Alternatives to Informatica Data Privacy Management

Compare Informatica Data Privacy Management alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Informatica Data Privacy Management in 2026. Compare features, ratings, user reviews, pricing, and more from Informatica Data Privacy Management competitors and alternatives in order to make an informed decision for your business.

  • 1
    Captain Compliance

    Captain Compliance

    Captain Compliance

    Captain Compliance is an all-in-one privacy management platform designed to simplify compliance with global data protection laws and new AI regulatory requirements. Our leading Consent Management Platform (CMP) allows businesses to effortlessly manage user consent and create customizable cookie banners. Our advanced Cookie Scanner automatically identifies and categorizes cookies on your website, ensuring ongoing compliance with a dynamic cookie policy. Our DSAR Portal streamlines data subject requests, while our AI Compliance tool monitors and adapts your practices based on evolving regulations and we even offer a virtual DPO and CPO if you need data privacy guidance. Additionally, our Hosted Privacy Policy generator automatically updates your privacy notices in real-time, keeping your policies aligned with the latest legal requirements. Captain Compliance provides the tools you need to protect user data and maintain regulatory compliance with ease at an affordable fee.
    Leader badge
    Compare vs. Informatica Data Privacy Management View Software
    Visit Website
  • 2
    OneTrust Privacy Automation
    Go beyond compliance and build trust through transparency, choice, and control. People demand greater control of their data, unlocking an opportunity for organizations to use these moments to build trust and deliver more valuable experiences. We provide privacy and data governance automation to help organizations better understand their data across the business, meet regulatory requirements, and operationalize risk mitigation to provide transparency and choice to individuals. Achieve data privacy compliance faster and build trust in your organization. Our platform helps break down silos across processes, workflows, and teams to operationalize regulatory compliance and enable trusted data use. Build proactive privacy programs rooted in global best practices, not reactive to individual regulations. Gain visibility into unknown risks to drive mitigation and risk-based decision making. Respect individual choice and embed privacy and security by default into the data lifecycle.
  • 3
    DATPROF

    DATPROF

    DATPROF

    Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
  • 4
    PrivIQ

    PrivIQ

    Compliance Technology Solutions

    PrivIQ is a complete data governance and privacy platform. We cover 8 data protection regulations representing 23% of the global economy PrivIQ is compliance software hosted in the cloud, that helps you to meet all the data protection regulations. Because we broke down the data protection regulations in 7 steps, you are able to manage your compliance journey, monitor the status and edit reports. From naming a DPO to managing subject access request and data breaches, PrivIQ is the all in one software you need to have to demonstrate compliance.
  • 5
    DataLark

    DataLark

    LeverX

    DataLark is an SAP-centric no-code / low-code data management platform that helps businesses streamline data migration, data maintenance, and integration processes. Using its customizable plugins and analytical tools, you can automate all ETL operations and orchestrate across all of your systems to drive better business decisions. DataLark's rapid deployment allows you to launch your data-related processes within hours with the help of live support and extensive documentation.
  • 6
    BigID

    BigID

    BigID

    BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2
  • 7
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
  • 8
    Mage Platform

    Mage Platform

    Mage Data

    Mage Data™ is the leading solutions provider of data security and data privacy software for global enterprises. Built upon a patented and award-winning solution, the Mage platform enables organizations to stay on top of privacy regulations while ensuring security and privacy of data. Top Swiss Banks, Fortune 10 organizations, Ivy League Universities, and Industry Leaders in the financial and healthcare businesses protect their sensitive data with the Mage platform for Data Privacy and Security. Deploying state-of-the-art privacy enhancing technologies for securing data, Mage Data™ delivers robust data security while ensuring privacy of individuals. Visit the website to explore the company’s solutions.
  • 9
    Mage Sensitive Data Discovery
    Uncover hidden sensitive data locations within your enterprise through Mage's patented Sensitive Data Discovery module. Find data hidden in all types of data stores in the most obscure locations, be it structured, unstructured, Big Data, or on the Cloud. Leverage the power of Artificial Intelligence and Natural Language Processing to uncover data in the most complex of locations. Ensure efficient identification of sensitive data with minimal false positives with a patented approach to data discovery. Configure any additional data classifications over and above the 70+ out of the box data classifications covering all popular PII and PHI data. Schedule sample, full, or even incremental scans through a simplified discovery process.
  • 10
    CYTRIO

