Alternatives to Mage Dynamic Data Masking
Compare Mage Dynamic Data Masking alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Mage Dynamic Data Masking in 2026. Compare features, ratings, user reviews, pricing, and more from Mage Dynamic Data Masking competitors and alternatives in order to make an informed decision for your business.
-
1
Satori
Satori
Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements. -
2
Titaniam
Titaniam
Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022. -
3
DATPROF
DATPROF
Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management. -
4
IRI Voracity
IRI, The CoSort Company
Voracity is the only high-performance, all-in-one data management platform accelerating AND consolidating the key activities of data discovery, integration, migration, governance, and analytics. Voracity helps you control your data in every stage of the lifecycle, and extract maximum value from it. Only in Voracity can you: 1) CLASSIFY, profile and diagram enterprise data sources 2) Speed or LEAVE legacy sort and ETL tools 3) MIGRATE data to modernize and WRANGLE data to analyze 4) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. Use Voracity to comply with data privacy laws, de-muck and govern the data lake, improve the reliability of your analytics, and create safe, smart test data -
5
IRI FieldShield
IRI, The CoSort Company
IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones. -
6
IRI DMaaS
IRI, The CoSort Company
Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.Starting Price: $1000 per day -
7
IRI DarkShield
IRI, The CoSort Company
IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.Starting Price: $5000 -
8
Mage Static Data Masking
Mage Data
Mage™ Static Data Masking (SDM) and Test data Management (TDM) capabilities fully integrate with Imperva’s Data Security Fabric (DSF) delivering complete protection for all sensitive or regulated data while simultaneously integrating seamlessly with an organization’s existing IT framework and existing application development, testing and data flows without the requirement for any additional architectural changes. -
9
Mage Platform
Mage Data
Mage Data™ is the leading solutions provider of data security and data privacy software for global enterprises. Built upon a patented and award-winning solution, the Mage platform enables organizations to stay on top of privacy regulations while ensuring security and privacy of data. Top Swiss Banks, Fortune 10 organizations, Ivy League Universities, and Industry Leaders in the financial and healthcare businesses protect their sensitive data with the Mage platform for Data Privacy and Security. Deploying state-of-the-art privacy enhancing technologies for securing data, Mage Data™ delivers robust data security while ensuring privacy of individuals. Visit the website to explore the company’s solutions. -
10
Mage
Mage
Mage is a tool that transforms your data into predictions. Build, train, and deploy predictive models in minutes. No AI experience required. Increase user engagement by ranking content on your user’s home feed. Increase conversion by showing the most relevant products for a user to buy. Increase retention by predicting which users will stop using your app. Increase conversion by matching users in a marketplace. Data is the most important part in building AI. Mage will guide you through this process with suggestions on how to improve your data, making you an AI expert. AI and its predictions are difficult to understand. Mage explains every metric in-depth, teaching you how your AI model thinks. Get real-time predictions with a few lines of code. Mage makes it easy for you to integrate your AI model in any application.Starting Price: Free -
11
Mage
Mage
Mage (Mage.space) is an AI art and image generator that can use different AI models to generate images from text prompts. -
12
WriteMage
WriteMage
Integrate ChatGPT into your macOS/iOS natively. 🔥 Use ChatGPT in any app with context-aware, You no longer have to copy and paste anymore. WriteMage works in any macOS app, floating on top like Apple Spotlight. With the power of ChatGPT, WriteMage can remember what you're talking about in the session and answer accordingly. Want to continue the conversation from yesterday? WriteMage has you covered. Integrated natively with iOS keyboard. Work across every app in the store! An in-app purchase to use your own API key in the WriteMage iOS app costs $25. You can also get it for free with our subscription or lifetime deal below!Starting Price: $10 per month -
13
MageMail
MageMail
Recover 15%+ more revenue with the beautifully simple triggered and marketing email platform for customer acquisition, conversion, and retention. Fast install. Just add the MageMail API Connector to your Magento store, and you’re ready to roll. Our amazing customer success team will help you to customize MageMail and to make best use of our services. Use the elegant, drag-and-drop email editor to quickly design beautiful and responsive emails that render on any device. Create and run automated campaigns, either triggers or marketing blasts, using powerful filtering and segmentation. MageMail is chock-full of data to help you gain insights, to optimize campaigns, and to increase your sales. Our simple, results-based pricing lowers risk, helps you scale, and ensures that everyone is invested in your success. Select from 22 pre-built templates for triggers and marketing campaigns, including abandoned carts, birthday wishlists, win-backs, newsletters, product recommendations, etc. -
