allows users to track edits, maintain audit logs, and apply role-based access control for enhanced data security.Starting Price: $14.99 per month -
34
Concentric
Concentric AI
Take control of your data with zero-trust access governance. Locate, risk assess, and protect business-critical content. Protect private and regulated data. Meet regulatory mandates for financial information, privacy and right-to-be-forgotten. Concentric provides agentless connectivity to a wide variety of data repositories so you can govern access to your data wherever it resides. We process both structured and unstructured data in the cloud or on-premises. We also integrate with popular data classification frameworks, like Microsoft Information Protection, so you can enjoy better coverage and more accurate classification results throughout your security stack. If you don’t see what you need on our list, let us know. Our professional services team will make quick work of getting your data connected. -
35
SurveyCTO
Dobility
SurveyCTO is the most reliable, secure, and scalable mobile data collection platform for researchers and professionals working in offline settings. As former researchers, we prioritize data quality and security as highly as you do. By providing a premium technology that anyone can use, we have enhanced data-based analysis and decision-making around the world. With sophisticated workflows, robust quality control features, and real-time visualizations, SurveyCTO collects secure, high quality data—even offline. A single, transparent plan with the flexibility for any kind of research at any scale—from a single project to global use across organizations. Design complex survey forms, pre-load data, and stream data between datasets with an intuitive spreadsheet format, or the drag-and-drop form designer. Preview and revise forms efficiently with the testing interface. Collect data offline with the SurveyCTO Android and iOS apps, or online with the universal web interface.Starting Price: $99 per month -
36
Vedra AI
Vedra AI
Vedra AI is the premier Sovereign AI Compliance & Governance platform. We empower enterprises to deploy intelligent, no-code GenAI chatbots in minutes while maintaining strict regulatory integrity. Designed for the data-driven economy, Vedra bridges the gap between rapid innovation and data security. Our platform enforces precise data localization, ensuring compliance with India’s DPDP Act, GDPR, and HIPAA. We replace "black box" risks with forensic auditability and RAG-based grounding to eliminate hallucinations. Ideal for CTOs and CISOs in regulated sectors like BFSI and Healthcare who demand control. From instant PDF-to-bot creation to enterprise governance, Vedra is your secure infrastructure for AI. Innovate responsibly with Vedra AI.Starting Price: $100/month -
37
Fractal ID
Fractal Blockchain
No more trade-offs between compliance and conversion. Fractal ID is built for regulated industries with global user bases - a KYC/AML platform delivering fast and accurate global verifications at a conversion rate 40% higher than industry standard. Comprised of experts in finance, design, law and technology, the Fractal team has a collective 45 year track-record of shipping successful products. Based out of Berlin, Porto and Singapore and comprising of 10+ nationalities, are uniquely suited to build processes and products that are easy to understand no matter where a user comes from. We consider compliance with the GDPR and protection of personal data as top priorities. We encrypt all sensitive data and have implemented state of the art security processes to protect your information. We also require anyone using Fractal ID to comply with the GDPR. You can find the relevant information about our data processors and other information in our Privacy Policy. -
38
KYC360
KYC360
KYC360 is an end-to-end client lifecycle management solution designed to automate onboarding, screening, ongoing monitoring, and remediation for regulated businesses. It offers fully configurable, no-code workflows that support unlimited risk-based onboarding journeys, document- and no-document verification, and eID&V. Pre-integrated with leading global data providers and built with headless APIs and pre-built connectors, it allows seamless integration into existing systems while delivering rapid deployment and return on investment. It is modular, covering onboarding, continuous screening, pKYC, and remediation, so organizations can pay only for the functionality they need. Hosting is available on Azure or AWS, with full EU data residency and ISO 27001 security, enabling firms to streamline compliance while improving customer experience and reducing operational risk. -