    CYTRIO

    CYTRIO

    Automatically discover PI data across cloud and on-premises data stores and correlate with customer identity. Orchestrate data subject access requests (DSAR) and build customer trust. Enable customers to exercise data privacy rights with a secure, customizable privacy portal. Easily answer the critical who, what, why, and where questions about your PI data. Automated workflows for data, security, and privacy teams. Meet auditor obligations with detailed DSAR lifecycle history. Customizable and brandable privacy center. Secure communication and data download. Get up and running in minutes, no professional services required. Ideal for resource-constrained organizations. Data discovery, classification and ID correlation.
  • 11
    Mandatly

    Mandatly

    Mandatly

    Offers the ideal GDPR, CCPA, LGPD and other privacy compliance solutions to manage privacy management activities, build accountability and achieve regulatory compliance. Automates your privacy management program and ensure compliance with minimal manual effort. Built-in intelligence to analyze and assess risks, provide recommendations that enable mitigation. Enhanced dashboard and reporting capabilities provide visibility and enable decision making. Predefined PIA/DPIA questions templates, automated workflows and notification templates enable you to conduct assessments periodically and engage business teams and IT effectively. Workflow driven surveys to identify systems and personal data sources to generate "Record of Processing Activities (RoPA)." Predefined process steps to maintain data inventory efficiently. Fully automated process to fulfill DSAR, enabled with automated workflow and data discovery.
  • 12
    PrivacyPioneer

    PrivacyPioneer

    PrivacyPioneer

    Cover cap found from the data to delete the data life cycle of personal information protection systems, integrated automation, intelligence, visualization processing power, on the basis of the legal compliance, high efficiency and low cost to help business customers manage personal information, data Value innovation. Automatic personal data discovery, support structured and unstructured data, compatible with various mainstream databases. Construct a visual data map to visually display data attribution, relationship, processing history, etc. Manage the rights requests of data subjects and realize the automatic matching and response of personal information. Manage personal data processing behaviors and permissions, and ensure compliance with all access, processing behaviors, and access permissions. Intelligent privacy impact assessment and data protection impact assessment, combined with periodic automatic internal audits, minimize compliance risks.
  • 13
    Privacy360

    Privacy360

    Privacy360 Ltd

    Discover, measure and mitigate data privacy risk to quickly get in compliance with the growing number of privacy regulations, from GDPR to CCPA and beyond, in a single, end-to-end, enterprise-grade platform. Comply with GDPR, CCPA, LGPD, PDPA and the hundreds of evolving global privacy laws. Automate the capture and fulfillment of consumer and data subject access rights (DSAR) requests. Leverage intelligent risk mitigation to uncover and remediate risks faster and more comprehensively. Embed branded request forms on your website, or inside of your product. Leverage intelligent templates and manage request dates and extensions per regulation (GDPR, CCPA & beyond). Quickly track down data through connectors and quickly collaborate with data process owners to resolve. Monitor the entire process with a dashboard, revealing patterns or requests and ways to optimize the process. Quickly benefit from a comprehensive view of all your privacy data, locations, and all your processing activities.
  • 14
    Data Sentinel

    Data Sentinel

    Data Sentinel

    As a business leader, you need to trust your data and be 100% certain that it’s well-governed, compliant, and accurate. Including all data, in all sources, and in all locations, without limitations. Understand your data assets. Audit for risk, compliance, and quality in support of your project. Catalog a complete data inventory across all sources and data types, creating a shared understanding of your data assets. Run a one-time, fast, affordable, and accurate audit of your data. PCI, PII, and PHI audits are fast, accurate, and complete. As a service, with no software to purchase. Measure and audit data quality and data duplication across all of your enterprise data assets, cloud-native and on-premises. Comply with global data privacy regulations at scale. Discover, classify, track, trace and audit privacy compliance. Monitor PII/PCI/PHI data propagation and automate DSAR compliance processes.
  • 15
    Privacy Tools

