Alternatives to IBM InfoSphere Optim Data Privacy

Compare IBM InfoSphere Optim Data Privacy alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to IBM InfoSphere Optim Data Privacy in 2026. Compare features, ratings, user reviews, pricing, and more from IBM InfoSphere Optim Data Privacy competitors and alternatives in order to make an informed decision for your business.

  • 1
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 2
    DATPROF

    DATPROF

    DATPROF

    Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
  • 3
    IRI FieldShield

    IRI FieldShield

    IRI, The CoSort Company

    IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones.
  • 4
    Informatica Persistent Data Masking
    Retain context, form, and integrity while preserving privacy. Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments. As a highly scalable, high-performance data masking solution, Informatica Persistent Data Masking shields confidential data—such as credit card numbers, addresses, and phone numbers—from unintended exposure by creating realistic, de-identified data that can be shared safely internally or externally. It also allows you to reduce the risk of data breaches in nonproduction environments, produce higher-quality test data and streamline development projects, and ensure compliance with data-privacy mandates and regulations.
  • 5
    DataVantage

    DataVantage

    DataVantage

    ​DataVantage offers comprehensive data management solutions designed to secure and manage sensitive information across mainframe and distributed environments. Key offerings include DataVantage for IMS, Db2, and VSAM, which provide advanced data masking, editing, and extraction capabilities to protect Personally Identifiable Information (PII) during non-production processes. DataVantage DME (Data Masking Express) offers cost-effective, on-the-fly data masking for Db2, IMS, and VSAM environments, ensuring compliance without disrupting existing workflows. For distributed systems, DataVantage Global delivers robust data masking, obfuscation, and de-identification, supporting compliance and operational efficiency across platforms. Additionally, DataVantage Adviser simplifies COBOL file management post-mainframe rehosting or application modernization, enhancing data accessibility and editing.
  • 6
    Informatica Dynamic Data Masking
    Your IT organization can apply sophisticated masking to limit sensitive data access with flexible data masking rules based on a user’s authentication level. Blocking, auditing, and alerting your users, IT personnel, and outsourced teams who access sensitive information, it ensures compliance with your security policies and industry and civil privacy regulations. Easily customize data-masking solutions for different regulatory or business requirements. Protect personal and sensitive information while supporting offshoring, outsourcing, and cloud-based initiatives. Secure big data by dynamically masking sensitive data in Hadoop.
  • 7
    BizDataX

    BizDataX

    Ekobit

    BizDataX is a data masking that provides test data of production-level quality. It enables compliance with GDPR and other regulations by masking customers' identity while preparing data for testers and developers. By using masked/anonymized data instead of production data, the risk is significantly reduced. Focus on policy management, business requirements, sensitive data governance and other regulations. Track inventory of databases, data sources, tables and want to know where sensitive data is located. Manage large customer databases and exchange data with online partner shops and parcel delivery companies. Management of medical records is heavily regulated and regulatory compliance can be achieved with data anonymization.
  • 8
    Libelle DataMasking
    Libelle DataMasking (LDM) is a robust, enterprise-grade data masking solution that automates the anonymization of sensitive or personal data—such as names, addresses, dates, emails, IBANs, credit cards—and transforms them into realistic, logically consistent substitutes that maintain referential integrity across SAP and non‑SAP systems, including Oracle, SQL Server, IBM DB2, MySQL, PostgreSQL, SAP HANA, flat files, and cloud databases. Capable of processing up to 200,000 entries per second and supporting parallelized masking for massive datasets, LDM uses a multithreaded architecture to efficiently read, anonymize, and write data back with high performance. It features over 40 built‑in anonymization algorithms—such as number, alphanumeric, date shifting, name, email, IBAN masking, credit card obfuscation, and mapping algorithms—as well as templates for SAP modules (CRM, ERP, FI/CO, HCM, SD, SRM).
  • 9
    Qlik Gold Client
    Qlik Gold Client improves the efficiency, cost and security of managing test data in SAP environments. Qlik Gold Client is designed to eliminate development workarounds by easily moving configuration, master, and transactional data subsets into testing environments. Rapidly define, copy and synchronize transactional data from production to non-production targets. Identify, select, and delete non-production data. Manage extensive and powerful data transformations through a clean and easy-to-use interface. Automate data selection and enable hands-free test data refresh cycles, reducing time and effort for test data management. Qlik Gold Client provides several options to protect PII data in non-production environments via data masking. Data masking applies a set of rules to “scramble” your production data when it’s replicated to a non-production environment.
  • 10
    LeapYear