14
MageNative
MageNative
MageNative is a revolutionary Shopify mobile app builder, empowering business owners to self-develop top-notch mobile apps. Launch user-friendly apps within minutes using robust features: -Zero code development with mobile app builder -Quick drag and drop feature for constant visual access -Multi-language and multi-currency support -Augmented reality and image search are rare features present -AI powers product recommendation and in-app analytics -Apps created on MageNative remain auto-synced with the store -Unlimited push notifications can be sent to app-audience -Easy reorder option for app customers -Smooth in-app discount running feature -Instant social login for app users MageNative offers a 30-day free trial on their platform so business owners can feel comfortable with the process. Expert assistance is available 24x7 to solve any doubts in the development procedure.Starting Price: $49 -
15
MageMob Inventory Management
AppJetty
Understand your inventory with product stock management. MageMob Inventory, a Magento 2 Inventory Management Extension helps you seamlessly manage different aspects of your store inventory along with the store backend from desktop and mobile. Our ‘source management module is compatible with Magento Inventory’s default source management module that they offer for MSI 2.3 and above. For MSI 2.3 or below, we offer the ‘warehouse management’ module. Further, you can manage sales orders, customers’ details, customers reviews, get insights with sales reports, and more. If you are looking for a 100% native app that can help you streamline your Magento store inventory, MageMob Inventory is a perfect fit! Easily track and monitor the inventory with MageMob Inventory Mobile App. Manage your stock updates, orders, sources (warehouses for 2.3v and below), suppliers, major store operations and more on your fingertips through the Mobile App.Starting Price: $99 one-time payment -
16
Informatica Dynamic Data Masking
Informatica
Your IT organization can apply sophisticated masking to limit sensitive data access with flexible data masking rules based on a user’s authentication level. Blocking, auditing, and alerting your users, IT personnel, and outsourced teams who access sensitive information, it ensures compliance with your security policies and industry and civil privacy regulations. Easily customize data-masking solutions for different regulatory or business requirements. Protect personal and sensitive information while supporting offshoring, outsourcing, and cloud-based initiatives. Secure big data by dynamically masking sensitive data in Hadoop. -
17
Vijeo Designer
Schneider Electric
Discover Vijeo Designer software to cover your Magelis HMI application needs. Thanks to its user-friendly interface, it also offers functions such as multimedia capabilities and remote access for more efficiency. The cross-platform Vijeo Designer configuration software helps to create operator dialogue applications for controlling automation systems. A software range to cover your Harmony and Magelis HMI application design needs: Vijeo Designer for Small Panels, Advanced Panels and iPC. Vijeo Designer is the HMI component of EcoStruxure Machine Expert for machine applications. Vijeo Designer Design’Air enables you to connect to your HMI remotely for an interactive mirror view of your application. Vijeo Designer Design’Air Plus, enable you to get a fully operable view of your application from wherever you are. -
18
BizDataX
Ekobit
BizDataX is a data masking that provides test data of production-level quality. It enables compliance with GDPR and other regulations by masking customers' identity while preparing data for testers and developers. By using masked/anonymized data instead of production data, the risk is significantly reduced. Focus on policy management, business requirements, sensitive data governance and other regulations. Track inventory of databases, data sources, tables and want to know where sensitive data is located. Manage large customer databases and exchange data with online partner shops and parcel delivery companies. Management of medical records is heavily regulated and regulatory compliance can be achieved with data anonymization. -
19
IRI Data Protector Suite
IRI, The CoSort Company
The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you. -
20
MageCloud
MageCloud
We built MageCloud to help store owners and Magento developers launch new Magento stores in less than 10 minutes by installing themes, and extensions and deploying everything into the cloud hosting infrastructure. Choose from 100s of free and paid templates or use the default Magento themes. You can easily install your own themes as well. Choose from 1000s of extensions, install them in 1 click or add your own extensions to your store. 100% open access to code, server, and the Magento configuration. Get full control over your store. Install any 3rd party extensions, and customize your store with any other modifications to get even more out of its potential. MagCloud lets you connect your store to a variety of supported hosting providers using secure credentials via API, supplied by those providers. Once connected you will be able to launch servers directly from MageCloud.Starting Price: $59 per month -
21
Randtronics DPM easyData
Randtronics