    Privacy Tools

    Privacy Tools

    Stay compliant with the most advanced privacy management solution. Manage cookies and make your portal compliant. Create and manage your website policies. Register and manage universal consent. Comply with the rights of data subjects. Let the user exercise their preferences. Generate monitoring reports on your projects. React quickly and provide the necessary notifications. Discover, analyze, and correct data at scale. Define and implement the controls, actions, and strategies of your ESG program. Allows you to register, manage, and renew the consent of data subjects, integrating them with the tools used by the organization. A module for capturing and managing consents, which works universally. Our solution allows simple integration with your website and systems for managing consents, such as terms of use, marketing, cookies, applications, authorizations, and others. Identify which users consented or revoked their consent, presenting an audit of these events.
  • 16
    1touch.io Inventa
    Partial visibility into your data is putting your organization at risk​. 1touch.io uses a unique network analytics approach, powerful ML and AI techniques together with unprecedented data lineage accuracy to continuously discover and catalog all your sensitive and protected data into a PII Inventory and a Master Data Catalog. We automatically discover and analyze all usage of data and its lineage without relying upon the organization’s knowledge of the existence or location of the data. Adding a multilayer machine learning analytic engine gives us the ability to “read and understand” the data and link all the pieces into a full picture represented as both a PII inventory and a Master Catalog. Finding your known and unknown sensitive data within your network allows for immediate risk reduction. Organizing your data flow to understand precise data lineage and business processes enables you to achieve core compliance requirements.
  • 17
    Cloud Compliance

    Cloud Compliance

    Cloud Compliance

    Operationalize privacy compliance and data security on Salesforce with the most comprehensive suite of products. The success of privacy programs requires thorough data inventory and risk assessment. However, most organizations end up overlooking pockets of data and struggle with manual processes and spreadsheets. Our Personal Data Inventory product is designed to automate and streamline DPIA and enterprise data inventory flows. Make it easy for your organization to have an accurate data inventory and clear risk assessment. Most organizations are seeing an increase in privacy right requests. Trying to meet these requests manually is inconsistent, error-prone, and increases the risk of non-compliance. Our Privacy Rights Automation product enables self-service and automates all privacy rights related activities. Mitigate the risk of non-compliance with a standardized and error-free solution.
  • 18
    Secuvy AI
    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 19
    PK Privacy
    Organizations are required to keep up with the ever-changing privacy landscape, and protect personally identifiable information they interact with. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation. Automate the DSAR response process to meet requirements faster and on budget. Create rules that will delete or redact sensitive data as soon as it is found. Enable pseudonymization, anonymization, and de-identification of private personal data. Find data that can and/or should legally be archived or deleted due to age or lack of use. Detect and confirm breaches with monitoring, then accurately estimate and report on the breach’s impact. Continuously monitor endpoints, servers, and enterprise solutions for privacy data. Organizations are required to keep up with the ever-changing privacy landscape and protect personally identifiable information they interact with.
  • 20
    Opsware

    Opsware

    Opsware

    Legal and engineering teams are using Opsware to embed privacy workflows across their organizations to simplify compliance with modern privacy laws. No coding is required. Eliminate the tedious work that comes with building data maps and managing vendors. Discover data sources using our fast and reliable data discovery and classification solutions. Trust our automation technology to complete your customers' data requests and consent changes across every data system and vendor. Get your teams on one tool and workflow. Track the flow of personal data across your company to operationalize compliance and get visibility into risk. We cover the workflows required to build out processing records with a single click. Your company data is fully controlled by you. Provision our virtual appliance on-premise so you can ensure that personal data doesn't leave your secure data context. Every business is data first and every company collects personal data.
  • 21
    Teleskope