39
Allpass.ai
Allpass.ai
Allpass.ai is a next-generation identity verification platform designed to make compliance easy and efficient. Built with simplicity in mind, our platform empowers organizations to meet regulatory requirements while delivering seamless experiences for end users. Whether you’re tackling AML/KYC compliance, improving onboarding processes, or mitigating fraud, Allpass.ai offers the tools and flexibility to build safe, reliable, and conversion-optimized verification flows tailored to your business needs. Key Features: No-Code Verification Flow Builder Customizable Liveness Detection Questionnaire Builder AML Checks Document Verification Geo Location Check Email and Phone Verification Easy IntegrationStarting Price: $198 per month -
40
SecurePass
eMudhra
SecurePass IAM provides robust security measures like credential vaulting, session monitoring, and least privilege enforcement. This reduces the risk of unauthorized access, ensuring your organization's data remains secure By automating processes like user provisioning, access certifications, and password management, SecurePass IAM simplifies access management. This leads to increased operational efficiency and productivity within your organization With its built-in analytics, reporting capabilities, and access governance features, SecurePass IAM aids in maintaining compliance with various regulatory standards. It supports audit trails, making the auditing process smoother and more efficient -
41
ITsMine Beyond DLP
ITsMine
ITsMine Beyond DLP™ goes beyond traditional Data Loss Prevention (DLP) to protect organizations against all data threats. No policies or endpoint agents needed zero effect on employee productivity, and protection even after data exfiltration. Data loss incidents are becoming more common and more destructive than ever before, whether deliberate or inadvertent or from internal or external factors. Beyond DLP™ is a completely new security approach, that enables organizations to easily track and secure their data wherever it is, within their internal network and beyond. Maintain your high-security standards regardless of whether your data is located in on-prem or cloud-based file systems. Empower employees’ full productivity while controlling the usage and whereabouts of your sensitive data. Hassle-free compliance to data protection regulations, from GDPR, CCPA, PCI to HIPAA, with access control options to sensitive data, data breach detection and clear reporting options. -
42
BitOK
BitOK
BitOK is a cryptocurrency compliance and analytics platform designed to help businesses and individuals monitor blockchain transactions and manage AML risks. The platform offers tools that check wallets and transactions for connections to illicit funds or sanctioned entities. BitOK’s KYT Office solution enables compliance teams to monitor crypto activity, detect suspicious behavior, and maintain regulatory compliance. Its transaction analytics feature provides interactive graphs that visualize asset movement and relationships between blockchain addresses. The platform also includes AML checks that analyze crypto wallets and transactions in just a few seconds using data from multiple sources. Users can access additional tools such as portfolio tracking, crypto risk reports, and investigation tools for tracing funds. By combining analytics, monitoring, and compliance features, BitOK helps organizations improve transparency and security in cryptocurrency operations. -
43
Simplifies data regulation needs, enhances visibility and streamlines monitoring IBM® Guardium® Data Compliance helps organizations to move through regulatory compliance and audit requirements more quickly and easily, safeguarding regulated data wherever it resides. Available in IBM® Guardium® Data Security Center, IBM Guardium Data Compliance can reduce audit prep time for data compliance regulations, provide continuous visibility of data security controls, and solve data compliance and data activity monitoring challenges.