    LeapYear

    LeapYear Technologies

    Differential privacy is a mathematically proven standard of data privacy that ensures all data can be used for analytics and machine learning without the risk of compromising information about individual records. LeapYear’s differentially private system protects some of the world’s most sensitive datasets, including social media data, medical information, and financial transactions. The system ensures analysts, data scientists, and researchers can derive value from all of the data, including data of highly sensitive fields, while protecting all facts about individuals, entities, and transactions. Traditional approaches, such as aggregation, anonymization, or masking degrade data value and can be easily exploited to reconstruct sensitive information. LeapYear’s implementation of differential privacy provides mathematically proven assurances that information about individual records cannot be reconstructed, while also enabling all of the data to be leveraged for reporting
  • 11
    Syntho

    Syntho

    Syntho

    Syntho typically deploys in the safe environment of our customers so that (sensitive) data never leaves the safe and trusted environment of the customer. Connect to the source data and target environment with our out-of-the-box connectors. Syntho can connect with every leading database & filesystem and supports 20+ database connectors and 5+ filesystem connectors. Define the type of synthetization you would like to run, realistically mask or synthesize new values, automatically detect sensitive data types. Utilize and share the protected data securely, ensuring compliance and privacy are maintained throughout its usage.
  • 12
    Oracle Data Safe
    Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database. Oracle Database Cloud Service (exadata, virtual machine, or bare metal), or Oracle Databases on-premises in your own data center, Data Safe delivers essential data security capabilities that help you reduce risk and improve security. Assess user risk by highlighting critical users, roles and privileges. Configure audit policies and collect user activity to identify unusual behavior. Discover sensitive data and understand where it is located. Remove risk from non-production data sets by masking sensitive data.
  • 13
    Anonomatic

    Anonomatic

    Anonomatic

    Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations.
  • 14
    DOT Anonymizer

    DOT Anonymizer

    DOT Anonymizer

    Mask your personal data while ensuring it looks and acts like real data. Software development needs realistic test data. DOT Anonymizer masks your test data while ensuring its consistency, across all your data sources and DBMS. The use of personal or identifying data outside of production (development, testing, training, BI, external service providers, etc.) carries a major risk of data leak. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. Anonymization enables you to retain the original data format. Your teams work with fictional but realistic data. Manage all your data sources and maintain their usability. Invoke DOT Anonymizer functions from your own applications. Consistency of anonymizations across all DBMS and platforms. Preserve relations between tables to guarantee realistic data. Anonymize all database types and files like CSV, XML, JSON, etc.
  • 15
    IRI Data Protector Suite

    IRI Data Protector Suite

    IRI, The CoSort Company

    The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: ​IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you.
  • 16
    Infosys Test Data Management
    Infosys Test Data Management offering ensures a high degree of test coverage, by providing the right data, in the right quantity, and at the right time, in a non-production environment. It addresses Agile and DevOps integration, provides self-service data capability, leverages Machine learning for Data profiling and sensitivity analysis, intelligent data masking. It also ensures provision of data to cloud-based large Big Data transformation programs. The offering blends data management practices, in-house test data management tools and partner solutions to deliver end-to-end traceability of test data.
  • 17
    IRI CellShield
    IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. CellShield EE is the only full-featured, professional data discovery, masking, and auditing package for Excel 2010, 2013, 2016, and 2019 (plus Office 365) workbooks in your LAN. CellShield EE exceeds the security and scope of a single password by combining and automating all these extra capabilities.
  • 18
    Informatica Test Data Management
    We help you discover, create, and subset test data; visualize test data coverage; and protect data so you can focus on development. Automate provisioning of masked, subsetted, and synthetically generated data to meet development and testing needs. Identify sensitive data locations quickly with consistent masking in and across databases. Store, augment, share, and reuse test datasets to improve testers’ efficiency. Provision smaller data sets to minimize infrastructure requirements and speed performance. Use our comprehensive set of masking techniques to consistently protect data across applications. Support packaged applications to ensure solution integrity and speed deployments. Engage risk, compliance, and audit teams to align with data governance initiatives. Improve test efficiency with reliable, trusted production data sets; reduce server and storage footprints with data set sizes targeted for each team.
  • 19
    Oracle Data Masking and Subsetting
    The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
    Starting Price: $230 one-time payment
  • 20
    HushHush Data Masking
    Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms.
  • 21
    IBM Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • 22
    RansomDataProtect
    The optimal and innovative protection of your personal and sensitive data by the blockchain. RansomDataProtect allows for pseudonymizing personal data and sensitive data. Pseudonymization of data is one of the recommendations of the CNIL in terms of compliance with the GDPR rules and the fight against theft and leakage of sensitive data in the context of attacks of the ransomware type. Your data is secure and tamper-proof inside your files thanks to the innovative combination of variable encryption algorithms and a blockchain. The data that is not masked remains accessible to continue working on the documents with several people. RansomDataProtect easily integrates with your files using an add-in (Word, Excel, PowerPoint, Outlook, and Gmail). RansomDataProtect helps you to comply with the issues related to the general regulation on data protection. Remove security vulnerabilities due to password mismanagement within your company.
  • 23
    SmartSIP

