Alternatives to LeapYear
Compare LeapYear alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to LeapYear in 2026. Compare features, ratings, user reviews, pricing, and more from LeapYear competitors and alternatives in order to make an informed decision for your business.
-
1
Immuta
Immuta
Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI. -
2
PHEMI Health DataLab
PHEMI Systems
The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden. PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools. -
3
Kodex
Kodex
Privacy engineering is an emerging field that has intersections with data engineering, information security, software development, and privacy law. Its goal is to ensure that personal data is stored and processed in a legally compliant way that respects and protects the privacy of the individuals this data belongs in the best possible way. Security engineering is on one hand a requirement for privacy engineering but also an independent discipline that aims to guarantee the secure processing and storage of sensitive data in general. If your organization processes data that is either sensitive or personal (or both), you need privacy & security engineering. This is especially true if you do your own data engineering or data science. -
4
IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
-
5
Piiano
Piiano
Emerging privacy policies often conflict with the architectures of enterprise systems that were not designed with sensitive data protection in mind. Piiano pioneers data privacy engineering for the cloud, offering the industry’s first personal data protection and management platform to transform how enterprises build privacy-forward architecture and operationalize privacy practices. Piiano provides a pre-built, developer-friendly infrastructure to dramatically ease the adoption or acceleration of enterprise privacy engineering and help developers build privacy-by-design architecture. This engineering infrastructure safeguards sensitive customers’ data, preempts breaches, and helps enterprises comply with privacy regulations as they evolve. The Vault is a dedicated, protected database for centralizing sensitive information that developers can install into enterprise VPC (Virtual Private Cloud). This ensures that the vault–and everything in it–is only accessible to the enterprise. -
6
Mage Platform
Mage Data
Mage Data™ is the leading solutions provider of data security and data privacy software for global enterprises. Built upon a patented and award-winning solution, the Mage platform enables organizations to stay on top of privacy regulations while ensuring security and privacy of data. Top Swiss Banks, Fortune 10 organizations, Ivy League Universities, and Industry Leaders in the financial and healthcare businesses protect their sensitive data with the Mage platform for Data Privacy and Security. Deploying state-of-the-art privacy enhancing technologies for securing data, Mage Data™ delivers robust data security while ensuring privacy of individuals. Visit the website to explore the company’s solutions. -
7
Anonomatic
Anonomatic
Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations. -
8
Trūata Calibrate
Trūata
Operationalize your data pipelines with privacy-centric data management software. Trūata Calibrate empowers organizations to make data usable while leveraging privacy as a commercial differentiator. Our frictionless, cloud-native software enables businesses to operationalize privacy-compliant data pipelines at speed, so teams can work with data responsibly and confidently. Powered by intelligent automation, Trūata Calibrate facilitates fast and effective risk measurement and mitigation via a centralized dashboard. The platform provides a smart, standardized solution for managing privacy risks and ensures that data can be effectively transformed for safe use right across your business ecosystem. Access dynamic recommendations for data transformation and view privacy-utility impact simulations before performing forensically targeted de-identification to mitigate risks. Transform data to create privacy-enhanced datasets that can be shared or transferred and used responsibly by teams.Starting Price: $5,000 per month -
9
NMTY Enterprise
NMTY
NMTY Enterprise helps you protect all your privacy-sensitive data within your organization, regardless if it is stored in databases or files. Make NMTY Enterprise part of your IT environment and immediately anonymize all data sources that need to be protected. NMTY Enterprise makes it possible to anonymize data regardless of how it is stored, from databases to individual files. Anonymize data stored in a database or in separate files such as CSV and XML. Data is always anonymized directly within the source. This prevents non-anonymized data from being duplicated unnecessarily. Connections to your data sources support integrated authentication and are always encrypted when stored. In addition to anonymizing datasets, it is also possible to directly anonymize data processed within documents and images. Our solutions are developed based on the latest innovations and integrate directly into your existing processes. This way we ensure we always achieve the maximum result. -
10