DPM easyData is a high-performance data spoofing or de-identification engine. Data spoofing examples include masking, tokenization, anonymization, pseudonymization and encryption. DPM data spoofing processes replace whole or parts of sensitive data with a non-sensitive equivalent (creates fake data) and is a very powerful data protection tool. DPM easyData is a software data security solution that allows web and app server applications and databases to tokenize and anonymize data and apply masking policies for unauthorized users when retrieving sensitive data. The software allows a high level of granularity, defining which authorized users have access to which protection policies, and what operations they may perform with those protection policies. DPM easyData is extremely customizable and is able to protect and tokenize many different types of data. The software has been designed to be flexible and users are free to define any format of input data and token format. -
22
DataVantage
DataVantage
DataVantage offers comprehensive data management solutions designed to secure and manage sensitive information across mainframe and distributed environments. Key offerings include DataVantage for IMS, Db2, and VSAM, which provide advanced data masking, editing, and extraction capabilities to protect Personally Identifiable Information (PII) during non-production processes. DataVantage DME (Data Masking Express) offers cost-effective, on-the-fly data masking for Db2, IMS, and VSAM environments, ensuring compliance without disrupting existing workflows. For distributed systems, DataVantage Global delivers robust data masking, obfuscation, and de-identification, supporting compliance and operational efficiency across platforms. Additionally, DataVantage Adviser simplifies COBOL file management post-mainframe rehosting or application modernization, enhancing data accessibility and editing. -
23
Informatica Persistent Data Masking
Informatica
Retain context, form, and integrity while preserving privacy. Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments. As a highly scalable, high-performance data masking solution, Informatica Persistent Data Masking shields confidential data—such as credit card numbers, addresses, and phone numbers—from unintended exposure by creating realistic, de-identified data that can be shared safely internally or externally. It also allows you to reduce the risk of data breaches in nonproduction environments, produce higher-quality test data and streamline development projects, and ensure compliance with data-privacy mandates and regulations. -
24
Memgraph
Memgraph
Memgraph offers a light and powerful graph platform comprising the Memgraph Graph Database, MAGE Library, and Memgraph Lab Visualization. Memgraph is a dynamic, lightweight graph database optimized for analyzing data, relationships, and dependencies quickly and efficiently. It comes with a rich suite of pre-built deep path traversal algorithms and a library of traditional, dynamic, and ML algorithms tailored for advanced graph analysis, making Memgraph an excellent choice in critical decision-making scenarios such as risk assessment (fraud detection, cybersecurity threat analysis, and criminal risk assessment), 360-degree data and network exploration (Identity and Access Management (IAM), Master Data Management (MDM), Bill of Materials (BOM)), and logistics and network optimization. -
25
MageMob App Builder
AppJetty
Take your shop to everyone’s pockets and drive more sales with a native Magento 2 mobile app built on our MageMob App Builder. It is pre-build framework of an app that lets you launch yours in just a week. With robust features designed to work with iOS and Android, Magento 2 mobile app feels as well made as if it were made from scratch. This is the fastest way for you to enter Mcommerce without the price or effort of a long term app building process.Starting Price: $299 one-time payment -
26
The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.Starting Price: $230 one-time payment
-
27
Mage Sensitive Data Discovery
Mage Data
Uncover hidden sensitive data locations within your enterprise through Mage's patented Sensitive Data Discovery module. Find data hidden in all types of data stores in the most obscure locations, be it structured, unstructured, Big Data, or on the Cloud. Leverage the power of Artificial Intelligence and Natural Language Processing to uncover data in the most complex of locations. Ensure efficient identification of sensitive data with minimal false positives with a patented approach to data discovery. Configure any additional data classifications over and above the 70+ out of the box data classifications covering all popular PII and PHI data. Schedule sample, full, or even incremental scans through a simplified discovery process. -
28
Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
-
29
Libelle DataMasking
Libelle
Libelle DataMasking (LDM) is a robust, enterprise-grade data masking solution that automates the anonymization of sensitive or personal data—such as names, addresses, dates, emails, IBANs, credit cards—and transforms them into realistic, logically consistent substitutes that maintain referential integrity across SAP and non‑SAP systems, including Oracle, SQL Server, IBM DB2, MySQL, PostgreSQL, SAP HANA, flat files, and cloud databases. Capable of processing up to 200,000 entries per second and supporting parallelized masking for massive datasets, LDM uses a multithreaded architecture to efficiently read, anonymize, and write data back with high performance. It features over 40 built‑in anonymization algorithms—such as number, alphanumeric, date shifting, name, email, IBAN masking, credit card obfuscation, and mapping algorithms—as well as templates for SAP modules (CRM, ERP, FI/CO, HCM, SD, SRM). -