    Teleskope

    Teleskope

    Teleskope is a modern data protection platform designed to automate data security, privacy, and compliance at enterprise scale. It continuously discovers and catalogs data across cloud, SaaS, structured, and unstructured sources, classifying over 150 entity types such as PII, PHI, PCI, and secrets with high precision and high throughput. Once sensitive data is identified, Teleskope enables automated remediation, such as redaction, masking, encryption, deletion, and access correction, while integrating into developer workflows via its API-first model and supporting deployment as SaaS, managed, or self-hosted. The platform also builds prevention capabilities, embedding into SDLC pipelines to stop sensitive data from entering production systems, support safe AI adoption (without using unchecked sensitive data), handle data subject rights requests (DSARs), and map findings to regulatory standards (GDPR, CPRA, PCI-DSS, ISO, NIST, CIS).
  • 22
    Data443 Global Privacy Manager
    We make it possible for retailers to champion their customers’ privacy rights while maintaining conversion and simplifying SAR processing. Make your privacy settings the new standard for user experience and customer service. Give your customers clear access to easy-to-understand settings. Give customers a one-stop location for all their privacy needs. Provide clear, accurate explanations of the data you collect and how it is used. Earn increased trust in return. All-or-nothing consent doesn’t benefit you or your customers. Allowing customers to opt-in or out of specific data collection gives them more control and improves your conversion rates. Provide an easy-to-understand report that allows customers to see what data you’ve collected, how it’s being used, and that it’s being protected properly. Enhance your customers’ privacy experience with rapid responses to Subject Access Requests (SARs) while simplifying processing for your team.
  • 23
    DatAnswers

    DatAnswers

    Varonis

    Easily respond to data subject access requests by surfacing personal information across cloud and on-prem files with fast and powerful search. Find any file with personal data in seconds with Varonis’ purpose-built search engine. We instantly surface and collect the information you need for DSARs, right to be forgotten, or e-discovery—all with super lean infrastructure. Our DSAR form uses sophisticated logic on the backend to ensure you get high-fidelity results, so you can avoid false positives (and fines). Keep a pulse on how much data you’ve indexed and any failed documents so that you always know the scope of your searches. Sensitive data creation doesn’t stop and privacy regulations are ever-evolving. Privacy automation can help you stay ahead. Easily see where you have overexposed PII with dynamic dashboards that highlight privacy issues. Reduce the risk of breaches and fines by monitoring for unauthorized access to sensitive information and restricting access to least privilege.
  • 24
    Salesforce Privacy Center
    Salesforce Privacy Center is a robust data privacy management solution designed to help businesses comply with privacy laws like the GDPR. It allows users to easily de-identify and delete sensitive data, streamline data subject access requests (DSARs), and simplify customer consent management. The platform features tools like the Preference Manager to manage consent and configure no-code templates for customer communication preferences. By ensuring proper data handling and compliance with privacy regulations, Privacy Center helps businesses mitigate risks while preparing data for applications like Agentforce and Customer 360.
  • 25
    DataGrail

    DataGrail

    DataGrail

    DataGrail is a complete, AI-powered privacy automation platform for privacy, legal, and security teams at the world’s leading brands. Brands like Bed Bath & Beyond, Sportsman’s Warehouse, Carvana and more choose DataGrail for: → Enterprise-grade consent management → AI-powered data mapping and risk intelligence → Deep integration and end-to-end privacy automation → Industry-best support and privacy expertise Founded in 2018 and now headquartered in San Francisco, CA, DataGrail helps brands eliminate privacy risk, build customer trust, and ensure compliance with ever-evolving regulatory demands.
  • 26
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
  • 27
    Manetu

    Manetu

    Manetu

    The Manetu data crypto-vault provides enterprise class personal and sensitive data management services across critical business priorities. A repository where personal and, or sensitive data is ingested, secured and de-identified such that it can be used for analytics, testing, discovery and, other revenue generating capabilities. Data use across organizations compromises security, privacy and, consent. Needs a copy of the data to develop new applications to maintain good client satisfaction. Needs a copy of the data to run new sales plays, grow the business or deliver on goods and services. Needs a copy of the data for analysis to create new, targeted marketing campaigns. Needs a copy of the data to run reports on how the business is doing. Needs a copy of the data to develop new models and algorithms to drive margin expansion. These data usage models propagate risk as more exposure is created throughout an organization.
  • 28
    Privacy Nexus