Informatica Dynamic Data Masking
Informatica
Your IT organization can apply sophisticated masking to limit sensitive data access with flexible data masking rules based on a user’s authentication level. Blocking, auditing, and alerting your users, IT personnel, and outsourced teams who access sensitive information, it ensures compliance with your security policies and industry and civil privacy regulations. Easily customize data-masking solutions for different regulatory or business requirements. Protect personal and sensitive information while supporting offshoring, outsourcing, and cloud-based initiatives. Secure big data by dynamically masking sensitive data in Hadoop. -
11
Privacy Analytics
Privacy Analytics
Privacy Analytics provides data anonymization services and software for organizations in the consumer and healthcare industries. We enable you to use your sensitive data assets safely and responsibly for innovation that benefits everyone. With Privacy Analytics you can safely de-identify health data to the highest standard, while preserving its utility. Regulatory deadlines are getting more stringent. Timelines to fulfill data requests are getting tighter. Pressure to uphold your company’s reputation has never been more apparent. The climate around data privacy continues to intensify. Everyone from consumers to regulators are holding organizations accountable. With so many stakeholders demanding more transparency, the pressure for drug makers to safely disclose clinical data and documents has never been higher. And as pressure rises, so too does the bar for privacy. You need solutions that both maximize transparency and protect the privacy of trial participants. -
12
Databunker
Databunker
Databunker is a lightning-fast, open-source vault developed in Go for secure storage of sensitive personal records. Protect user records from SQL and GraphQL injections with a simple API. Streamline GDPR, HIPAA, ISO 27001, and SOC2 compliance. Databunker is a special secure storage system designed to protect: - Personally Identifiable Information (PII) - Protected Health Information (PHI) - Payment Card Industry (PCI) data - Know Your Customer (KYC) recordsStarting Price: Free -
13
Tonic
Tonic
Tonic automatically creates mock data that preserves key characteristics of secure datasets so that developers, data scientists, and salespeople can work conveniently without breaching privacy. Tonic mimics your production data to create de-identified, realistic, and safe data for your test environments. With Tonic, your data is modeled from your production data to help you tell an identical story in your testing environments. Safe, useful data created to mimic your real-world data, at scale. Generate data that looks, acts, and feels just like your production data and safely share it across teams, businesses, and international borders. PII/PHI identification, obfuscation, and transformation. Proactively protect your sensitive data with automatic scanning, alerts, de-identification, and mathematical guarantees of data privacy. Advanced sub setting across diverse database types. Collaboration, compliance, and data workflows — perfectly automated. -
14
PK Protect
PKWARE
PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. The platform integrates with various systems to provide a unified approach to managing data security across cloud, on-premises, and hybrid environments. By offering real-time visibility and proactive threat detection, PK Protect helps organizations maintain control over their sensitive data and reduce security vulnerabilities. -
15
Informatica Persistent Data Masking
Informatica
Retain context, form, and integrity while preserving privacy. Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments. As a highly scalable, high-performance data masking solution, Informatica Persistent Data Masking shields confidential data—such as credit card numbers, addresses, and phone numbers—from unintended exposure by creating realistic, de-identified data that can be shared safely internally or externally. It also allows you to reduce the risk of data breaches in nonproduction environments, produce higher-quality test data and streamline development projects, and ensure compliance with data-privacy mandates and regulations. -
16
xtendr
xtendr
xtendr unhides detailed, privacy-preserving insights across multiple independent data sources. xtendr enables access to thus far inaccessible data, and protects you during your entire data lifecycle, giving you confidence in complete privacy and regulatory compliance. xtendr is more than anonymity, it’s the critical missing piece for multi-party data sharing with true privacy protection - it is cryptography on duty so you can reach your full potential. The most advanced privacy-enhancing data collaboration technology. xtendr solved the decades-long cryptography challenge of data sharing between mutually mistrustful parties. Take your business further with an enterprise-grade data protection offering that allows individual organizations to form data partnerships while protecting sensitive data. Data is the currency of our digital age. Some argue that it is replacing oil as the world's most valuable resource and there is no doubt about its growing importance. -