-
44
Quest ControlPoint
Quest Software
Confidently secure and protect your SharePoint environment from internal and external threats by with comprehensive permissions management, auditing, reporting and governance policy enforcement. With Quest ControlPoint, you can manage, secure, automate and govern your entire SharePoint environment—whether it’s an on-premises, Microsoft 365 or hybrid SharePoint deployment. Ensure permission policy compliance and prevent security breaches and unauthorized access to sensitive content. Audit, clean up and manage SharePoint permissions and users from a single console across all sites, site collections or farms. Analyze and manage all aspects of permissions whether they are directly assigned, inherited or granted through Active Directory or SharePoint groups. -
45
Precisely Enforcive
Precisely
Precisely’s Enforcive Enterprise Security Suite is a comprehensive, easy-to-use security and compliance solution for IBM i. With over 20 fully integrated, GUI-controlled modules, the suite enables system administrators and security officers to manage security and compliance tasks efficiently and effectively – even managing multiple systems at a single time. In today’s world of privacy breaches, complex regulatory requirements and evolving threats, the Enforcive Enterprise Security Suite enables a comprehensive ‘hardening’ of your company’s IBM i defenses against unauthorized access. Enforcive Enterprise Security Suite modules cover network security, authority swap, security monitoring, IBM i log transfer, and regulatory compliance. Additional modules can be added to tailor the solution to best meet the needs of your environment. Add a comprehensive layer of protection around IBM i systems and data while supporting compliance with security regulations. -
46
Mobenzi
Mobenzi
We enable organizations to measure and maximize their impact by digitizing their fieldwork and data collection. Say goodbye to paper-based forms & surveys by digitizing your fieldwork and data collection. Whether your organization has a few basic forms or hundreds of complex surveys, our tools will present them in a simple, intuitive way to fieldworkers and respondents, on any device. Using our Android mobile app, data can be captured offline and responses upload automatically in the background. New form assignments or versions download automatically ensuring your fieldworkers always have the right forms. Improve productivity, data accuracy, and compliance using rules to automate skip logic and validation. Guide workflow using logic and prevent errors by embedding validation into your forms. Build date-based logic to guide scheduling and provide decision support. Cater for repeating data scenarios such as enumerating a household roster.Starting Price: Free -
47
FormFoundry
Tivix
FormFoundry is a customizable web platform that allows organizations to build powerful data collection applications tailored to their needs. A robust web form builder allows for the seamless deployment of native mobile apps for field operatives, while a flexible data platform gives a high-level view of key business processes. FormFoundry has been developed to fix the leaks in data management and streamline the data collection process. Add powerful form creation, custom asset management and advanced workflow configurations to your business. Tailored to your exact needs. Inefficient data management processes, mislabelled files and corrupt data can cause massive headaches in any organization. These issues coupled with slow manual data input and review mean that some businesses are getting left behind in the digital era. -
48
Tag Inspector
Tag Inspector
Tag Inspector is a tag auditing and governance platform that gives organizations deep visibility into all tags, pixels, and cookies loading across their websites so they can verify data collection practices, optimize tag architecture, and manage privacy risk. It maintains a comprehensive library of thousands of unique tags and provides features such as compliance risk assessment to identify high-risk platforms and benchmark privacy posture, unauthorized personally identifiable information (PII) detection to flag leaked emails, addresses, and other sensitive data, and consent policy monitoring that simulates user consent conditions to detect violations of defined consent rules. It also supports industry-leading server-side tag monitoring, including tags loading via server-side tag management systems, so teams can verify that only approved data flows occur regardless of architecture. -
49
Strac
Strac
Strac is a 1-stop shop for all things PII (Personally Identifiable Information). Strac is a Data Loss Prevention software that protects businesses from security and compliance risks by a) automatically detecting and redacting sensitive data across all communication channels like email, slack, zendesk, google drive, one drive, intercom, etc. and b) protecting sensitive data on front end apps and backend servers such that sensitive data never touches servers. Integrate with your SaaS apps in minutes, eliminate data leaks and be compliant with PCI, SOC 2, HIPAA, GDPR, CCPA. Strac's accurate machine learning models, real time notifications, unique redaction experience saves employees time and very productive. -
50
Acronis DeviceLock DLP
Acronis
Acronis DeviceLock DLP provides comprehensive endpoint DLP (endpoint data loss prevention) – discovering and protecting sensitive data while monitoring the operations involving that information. Prevent data leakage due to employee negligence or malicious insiders by blocking any unauthorized attempt to access or transfer data, discovering and protecting sensitive data-at-rest. Reduce the complexity of data protection and cut reporting times with a single DLP solution for thorough visibility over data flows and user behavior. Reduce information security risks and comply with IT security standards and regulations by enforcing data use and handling policies that users can’t avoid following. Save the time and hassle associated with managing a DLP solution. Acronis DeviceLock DLP is easily deployable through Active Directory (AD) and offers various central management consoles, based on your organization’s requirements.Starting Price: $615 one-time payment