30
Webscale Stratus
Webscale
Webscale Stratus has provided merchants, developers and agencies with the most powerful, reliable and feature-rich global Magento® hosting in the world. Today’s Stratus™ cloud-hosting from Webscale Stratus is a perfect example of our commitment to Magento® hosting excellence. Protecting your customers’ data is so very critical to you as a store owner. Having even one data breach could spell death for your emerging brand. MageMojo has taken the extraordinary step of becoming PCI Level 1 compliant via a third-party audit as a Magento hosting provider. This means that you can rely on Webscale Stratus—and the STRATUS MaaS™ platform—to extend protection for your peace of mind. Your costs are directly related to the demands on your store. Easily find out just how affordable Webscale Stratus can be when compared to conventional Magento® hosting.Starting Price: $98 per month -
31
DOT Anonymizer
DOT Anonymizer
Mask your personal data while ensuring it looks and acts like real data. Software development needs realistic test data. DOT Anonymizer masks your test data while ensuring its consistency, across all your data sources and DBMS. The use of personal or identifying data outside of production (development, testing, training, BI, external service providers, etc.) carries a major risk of data leak. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. Anonymization enables you to retain the original data format. Your teams work with fictional but realistic data. Manage all your data sources and maintain their usability. Invoke DOT Anonymizer functions from your own applications. Consistency of anonymizations across all DBMS and platforms. Preserve relations between tables to guarantee realistic data. Anonymize all database types and files like CSV, XML, JSON, etc.Starting Price: €488 per month -
32
Dataguise
Dataguise
Don’t let data security or privacy hinder your analytics-driven innovation efforts. Dataguise can protect personal and sensitive data with flexible masking or encryption options to retain maximum business value. Data sets ready for analysis can be delivered in near real time for fresher insights and better decisions based on the complete picture. Dataguise customers have diverse and ever-changing needs. We recognize that by developing a strong network of carefully selected partners, we can deliver more comprehensive solutions, services, and expertise to our customers. Learn how to protect data privacy while maximizing data value in this executive guide. When compared to other data discovery solutions, Dataguise has been around longer, supports a broader range of data types and repositories, delivers lower false-positive results, and more reliably scans data at scale. Dataguise gives organizations the confidence to act on data in the best interests of the businesses, -
33
Doculayer
Doculayer
Forget about manual content classification and data entry. Doculayer.ai offers a configurable pipeline with document processing services like OCR, document type classification, topic classification, data extraction and data masking. Doculayer.ai puts business users in the driver's seat by making training/learning easy via an intuitive user interface for labeling of documents and data. With our hybrid data extraction approach machine learning models can be combined with rules, patterns and library scripts to obtain better results with less training data in less time. For the protection of sensitive data within documents, data masking can be anonymized or pseudonymized. Doculayer.ai adds document intelligence to your Content Services Platform, Business Process Management systems, and RPA solutions. Supercharge your existing IT environment for document processing with machine learning, natural language processing, and computer vision technologies. -
34
HushHush Data Masking
HushHush
Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms. -
35
Anonomatic
Anonomatic
Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations. -
36
OnPoint CORTEX
OnPoint - A Koch Engineered Solutions Company
OnPoint’s CORTEX™ is our advanced analytics platform that leverages historical data along with your process engineers’ expertise to drive profits by increasing operational efficiencies such as increased production and decreased downtime. In comparison to simple regression or statistical approaches, CORTEX combines machine learning with high compute power to enable models to learn from your complex process data. Load your data as-is and CORTEX will clean it. impute missing values and handle categorical variables. Visualize and remove outliers. Add rows and columns to your data and learn what variables are important to the process. CORTEX's proprietary algorithm eliminates the need for you to hunt for the best model. MaGE builds a variety of models in the platform plus an optimized, ensemble model. Then it provides scores for all of them. -
37
K2View
K2View