17
Syntho
Syntho
Syntho typically deploys in the safe environment of our customers so that (sensitive) data never leaves the safe and trusted environment of the customer. Connect to the source data and target environment with our out-of-the-box connectors. Syntho can connect with every leading database & filesystem and supports 20+ database connectors and 5+ filesystem connectors. Define the type of synthetization you would like to run, realistically mask or synthesize new values, automatically detect sensitive data types. Utilize and share the protected data securely, ensuring compliance and privacy are maintained throughout its usage. -
18
Privacy1
Privacy1
Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmenStarting Price: $159 per month -
19
TokenEx
TokenEx
Alongside Payment Card Information (PCI), Personally Identifiable Information (PII) also known as personal information and Protected Health Information (PHI) have become a favorite target of hackers. TokenEx can tokenize any type of data, so PII, PHI, PCI, ACH, etc. can be safely vaulted away from business systems and replaced with tokens that are mathematically unrelated to the original data and, thus, useless to data thieves. Tokenization offers virtually unlimited flexibility in how you store, access, and secure your sensitive data sets. -
20
Protegrity
Protegrity
Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making. -
21
Tumult Analytics
Tumult Analytics
Built and maintained by a team of differential privacy experts, and running in production at institutions like the U.S. Census Bureau. Runs on Spark and effortlessly supports input tables containing billions of rows. Supports a large and ever-growing list of aggregation functions, data transformation operators, and privacy definitions. Perform public and private joins, filters, or user-defined functions on your data. Compute counts, sums, quantiles, and more under multiple privacy models. Differential privacy is made easy, thanks to our simple tutorials and extensive documentation. Tumult Analytics is built on our sophisticated privacy foundation, Tumult Core, which mediates access to sensitive data and means that every program and application comes with an embedded proof of privacy. Built by composing small, easy-to-review components. Provably safe stability tracking and floating-point primitives. Uses a generic framework based on peer-reviewed research. -
22
Rixon
Rixon
Maximize data security & solve data privacy concerns with the fastest cloud-native vaultless tokenization platform. Knowing your business meets and exceeds compliance requirements gives you the time and peace of mind to focus on what is important for your business. Organizations are faced with increasing operating costs, threats from ransomware, and ongoing compliance audits. Rixon enables you to be safe and confident, giving you the freedom to bring your business value to the world. The Rixon privacy platform drives business outcomes by giving organizations the tools they need to deliver security, compliance, and privacy operations to the business and the applications they support. Rixon eliminates sensitive data exposure within your applications by leveraging our patented tokenization process. Sensitive information is securely ingested and converted into smart security tokens which armor the data from unauthorized data access.Starting Price: $99 per month -
23
Gallio
Gallio
As face recognition technology is growing at an exponential pace, the storage of image and video files containing sensitive information poses significant risks. Gallio provides you with a unique solution for privacy protection based on artificial intelligence. Algorithms blur faces making them virtually impossible to recognize while leaving image quality intact. Efficiently anonymizes license plates making them illegible. Works with license plate patterns from all around the world. From now on you can store and publish your images and recordings without worrying that someone will recognize a given vehicle and sue you for privacy infringement. The easy-to-use editor allows you to remove blur from selected faces and license plates. Share videos and images as evidence and provide recordings on demand to data subjects, while protecting the privacy of anyone else.Starting Price: €89 per month -
24
HushHush Data Masking
HushHush
Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms. -
25
Cloud Compliance
Cloud Compliance
Operationalize privacy compliance and data security on Salesforce with the most comprehensive suite of products. The success of privacy programs requires thorough data inventory and risk assessment. However, most organizations end up overlooking pockets of data and struggle with manual processes and spreadsheets. Our Personal Data Inventory product is designed to automate and streamline DPIA and enterprise data inventory flows. Make it easy for your organization to have an accurate data inventory and clear risk assessment. Most organizations are seeing an increase in privacy right requests. Trying to meet these requests manually is inconsistent, error-prone, and increases the risk of non-compliance. Our Privacy Rights Automation product enables self-service and automates all privacy rights related activities. Mitigate the risk of non-compliance with a standardized and error-free solution. -