    SmartSIP

    IntraNext Systems

    SmartSIP® is a premise-based software application that provides a DTMF suppression and masking solution for contact centers to securely capture sensitive cardholder data in live-operator calls. Customers use their touch-tone telephone to enter sensitive information while staying in contact with the contact center agent. With DTMF suppression and masking, tones entered by the customer are replaced with flat tones that cannot be converted back to the original data. Agent screens are populated with a masked representation of the customer's entry. SmartSIP effectively eliminates the verbal exchange of sensitive data between customers and agents allowing for full call recordings and full-screen capture. SmartSIP acts as a SIP proxy between the Session Border Controller (SBC or Media Gateway) and the voice platform and interacts with the DTMF data while never affecting the voice path. Developed specifically for VoIP telephony contact centers.
  • 24
    ShieldConex
    Tokenize PAN (primary account number) data and associated PII/PHI data so you maintain compliance for regulations governing the handling of sensitive data. PCI DSS scope reduction across all channels and trusted third parties. Tokenization masks data at the time of input and helps your organization meet evolving security standards. The ShieldConex platform provides vaultless, format-preserving tokenization for every data element. Payment data, including credit or debit card primary account number (PAN), expiration, date, CVV, cardholder name, and more. Standardize the payment experience across businesses, locations and channels including mobile, online, and in-store.
  • 25
    HoundDog.ai

    HoundDog.ai

    HoundDog.ai

    AI-powered code scanner designed to implement a proactive, shift-left strategy for sensitive data protection and privacy compliance. Product development outpaces privacy teams, leading to a constant need to update outdated data maps, which consumes much of their workload. Use HoundDog.ai’s AI-powered code scanner to continuously detect vulnerabilities (currently overlooked by SAST scanners) where sensitive data is exposed in plaintext through mediums such as logs, files, tokens, cookies, or third-party systems. Get essential context and remediation strategies, such as omitting sensitive data, applying masking or obfuscation, or using UUIDs instead of PII. Receive alerts when new data elements are introduced, based on their sensitivity levels, and prevent out-of-scope product changes from going live to avoid privacy incidents. Eliminate the manual and highly error-prone processes typically associated with security tasks.
  • 26
    IRI DarkShield

    IRI DarkShield

    IRI, The CoSort Company

    IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.
  • 27
    ALBERT

    ALBERT

    Google

    ALBERT is a self-supervised Transformer model that was pretrained on a large corpus of English data. This means it does not require manual labelling, and instead uses an automated process to generate inputs and labels from raw texts. It is trained with two distinct objectives in mind. The first is Masked Language Modeling (MLM), which randomly masks 15% of words in the input sentence and requires the model to predict them. This technique differs from RNNs and autoregressive models like GPT as it allows the model to learn bidirectional sentence representations. The second objective is Sentence Ordering Prediction (SOP), which entails predicting the ordering of two consecutive segments of text during pretraining.
  • 28
    Mage Dynamic Data Masking
    Mage™ Dynamic Data Masking module of the Mage data security platform has been designed with the end customer needs taken into consideration. Mage™ Dynamic Data Masking has been developed working alongside our customers, to address the specific needs and requirements they have. As a result, this product has evolved in a way to meet all the use cases that an enterprise could possibly have. Most other solutions in the market are either a part of an acquisition or are developed to meet only a specific use case. Mage™ Dynamic Data Masking has been designed to deliver adequate protection to sensitive data in production to application and database users while simultaneously integrating seamlessly with an organization's existing IT framework without the requirement of any additional architectural changes.​
  • 29
    Fasoo AI-R Privacy
    Fasoo AI-R Privacy is an AI-driven data privacy solution that helps organizations accurately locate, classify, and protect sensitive personal data across unstructured formats. Using advanced deep learning and natural language processing (NLP), the solution interprets context to detect personally identifiable information (PII) and apply automated masking or redaction based on predefined policies. Unlike traditional tools that rely on static pattern matching, Fasoo AI-R Privacy uses transformer-based models to understand how data is used within sentences, improving accuracy and reducing false positives. It’s especially effective for complex or hidden PII in free-text content, scanned files, and mixed data types. This solution is ideal for industries handling large volumes of personal data—such as healthcare, finance, and the public sector—where compliance with data protection laws is essential.
  • 30
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 31
    Pega Co-Browse
    There are no downloads, no installations, no plug-ins. Just tag your website with a single line of Javascript and customers can share their browser with a single click. With Pega Co-Browse, you can highlight and direct customers easily to the information they need. You can ask the customer to allow you to control their page and guide them or use highlighting features and or visual cues like arrows to point them in the right direction. With Pega Co-Browse, you can specify the sensitive information to be masked with HTML elements or form fields. All masked elements never leave the customer’s browser and are never seen by the representative. Pega Co-Browse provides a no code solution to mask or hide text fields or images. This allows companies to only show the agent the information they want the agent to view. With Pega Co-Browse, you can integrate with Pega Chat or your own chat platform. You can also integrate chat within your Pega Customer Service application.
  • 32
    MetaMask