    Privacy Nexus

    Privacy Nexus

    Create and maintain your record of data processing activities with ease and in accordance with article 30 of the GDPR. Use the dashboard to track your progress, identify risks and determine priorities. The dashboard is the perfect starting point for all privacy professionals. Perform data protection impact assessments to identify privacy risks and to take appropriate measures to minimize them. Handle your incidents and data breaches with a clear workflow that guides you through the process from beginning to end. ‍Send out questionnaires to your vendors to periodically assess their compliance with your data processing agreements. ‍Create a clear overview of all the data subject requests your organization has received and monitor their progress. ‍Use the privacy, information security and data management scans to establish how your organization is doing in these areas and receive recommendations for improvement.
  • 29
    Proteus NextGen Data Privacy
    Proteus NextGen Data Privacy software provides DPOs, Privacy teams and Legal teams with the data privacy management tools required to manage GDPR compliance, CCPA compliance or other data privacy compliance programme, comprehensively and effectively. Designed for enterprise organisations using current, secure technologies, Proteus NextGen is often regarded as the most highly configurable and comprehensive data privacy software on the market. Covering Privacy Impact Assessments, DPIAs, Transfer Impact Assessments, data mapping, reporting (eg Records of Processing Activity reports), Subject Access Request management, breach notification, vendor management, risk assessment and even automated SCC generation to help with Schrems II compliance, plus other features you would and would not expect. With training and consultancy available to get you up and running quickly, we aim for ultimate customer satisfaction. Go to our website to request a demo www.proteuscyber.com
  • 30
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
  • 31
    Iconfirm

    Iconfirm

    Iconfirm

    Ensuring high precision privacy provides greater opportunity for data-driven value creation and reduces the risk of a breach. This requires a systemic approach and to organize the work in the right way. Many organizations struggle with lack of competence and resources and a growing gap between policies and practice. This represents an unnecessary risk and organizations need to operationalize and automate. Privacy cannot be organized segregated from ordinary activities, but must be embedded where the processing of data actually happens. Iconfirm ensures efficient and structured collaboration between individuals, systems and organizations to automate privacy documentation and adherence. A high precision tool for consents or confirmations. Efficient management of data processors and vendors. Data subjects privacy portal builds trust and makes it easy to collaborate. Secure storage, sharing and automated erasure across systems.
  • 32
    Data Identification Manager™

    Data Identification Manager™

    Data443 Risk Mitigation, Inc.

    Data Identification Manager™ takes the effort out of classifying your data by applying the same rules, technology, machine learning, and ongoing classification stewardship throughout the organization. This ensures always-accurate, continually relevant data security for your whole IT estate. Get the breakdown of how many files have no duplicates, are original files, or how many files are exact duplicate files for better data management. See your files broken down into several ways, including file growth over time, how old the files are and the size and type of file present.
  • 33
    MineOS
    💯 The #1-rated Data Privacy & Security platform on G2, custom-built with a people-centric approach to please and empower privacy and compliance professionals. We're so confident you'll love our platform, too, that our PoCs are completely free. Thanks to the fastest implementation time and the highest ROI on the market, companies can strengthen their privacy programs to handle DSARs, RoPA reports, and other privacy tasks faster and get true oversight over user data within days. We’re innovating the sphere so anyone within an organization can use and understand the value of data privacy through: Email Navigator Technology, Continuous Data Classification & Smart Sampling, Mine Radar, Data Mapping, Automated DSR/DSAR, Automated ROPA, DPIA and PIA reports, AI Suggestions, Consent Management, Vendor Risk Assessment. With MineOS, you’re not just investing in data governance, you’re creating a two-way street with your customers to show you respect their digital rights. MineOS.ai
  • 34
    Actifile