26
Private AI
Private AI
Safely share your production data with ML, data science, and analytics teams while safeguarding customer trust. Stop fiddling with regexes and open-source models. Private AI efficiently anonymizes 50+ entities of PII, PCI, and PHI across GDPR, CPRA, and HIPAA in 49 languages with unrivaled accuracy. Replace PII, PCI, and PHI in text with synthetic data to create model training datasets that look exactly like your production data without compromising customer privacy. Remove PII from 10+ file formats, such as PDF, DOCX, PNG, and audio to protect your customer data and comply with privacy regulations. Private AI uses the latest in transformer architectures to achieve remarkable accuracy out of the box, no third-party processing is required. Our technology has outperformed every other redaction service on the market. Feel free to ask us for a copy of our evaluation toolkit to test on your own data. -
27
TrueZero Tokenization
Spring Labs
TrueZero’s vaultless data privacy API replaces sensitive PII with tokens allowing you to easily reduce the impact of data breaches, share data more freely and securely, and minimize compliance overhead. Our tokenization solutions are leveraged by leading financial institutions. Wherever PII is stored, and however it is used, TrueZero Tokenization replaces and protects your data. More securely authenticate users, validate their information, and enrich their profiles without ever revealing sensitive data (e.g. SSN) to partners, other internal teams, or third-party services. TrueZero minimizes your in-scope environments, speeding up your time to comply by months and saving you potentially millions in build/partner costs. Data breaches cost $164 per breached record, tokenize PII & protect your business from data loss penalties and loss of brand reputation. Store tokens and run analytics in the same way you would with raw data. -
28
PieEye
PieEye
PieEye simplifies the complex process of managing user consent and compliance with privacy regulations, such as GDPR and CPRA/CCPA. The quickest, easiest, most efficient, and most automated solution for any ecommerce business; large, medium, or small. There is no need to do headstands and spend weeks or even months on tedious compliance work when our platform can get you up and running in minutes. Easy-to-install, easy-to-install, and automate, PieEye allows you to streamline your compliance efforts and focus on what really matters: growing your business. Discover how effortless compliance can be. With more data privacy laws, cookie compliance is more important than ever. Our cutting-edge cookie banner makes your website fully compliant with all regulations, safeguarding your customers’ data rights and protecting you. Our automated platform streamlines the entire process, enabling you to easily manage requests and ensure compliance with all relevant regulations.Starting Price: $29 per month -
29
Zendata
Zendata
Manage data security & risk across your entire stack. Your customer-facing assets are where the data collection/shaping occurs. Source code with data flows and third-party components. Distrust with how companies handle data arises due to data breaches, sharing/selling of personal information, and targeted advertising without consent, eroding trust between companies and customers. Don’t forfeit your customers’ trust by exposing them to privacy risks. Ensure their individual privacy and also protect your organization’s sensitive information with our data protection plans. Our privacy program will keep all of your company's data safe. And for your enterprise's continuity, our privacy compliance software will safeguard you from paying fines for non-compliance with security policies. Protect your customers' personal information and ensure compliance with global privacy laws with Zendata's no-code platform.Starting Price: $299 per month -
30
Roseman Labs
Roseman Labs
Roseman Labs enables you to encrypt, link, and analyze multiple data sets while safeguarding the privacy and commercial sensitivity of the actual data. This allows you to combine data sets from several parties, analyze them, and get the insights you need to optimize your processes. Tap into the unused potential of your data. With Roseman Labs, you have the power of cryptography at your fingertips through the simplicity of Python. Encrypting sensitive data allows you to analyze it while safeguarding privacy, protecting commercial sensitivity, and adhering to GDPR regulations. Generate insights from personal or commercially sensitive information, with enhanced GDPR compliance. Ensure data privacy with state-of-the-art encryption. Roseman Labs allows you to link data sets from several parties. By analyzing the combined data, you'll be able to discover which records appear in several data sets, allowing for new patterns to emerge. -
31
HoundDog.ai
HoundDog.ai