    MetaMask

    Consensys

    Start exploring blockchain applications in seconds. Trusted by over 1 million users worldwide. Available as a browser extension and as a mobile app, MetaMask equips you with a key vault, secure login, token wallet, and token exchange—everything you need to manage your digital assets. MetaMask provides the simplest yet most secure way to connect to blockchain-based applications. You are always in control when interacting on the new decentralized web. MetaMask generates passwords and keys on your device, so only you have access to your accounts and data. You always choose what to share and what to keep private. MetaMask provides an essential utility for blockchain newcomers, token traders, crypto gamers, and developers. Over a million downloads and counting!
  • 33
    DataSunrise Database Security
    Data-Centric high-performance database security software. Regulatory Compliance with SOX, HIPAA, GDPR, PCI DSS and other privacy laws and standards. Hybrid and Multi-Cloud Database Security Proxy on AWS, Azure, Google and On-Prem. Sensitive and PII data auditing, discovery and active protection. Data Auditing enables real-time tracking of user actions and changes made to data and databases to ensure compliance-ready environment, increased visibility. Database Firewall, role based & location aware Data Access Control & Protection. Secure corporate databases in cloud & on-prem against hostile, negligent actions. Secures sensitive data in development and testing environments; Encryption; completely eliminates the possibility to reverse engineer the masked data. Real-time role and location based data masking of production data. Prevents exposure of sensitive privacy data while production data is not changed physically.
  • 34
    Credal

    Credal

    Credal

    Credal is the safest way to leverage AI at your enterprise. Our APIs, chat UI, and Slackbot automatically mask, redact or warn users about sensitive data, based on policies set by IT. Users get the most powerful AI apps like GPT-4-32k (the private and most powerful version of ChatGPT-4), Claude and others, whilst the Enterprise can control usage with confidence that data is secured and Audit Logged. Credal integrates with enterprise data sources like Google Drive, Confluence, and Slack so employees can seamlessly use AI with their existing knowledge assets whilst respecting source system permissions and masking sensitive data.
  • 35
    Teleskope