    Actifile

    We-Bridge

    Holistic. Automated. Real-time. Actifile automates data risk assessments, ongoing sensitive data monitoring and data protection. Find out how much your company could lose from cyber attack on data. See exactly how your files are moving in the organization and prevent files from leaving your internal network. Encrypt and protect sensitive data to stop data leakage in the event of a ransomware attack. Actifile's client deploys automatically and seamlessly in your organization endpoints. Gain visibility into risks that may expose sensitive data. Reduce organizational risk by making it harder for bad actors to get at your data. Actifile’s Risk Portal displays number of files, number of records and an assessment of the monetary risk the data would pose if a data privacy incident were to happen. Actifile is a 100% software-based solution so that you can get up and running in minutes without purchasing dedicated hardware to run it.
  • 35
    PrivacyEngine

    PrivacyEngine

    PrivacyEngine

    The easy-to-use data privacy and GDPR software for all your organization’s Data Privacy compliance needs. We’ve put all our data protection experience and expertise into one software-as-a-service platform, to save you time and money when implementing and managing your data privacy compliance program. Organizations using PrivacyEngine can save between €10,000 and €50,000 annually by eliminating legal fees, in addition to slashing the amount of time spent performing essential data privacy-related processes. Whether your organization needs to manage programs for GDPR, CCPA or any other of the emerging data privacy regulations around the world PrivacyEngine has you covered. PrivacyEngine is a complete data privacy software as a service platform incorporating data privacy management & advisory, data privacy training, and vendor assessment. PrivacyEngine takes care of all your privacy management regulatory needs, including managing individuals’ rights, reporting data breaches and incidents.
  • 36
    Pontus Vision

    Pontus Vision

    Pontus Vision

    We extract personal data through hundreds of integrations into database, CRM, ERP and proprietary systems. Including unstructured data such as emails, PDFs, Word and spreadsheets. We map data by tracking all Extract step locations, identifying customer data with as little information as possible, supporting billions of records. Consolidation of all data, resulting in a graphic or textual view of the risks of all the organization's databases, using a score based on 12 steps, following the main points of the LGPD. Our solution does not rely on any specific technology from the cloud provider. The solution can be deployed at on-premises data centers, or at any cloud provider. Pontus Vision LGPD's architecture has minimal manual steps to allow large amounts of data to be processed. The solution supports flow of billions of records. Pontus Vision LGPD was designed and built as a modular solution that is capable of taking data from hundreds of different formats.
  • 37
    Responsum

    Responsum

    Responsum

    Simplify and automate your Privacy compliance challenges with an all-in-one Privacy Management software. Minimize risks for your organization and turn Privacy into a competitive advantage. Privacy management is an essential, everyday duty of privacy teams. However, privacy professionals are often under tremendous pressure to ensure compliance in their organization, while often their teams are understaffed or do not have the right tools to support their work. Get the support you need through RESPONSUM’s Privacy modules. From keeping records of your processing activities to performing TIA or LIA, and executing DPIAs, you can gather all the information you need in one place and access it at any time you need it. No matter the sector your business is operating in, you need to adopt a security strategy to be aware of the operations that need a specific level of security. With the Security module, you can define and manage security controls, manage external vendors and stakeholders.
  • 38
    Osano

    Osano

    Osano

    Finally, an easy solution to data privacy laws. Osano is an easy-to-use data privacy platform that instantly helps your website become compliant with laws such as GDPR and CCPA. Osano works to keep you out of trouble and monitors all of the vendors you share data with – so you don’t have to. Data compliance used to be a manual, complicated process. You don't need to be a compliance professional to use Osano. What used to take training and months of work, now takes minutes! Instantly help your website comply with all data privacy laws. Plus explore vendor risk for more than 10,000 companies in a flash. Are we missing a vendor? Request it and our attorneys will review it within 24 hours. Connect the data dots to see what's hiding. Your vendors have vendors, who have vendors, who have... How far does your data go? See in an instant with our visual vendor exploration tool. New privacy laws are introduced weekly.
  • 39
    Ohalo