AI-powered code scanner designed to implement a proactive, shift-left strategy for sensitive data protection and privacy compliance. Product development outpaces privacy teams, leading to a constant need to update outdated data maps, which consumes much of their workload. Use HoundDog.ai’s AI-powered code scanner to continuously detect vulnerabilities (currently overlooked by SAST scanners) where sensitive data is exposed in plaintext through mediums such as logs, files, tokens, cookies, or third-party systems. Get essential context and remediation strategies, such as omitting sensitive data, applying masking or obfuscation, or using UUIDs instead of PII. Receive alerts when new data elements are introduced, based on their sensitivity levels, and prevent out-of-scope product changes from going live to avoid privacy incidents. Eliminate the manual and highly error-prone processes typically associated with security tasks.Starting Price: $200 per month -
32
Anonos Data Embassy
Anonos
Anonos spent 10 years in the lab, researching and developing Data Embassy to prove that it’s possible to selectively reveal, access and use data with granularity and precision never achieved before. We’ve addressed the shortcomings of data privacy and security point solutions, so organizations can use sensitive information as part of their data-driven initiatives and still be compliant. Data Embassy works by transforming source data into Variant Twins: non-identifiable yet 100% accurate data assets that can be used for specific, authorized purposes. Because multi-level data privacy and security controls are embedded into the data itself and technologically enforced, Variant Twins can travel anywhere and that includes crossing international borders. -
33
BizDataX
Ekobit
BizDataX is a data masking that provides test data of production-level quality. It enables compliance with GDPR and other regulations by masking customers' identity while preparing data for testers and developers. By using masked/anonymized data instead of production data, the risk is significantly reduced. Focus on policy management, business requirements, sensitive data governance and other regulations. Track inventory of databases, data sources, tables and want to know where sensitive data is located. Manage large customer databases and exchange data with online partner shops and parcel delivery companies. Management of medical records is heavily regulated and regulatory compliance can be achieved with data anonymization. -
34
RansomDataProtect
DROON
The optimal and innovative protection of your personal and sensitive data by the blockchain. RansomDataProtect allows for pseudonymizing personal data and sensitive data. Pseudonymization of data is one of the recommendations of the CNIL in terms of compliance with the GDPR rules and the fight against theft and leakage of sensitive data in the context of attacks of the ransomware type. Your data is secure and tamper-proof inside your files thanks to the innovative combination of variable encryption algorithms and a blockchain. The data that is not masked remains accessible to continue working on the documents with several people. RansomDataProtect easily integrates with your files using an add-in (Word, Excel, PowerPoint, Outlook, and Gmail). RansomDataProtect helps you to comply with the issues related to the general regulation on data protection. Remove security vulnerabilities due to password mismanagement within your company.Starting Price: €10 per month -
35
Secuvy AI
Secuvy
Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data. -
36
Ohalo
Ohalo
Ohalo's Data X-Ray platform automates data governance tasks like: - Data Discovery & Classification - Data Mapping & Cataloguing - Redacting Files containing sensitive personal information - File Analysis & Data Extraction ⚡️ML-Driven Data Governance | 100,000 words/second | 300+ built-in Integrations | Integration with any DLP/SIEM | 360-degree Unstructured Data Visibility | Agentless | Supports 100s of formats | Find PII, payment card information (PCI), and protected health information (ePHI). | Custom connectors for individual data sources (bespoke/legacy) ⚡️ Designed for enterprises, Data X-Ray is provided as a self-managed or fully-managed service. Our customers rely on Data X-Ray for file activity monitoring, security enhancement, and privacy compliance. ⚡️ Deploy Data X-Ray in hours in cloud and on-premise environments ⚡️ Find sensitive data in minutes ⚡️ Easily classify files and records from multiple file repositories and locations -
37
Shaip
Shaip
Shaip offers end-to-end generative AI services, specializing in high-quality data collection and annotation across multiple data types including text, audio, images, and video. The platform sources and curates diverse datasets from over 60 countries, supporting AI and machine learning projects globally. Shaip provides precise data labeling services with domain experts ensuring accuracy in tasks like image segmentation and object detection. It also focuses on healthcare data, delivering vast repositories of physician audio, electronic health records, and medical images for AI training. With multilingual audio datasets covering 60+ languages and dialects, Shaip enhances conversational AI development. The company ensures data privacy through de-identification services, protecting sensitive information while maintaining data utility. -
38
Kiprotect