    Teleskope

    Teleskope

    Teleskope is a modern data protection platform designed to automate data security, privacy, and compliance at enterprise scale. It continuously discovers and catalogs data across cloud, SaaS, structured, and unstructured sources, classifying over 150 entity types such as PII, PHI, PCI, and secrets with high precision and high throughput. Once sensitive data is identified, Teleskope enables automated remediation, such as redaction, masking, encryption, deletion, and access correction, while integrating into developer workflows via its API-first model and supporting deployment as SaaS, managed, or self-hosted. The platform also builds prevention capabilities, embedding into SDLC pipelines to stop sensitive data from entering production systems, support safe AI adoption (without using unchecked sensitive data), handle data subject rights requests (DSARs), and map findings to regulatory standards (GDPR, CPRA, PCI-DSS, ISO, NIST, CIS).
  • 36
    Huawei Data Security Center
    Data Security Center (DSC) helps you effortlessly identify, mask, and protect sensitive data in structured and unstructured datasets. DSC displays high, medium, and low risks in data collection, transmission, storage, exchange, usage and deletion. You can efficiently locate the risks and take immediate actions to ensure data security. DSC precisely and efficiently identifies sensitive data sources based on the expert expertise and Natural Language Processing (NLP). DSC provides one-stop protection for both structured and unstructured data from a wide range of sources, such as Object Storage Service, databases, and big data sources. DSC leverages preset and user-defined masking algorithms to limit exposure of sensitive data, preventing unauthorized access to sensitive data. DSC provides sensitive data discovery, classification, and protection during all phases of data lifecycle management.
  • 37
    SAS Federation Server
    Create federated source data names to enable users to access multiple data sources via the same connection. Use the web-based administrative console for simplified maintenance of user access, privileges and authorizations. Apply data quality functions such as match-code generation, parsing and other tasks inside the view. Improved performance with in-memory data caches & scheduling. Secured information with data masking & encryption. Lets you keep application queries current and available to users, and reduce loads on operational systems. Enables you to define access permissions for a user or group at the catalog, schema, table, column and row levels. Advanced data masking and encryption capabilities let you determine not only who’s authorized to view your data, but also what they see on an extremely granular level. It all helps ensure sensitive data doesn’t fall into the wrong hands.
  • 38
    Randtronics DPM easyData
    DPM easyData is a high-performance data spoofing or de-identification engine. Data spoofing examples include masking, tokenization, anonymization, pseudonymization and encryption. DPM data spoofing processes replace whole or parts of sensitive data with a non-sensitive equivalent (creates fake data) and is a very powerful data protection tool. DPM easyData is a software data security solution that allows web and app server applications and databases to tokenize and anonymize data and apply masking policies for unauthorized users when retrieving sensitive data. The software allows a high level of granularity, defining which authorized users have access to which protection policies, and what operations they may perform with those protection policies. DPM easyData is extremely customizable and is able to protect and tokenize many different types of data. The software has been designed to be flexible and users are free to define any format of input data and token format.
  • 39
    MaskOff

    MaskOff

    Picom Technologies

    MaskOff is an Android & iOS app to unmask the identity of No Caller ID and unknown callers. The app is available in USA,UK,IL the app based on Call Forwarding function - every No Caller ID that coming by decline the call - it forward to MaskOff services and it unmasked - the number return in push notification or SMS.
  • 40
    Doculayer

    Doculayer

    Doculayer

    Forget about manual content classification and data entry. Doculayer.ai offers a configurable pipeline with document processing services like OCR, document type classification, topic classification, data extraction and data masking. Doculayer.ai puts business users in the driver's seat by making training/learning easy via an intuitive user interface for labeling of documents and data. With our hybrid data extraction approach machine learning models can be combined with rules, patterns and library scripts to obtain better results with less training data in less time. For the protection of sensitive data within documents, data masking can be anonymized or pseudonymized. Doculayer.ai adds document intelligence to your Content Services Platform, Business Process Management systems, and RPA solutions. Supercharge your existing IT environment for document processing with machine learning, natural language processing, and computer vision technologies.
  • 41
    Mage Static Data Masking
    Mage™ Static Data Masking (SDM) and Test data Management (TDM) capabilities fully integrate with Imperva’s Data Security Fabric (DSF) delivering complete protection for all sensitive or regulated data while simultaneously integrating seamlessly with an organization’s existing IT framework and existing application development, testing and data flows without the requirement for any additional architectural changes.
  • 42
    Benerator