    Ohalo

    Ohalo

    Ohalo's Data X-Ray platform automates data governance tasks like: - Data Discovery & Classification - Data Mapping & Cataloguing - Redacting Files containing sensitive personal information - File Analysis & Data Extraction ⚡️ML-Driven Data Governance | 100,000 words/second | 300+ built-in Integrations | Integration with any DLP/SIEM | 360-degree Unstructured Data Visibility | Agentless | Supports 100s of formats | Find PII, payment card information (PCI), and protected health information (ePHI). | Custom connectors for individual data sources (bespoke/legacy) ⚡️ Designed for enterprises, Data X-Ray is provided as a self-managed or fully-managed service. Our customers rely on Data X-Ray for file activity monitoring, security enhancement, and privacy compliance. ⚡️ Deploy Data X-Ray in hours in cloud and on-premise environments ⚡️ Find sensitive data in minutes ⚡️ Easily classify files and records from multiple file repositories and locations
  • 40
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 41
    Piiano

    Piiano

    Piiano

    Emerging privacy policies often conflict with the architectures of enterprise systems that were not designed with sensitive data protection in mind. Piiano pioneers data privacy engineering for the cloud, offering the industry’s first personal data protection and management platform to transform how enterprises build privacy-forward architecture and operationalize privacy practices. Piiano provides a pre-built, developer-friendly infrastructure to dramatically ease the adoption or acceleration of enterprise privacy engineering and help developers build privacy-by-design architecture. This engineering infrastructure safeguards sensitive customers’ data, preempts breaches, and helps enterprises comply with privacy regulations as they evolve. The Vault is a dedicated, protected database for centralizing sensitive information that developers can install into enterprise VPC (Virtual Private Cloud). This ensures that the vault–and everything in it–is only accessible to the enterprise.
  • 42
    Raptor Compliance

    Raptor Compliance

    Raptor Compliance

    Evaluate your high-risk data processing. Risks must be controlled and monitored. For this purpose it is necessary to define responsibilities. Data protection impact assessment documentation is an important tool for authorities and other stakeholders to demonstrate the lawfulness of processing operations that present risks. What is the risk in a procedure, what are the risks to the rights and freedoms of natural persons? These must be determined. How high is the risk? What effects and probabilities are associated with a risk? These factors determine to a large extent whether processing can take place. The DPMS creates a web form for you to integrate into your digital channels. In this way, inquiries are immediately recorded in case management. Case Management provides you with an overview of current cases and their processing. Of course, each case processing is logged in order to fulfill the legal obligations to provide evidence.
  • 43
    DATA LEGAL DRIVE

    DATA LEGAL DRIVE

    DATA LEGAL DRIVE

    The diagnostic allows you to assess your GDPR compliance level. It will help you identify areas for improvement, build an action plan, and prioritize the steps required to move smoothly through the compliance process. Work collaboratively and speed up processing mapping using built-in templates. Select standard processing activities or add new ones, complete the information required and validate to finalize processing mapping. Whether you’re contacting data subjects or processing their requests via secure authentication, it’s easy to manage and archive data subject requests from your employees, customers or service providers directly, all on a single platform. Discover the highly intuitive, simple and secure user interface. Automate your processes, map your processing activities and generate your record in a few clicks, easily manage and archive employee, customer and service provider DSRs. Use built-in templates to create standard contracts, clauses, emails et legal notices.
  • 44
    Collibra

    Collibra

    Collibra

    With a best-in-class catalog, flexible governance, continuous quality, and built-in privacy, the Collibra Data Intelligence Cloud is your single system of engagement for data. Support your users with a best-in-class data catalog that includes embedded governance, privacy and quality. Raise the grade, by ensuring teams can quickly find, understand and access data across sources, business applications, BI and data science tools in one central location. Give your data some much-needed privacy. Centralize, automate and guide workflows to encourage collaboration, operationalize privacy and address global regulatory requirements. Get the full story around your data with Collibra Data Lineage. Automatically map relationships between systems, applications and reports to provide a context-rich view across the enterprise. Hone in on the data you care about most and trust that it is relevant, complete and trustworthy.
  • 45
    Securiti