Kiprotect
KIProtect develops software solutions that help you to process sensitive and personal data in a secure, legally compliant and privacy-friendly manner. Data security and data protection are becoming increasingly important. Unfortunately, they are often neglected, because technical data protection is complex and takes time. We want to change that! With our open source solutions, we help companies to apply modern anonymization and pseudonymization techniques to their data and thus protect it in the best possible way during processing. -
39
Brighter AI
Brighter AI Technologies
With increasing capabilities of facial recognition technology, public video data collection comes with great risks. brighter AI’s Precision Blur is the most accurate face redaction solution in the world. Deep Natural Anonymization is a unique privacy solution based on generative AI. It creates synthetic face overlays to protect individuals from recognition, while keeping data quality for machine learning. The Selective Redaction user interface allows you to selectively anonymize personal information in videos. In some use cases such as media and law enforcement, not all faces need to be blurred. After the automatic detections, you can (de)select objects individually. Our Analytics Endpoint provides relevant metadata about the original objects such as bounding box locations, facial landmarks and person attributes. The JSON outputs enable you to retrieve relevant information while having compliant, anonymized images or videos. -
40
OpenText Data Privacy & Protection Foundation (Voltage) provides organizations with quantum-ready, format-preserving security that protects sensitive data without disrupting workflows or analytics. It helps companies meet evolving regulatory requirements by securing information at rest, in motion, and in use across hybrid and cloud environments. With NIST-standardized Format-Preserving Encryption and stateless key management, the platform delivers high-performance protection at enterprise scale. Its persistent data security approach ensures that sensitive information remains safeguarded throughout its lifecycle, even as it moves across systems and analytics platforms. Trusted globally across more than 50 countries, the solution is relied on by major financial, healthcare,& retail organizations to secure billions of daily data events. By combining proven cryptography with flexible integrations, OpenText enables organizations to reduce breach risk while maintaining operational agility.
-
41
Fasoo AI-R Privacy
Fasoo
Fasoo AI-R Privacy is an AI-driven data privacy solution that helps organizations accurately locate, classify, and protect sensitive personal data across unstructured formats. Using advanced deep learning and natural language processing (NLP), the solution interprets context to detect personally identifiable information (PII) and apply automated masking or redaction based on predefined policies. Unlike traditional tools that rely on static pattern matching, Fasoo AI-R Privacy uses transformer-based models to understand how data is used within sentences, improving accuracy and reducing false positives. It’s especially effective for complex or hidden PII in free-text content, scanned files, and mixed data types. This solution is ideal for industries handling large volumes of personal data—such as healthcare, finance, and the public sector—where compliance with data protection laws is essential. -
42
BigID
BigID
BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2 -
43
Dataguise
Dataguise
Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses, -
44
Randtronics DPM easyCipher
Randtronics
Randronics DPM easyCipher providers Transparent Data Encryption (TDE) lock-box protection to files, folders, and databases. Protection is transparent as contents are automatically decrypted for authorized users. Like a lock-box, TDE-protected objects are either locked or unlocked. DPM easyCipher is a centrally managed, policy-based encryption management solution that allows an organization to standardize its encryption protection by defining and managing encryption policies and applying these policies to any server or laptop where a DPM easyCipher agent has been installed. DPM easyCipher protects all files and folders on servers or laptops. Server environments protected by DPM easyCipher include database servers, web/app servers, and file servers. DPM easyCipher can either extend or replace database-native TDE solutions provided by database vendors to secure their own DB products. Use easyCipher to protect information residing outside of the database. -
45
Salesforce Shield
Salesforce
Salesforce Shield is a comprehensive data security and compliance solution designed to protect sensitive information across the Salesforce platform. It provides advanced tools to monitor user activity, encrypt data, track changes, and detect sensitive information in real time. With Event Monitoring, organizations gain granular visibility into user behavior, API activity, and system performance through detailed event logs. Platform Encryption allows businesses to encrypt sensitive data at rest while maintaining control over encryption keys and compliance requirements. Field Audit Trail extends data history tracking to strengthen integrity and support forensic-level compliance. Data Detect uses intelligent pattern matching to identify and classify sensitive information such as credit card numbers and personal identifiers. Together, these capabilities help organizations mitigate risk, meet regulatory standards, and securely deploy AI-powered solutions like Agentforce.Starting Price: $25 per month -