    Benerator

    Benerator

    Describe your data model on an abstract level in XML. Involve your business people as no developer skills are necessary. Use a wide range of function libraries to fake realistic data. Write your own extensions in Javascript or Java. Integrate your data processes into Gitlab CI or Jenkins. Generate, anonymize, and migrate with Benerator’s model-driven data toolkit. Define processes to anonymize or pseudonymize data in plain XML on an abstract level without the need for developer skills. Stay GDPR compliant with your data and protect the privacy of your customers. Mask and obfuscate sensitive data for BI, test, development, or training purposes. Combine data from various sources (subsetting) and keep the data integrity. Migrate and transform your data in multisystem landscapes. Reuse your testing data models to migrate production environments. Keep your data consistent and reliable in a microsystem architecture.
  • 43
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
  • 44
    Honeywell MAXPRO
    The Honeywell MAXPRO VMS/NVR solutions conduct real-time monitoring of people within a building to determine compliance to a building’s customized guidelines on wearing mask and social distancing adherence with deep learning AI capabilities. The advanced analytics provide a very high accuracy, when used in the recommended operating conditions, and can isolate and report any instances of non-compliance to buildings and facilities managers. Currently, most building operators do not have effective ways of monitoring compliance with social distancing and mask guidelines. The easy-to-use interface provides live monitoring and counts the number of people in the field of view of the camera and detects masks or PPE. The solutions report on activity throughout the day so owners and managers can identify usage or issue trends and even manage access control if needed based on non-compliance events.
  • 45
    Randtronics DPM Database Manager
    Randtronics DPM Database Manager is designed to protect column level data in database. The software is able to do this without having to make any application level code changes - it is totally transparent to database users and applications. DPM Database Manager are able to protect data on Oracle, Microsoft SQL Server and IBM DB for iSeries databases. The software can mask the data in protected column, or tokenise the data when integrating with DPM Token Manager. Rules are designed to be extremely flexible, and it does not matter what level of access a user or application has - the software will even protect against database admins (DBAs) viewing sensitive data. All rules can be dynamically changed using the console, and applied immediately to the data. Masking of column level data in a transparent manner - no application level code changes needed. Tokenisation of column level data by integrating with DPM Token Manager.
  • 46
    Dataguise

    Dataguise

    Dataguise

    Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses,
  • 47
    SentiMask SDK

    SentiMask SDK

    Neurotechnology

    SentiMask is a software development kit for creating applications that use real-time 3D face tracking and facial expression analysis. It enables motion capture and digital character control for augmented reality, gaming and interactive environments. Using only a regular webcam or smartphone camera, SentiMask captures facial pose, landmarks, shape and expressions with high accuracy, generating a 3D facial mesh for animation or customization. The technology also estimates gender and age, detects features such as glasses, facial hair, or hats and performs 23 expression estimations including eye and mouth movement. Compatible with Windows, macOS, Linux, Android and iOS, SentiMask integrates easily with 3D modelling software and game engines, supporting virtual makeup, live avatars and character animation. It offers flexible licensing, free support, and delivers high-performance tracking without the need for advanced hardware.
  • 48
    ICQ

    ICQ

    ICQ

    Convert audio messages to text, use smart replies, stay online even with bad internet connection. ICQ works stably in the forest, and in bad weather, and when the provider has problems, and you are almost offline. ICQ converts voice messages into text - it will help you on the subway, at a couple, a meeting, or when you forgot your headphones. Read and subscribe to interesting channels, create group chats and chat with friends, use bots that make life easier. Have time to take a beautiful nickname with your first and last name. Plus to confidentiality — it is not necessary to share number. When the conversation gets boring, try on a mask. We made 30 animated 3D masks with familiar and unusual scenes. If you want to show beautiful photos and videos in high quality, send them without compression. And if the quality is not important, the file will be sent in a couple of seconds.
  • 49
    Chromatic

    Chromatic

    CoreMelt

    Chromatic is the most complete and flexible professional color grading plugin for Final Cut Pro X. Featuring integrated mask tracking, powerful color keying, and support for auto white balance including powerful linked grading capabilities using grade groups. Unlike other FCPX solutions, in Chromatic all of these functions and more are available in one powerful color correction product. We are constantly refining and adding new features to Chromatic and we love getting feedback and enhancement requests. Since the launch of Chromatic, we have added improved hotkeys, a gallery browser for your stack presets, compare buffers to quickly do shot-to-shot comparisons, exporting grades as CUBE files, auto balance, and more. This color grading plugin delivers an all-in-one Final Cut Pro X solution that puts the essential tools right at your fingertips in a simple clear interface, including tracked masks, with individual control of the overall grade, as well as inside and outside the mask.
  • 50
    OpenMask

    OpenMask

    OpenMask

    OpenMask is a browser‑based TON wallet and dApp gateway that brings first‑class wallet functionality and developer tools to The Open Network. Built as a MetaMask analog with a modern, functional‑style stack, it provides an in‑page TON Provider conforming to Ton Connect 2.0 and supports seamless Mainnet/Testnet switching with one click. Users gain secure, client‑only Web 3 access through a robust key vault that manages multiple wallets, integrates Ledger hardware for enhanced security, and enables biometric authentication for convenient, protected logins. OpenMask delivers full token, Jetton, and NFT management and simplifies interactions with proxy‑hosted TON Sites. As a Web 3.0 application, it generates passwords and keys locally and stores all data on the user’s device, ensuring that only the user controls account access and shared permissions. Developers benefit from a comprehensive RPC API and advanced connect and contract‑deployment modules.