    Securiti

    Securiti

    Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid multicloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance. Securiti has been recognized with numerous industry and analyst awards, including "Most Innovative Startup" by RSA, "Top 25 Machine Learning Startups" by Forbes, "Most Innovative AI Companies" by CB Insights, "Cool Vendor in Data Security" by Gartner, and "Privacy Management Wave Leader" by Forrester. For more information, please follow us on LinkedIn and visit Securiti.ai.
  • 46
    Transcend

    Transcend

    Transcend

    Transcend is the data privacy infrastructure that makes it simple for companies to give their users control over their personal data. Personal data is disorganized, hard to spot, and stored across many systems. That makes offering data rights—like deleting your data—very hard for companies. Transcend automatically fulfills data subject requests inside companies, across all of their data systems and vendors. Transcend also provides their end-users with a control panel, or “Privacy Center”, hosted at privacy.<company>.com where users can manage their privacy preferences, export their data, or delete it. By making data subject requests painless for companies, Transcend is putting users everywhere in the driver’s seat of their personal data.
  • 47
    Exterro

    Exterro

    Exterro

    Comprehensive end-to-end eDiscovery software. From preservation to production, Exterro’s software platform enables you to manage and optimize all your e-discovery activities in one place. Exterro unifies the entire e-discovery process, allowing you to get to the facts of the case sooner at a fraction of the cost. The Exterro Software Platform is a single, fully integrated solution that unifies all of Exterro's E-Discovery and Information Governance products. With over 30 data integrations, quickly collect data from a variety of commonly used data sources to learn more about your case sooner. Save time and money by identifying only relevant material prior to collection, reducing the total data set. Exterro’s Privacy solutions enable your team to quickly and easily orchestrate processes for complying with critical requirements of the European Union’s General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA) and other privacy regulations.
  • 48
    Siemly

    Siemly

    Siemly Global

    Siemly automates and simplifies internal and external processes saving you time and money. Siemly can track all customer "opt-ins" and requests and apply automated workflows to respond and track customer interactions. Siemly makes it easy to respond to data subject access requests (DSARs). Ensure compliance with regulations and demonstrate to auditors, regulators, and your customers, a strong commitment to data privacy and compliance with the Siemly platform.
  • 49
    Wrangu Privacy Hub
    Our Data Privacy Management Software, Privacy Hub, combines the flexibility to meet your business needs, whilst creating efficiencies to drive your ROI, and delivering transparency to keep the board happy. We have a suite of Data Privacy Management software and solutions to aid your privacy compliance journey. We support your business as you mature on your privacy management journey. Global privacy laws like the GDPR, CCPA, and others, have led to organizations changing the way they think about data privacy management. Privacy Hub by Wrangu is a powerful and easy-to-use data privacy management software that solves these challenges at scale, allowing organizations to simplify their privacy program management in a single source of truth. Our data privacy management software, Privacy Hub, automates and harmonizes the disparate activities of various teams into one seamless outcome ensuring ongoing compliance.
  • 50
    DataGuard

    DataGuard

    DataGuard

    Achieve your security and compliance goals with DataGuard’s all-in-one platform, designed to simplify compliance with frameworks like ISO 27001, TISAX®, NIS2, SOC 2, GDPR, and the EU Whistleblowing Directive. DataGuard’s iterative risk management enables you to capture all relevant risks, assets and controls to reduce risk exposure from day one. Automated evidence collection and control monitoring ensure ongoing governance to safeguard your organization as it scales. The platform combines AI-powered automation with expert support, reducing manual effort by 40% and fast-tracking certification by 75%. Join 4,000+ companies driving their security and compliance objectives with DataGuard. Disclaimer: TISAX® is a registered trademark of the ENX Association. DataGuard is not affiliated with the ENX Association. We provide Software-as-a-Service and support for the assessment on TISAX® only. The ENX Association does not take any responsibility for any content shown on DataGuard's website