46
Viacryp
Viacryp
Experience the convenience of a Trusted Third Party ( TTP ) for the careful pseudonymization of personal data, so that you can perform data analysis within the framework of the GDPR. Our basic service consists of pseudonymizing personal data. For this, we apply the principles of irreversible pseudonyms and thickening of behavior. The pseudonymized data is the source of further processing by our clients. Our filter service offers the possibility to share personal data proportionally and therefore with respect for privacy. We filter the information based on an expertly pseudonymized whitelist and only forward the information of individuals who appear on the whitelist. Viacryp provides privacy advice regarding the protection and security of personal data. Together with our partners, we advise on the measures to be taken as an organization to comply with the frameworks of the GDPR. This concerns both technical measures and organizational and process measures. -
47
PK Privacy
PKWARE
Organizations are required to keep up with the ever-changing privacy landscape, and protect personally identifiable information they interact with. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation. Automate the DSAR response process to meet requirements faster and on budget. Create rules that will delete or redact sensitive data as soon as it is found. Enable pseudonymization, anonymization, and de-identification of private personal data. Find data that can and/or should legally be archived or deleted due to age or lack of use. Detect and confirm breaches with monitoring, then accurately estimate and report on the breach’s impact. Continuously monitor endpoints, servers, and enterprise solutions for privacy data. Organizations are required to keep up with the ever-changing privacy landscape and protect personally identifiable information they interact with. -
48
Teleskope
Teleskope
Teleskope is a modern data protection platform designed to automate data security, privacy, and compliance at enterprise scale. It continuously discovers and catalogs data across cloud, SaaS, structured, and unstructured sources, classifying over 150 entity types such as PII, PHI, PCI, and secrets with high precision and high throughput. Once sensitive data is identified, Teleskope enables automated remediation, such as redaction, masking, encryption, deletion, and access correction, while integrating into developer workflows via its API-first model and supporting deployment as SaaS, managed, or self-hosted. The platform also builds prevention capabilities, embedding into SDLC pipelines to stop sensitive data from entering production systems, support safe AI adoption (without using unchecked sensitive data), handle data subject rights requests (DSARs), and map findings to regulatory standards (GDPR, CPRA, PCI-DSS, ISO, NIST, CIS). -
49
AuricVault® Tokenization
Auric Systems International
The AuricVault® tokenization service secures your vitally sensitive financial and personal data by safely storing that data and replacing the data in your system with a token. Tokens are random strings of numbers and letters that have no relationship to the stored data. If someone stole all your tokens, they still would not have any of your sensitive data. Tokenization provides what is called data separation. Data separation ensures that no single entity has all the data at one time. Auric's tokenization solution provides fine-grained permissions for one or more parties to access sensitive tokenized data. Depending on your business model, using the AuricVault® tokenization service may exclude your systems and servers from PCI scope. We help businesses protect billions of dollars and millions of transactions securely, safely, and simply.Starting Price: $300 per year -
50
Privacy Bee
Privacy Bee
Privacy Bee is the leading external data privacy platform designed specifically for enterprise needs. It provides comprehensive discovery, removal, and monitoring of workforce personal information exposed online - such as names, addresses, phone numbers, emails, IDs, credentials, and more. By scrubbing sensitive employee data from people search sites, marketing lists, court records, forums, code repositories, and thousands of other public data sources, Privacy Bee shuts down the channels cybercriminals use for targeted social engineering, phishing, fraud, and physical threats. Privacy Bee offers tailored packages for different business sizes and needs. Key benefits include: - Reduced risk of security incidents and data breaches caused by employee data exposure. - Protection for executives and high-profile personnel from cyber harassment, doxxing, and stalking. - Mitigation of reputational damage, loss of trust, and legal liability from data breaches.Starting Price: $197/year