At K2View, we believe that every enterprise should be able to leverage its data to become as disruptive and agile as the best companies in its industry. We make this possible through our patented Data Product Platform, which creates and manages a complete and compliant dataset for every business entity – on demand, and in real time. The dataset is always in sync with its underlying sources, adapts to changes in the source structures, and is instantly accessible to any authorized data consumer. Data Product Platform fuels many operational use cases, including customer 360, data masking and tokenization, test data management, data migration, legacy application modernization, data pipelining and more – to deliver business outcomes in less than half the time, and at half the cost, of any other alternative. The platform inherently supports modern data architectures – data mesh, data fabric, and data hub – and deploys in cloud, on-premise, or hybrid environments. -
38
Solix EDMS
Solix Technologies
The Solix Enterprise Data Management Suite (Solix EDMS) brings together all the tools for an effective Information Lifecycle Management (ILM) program. From a single web-based console, the platform offers industry-leading database archiving, test data management, data masking, and application retirement solutions. Solix EDMS is designed to control costs, boost application performance and availability, and meet compliance objectives. It offers universal access to all archived data for business users through full-text search, structured SQL queries, forms & reports. Solix EDMS helps you quickly identify infrequently accessed historic data from your production applications, and ‘move’ it to a secure archive with data integrity and access preserved. Retention management holds the archived data for a given period of time, and purges the data automatically, or manually when the data retention policy meets its criteria. -
39
Adaptive
Adaptive
Adaptive is a data security platform designed to prevent sensitive data exposure across all human and non-human entities. It offers a secure control plane to protect and access data, featuring an agentless architecture that requires zero network reconfiguration and can be deployed in the cloud or on-premises. The platform enables organizations to share privileged access to data sources without sharing actual credentials, enhancing security posture. It supports just-in-time access to various data sources, including databases, cloud infrastructure resources, data warehouses, and web services. Adaptive also facilitates non-human data access by connecting third-party tools or ETL pipelines through a central interface without exposing data source credentials. To minimize data exposure, the platform provides data masking and tokenization for non-privileged users without altering access workflows. Comprehensive audibility is achieved through identity-based audit trails across all resources. -
40
Data Secure
EPI-USE
Protect your sensitive SAP data. Solve your SAP data security challenges and comply with data privacy legislation such as the EU's. General Data Protection Regulation (GDPR), South Africa's POPI Act and the California Consumer Privacy Act of 2018 (CCPA) with Data Secure™. Data security is critical in today's business environment. Data Secure™, part of EPI-USE Labs' Data Sync Manager™ (DSM) suite, solves your data security challenges. Data Secure is a comprehensive protection solution that comes with pre-defined masking rules. With these rules you can scramble any non-key field in any client-dependent SAP table in a number of different ways (such as mapping table look-up, constant value, clear a field). You can also extend these rules to cover your own particular security needs. Data Secure enables your company to meet all well-known data privacy and protection standards such as the General Data Protection Regulation (GDPR), Sarbanes Oxley and the BDSG (Bundesdatenschutzgesetz). -
41
GearMage
GearMage
Easily search, download, extract and save emails with attachments with simple setup. Does not require or depend on any other email client to be installed and it works with most email service providers out of the box. Mail Attachment Downloader securely downloads and processes all your email attachments at-once based on your search preference. Leave all your mail on your server -- it does not interfere with any other email programs you use today to download your mail. You can set up various filters, like size, file type, who it is from, subject of email, date, and time stamp, to specify what you want to download. GearMage develops software and services that save time, and money and improve productivity. The free versions of software available on this site are available for personal, non-commercial use only. The PRO versions available for purchase add several new features and grants a license for commercial use or business use.Starting Price: $349.99 per year -
42
1ACCESS
1mage Software
1ACCESS is a comprehensive application; users can both index and inquire on images, text documents, and content files from the desktop and then view, print, fax, or email the documents without leaving the application. 1ACCESS is easy to install, simple to navigate, and a snap to learn. If users are familiar with graphical user interface (GUI) standards, they can easily navigate the client using point and click, mnemonic, and keyboard controls. In support of 1ACCESS, the viewers let users rotate or magnify document images for optimal inspection during inquiry or indexing. 1ACCESS utilizes the cross-referencing capabilities of the 1MAGE relational database management system (RDBMS). This cross-referencing functionality means that if a user doesn’t remember a name, its spelling, or its associated code, they can easily call up a lookup table to find the reference they’re looking for. -
43
ReadyMage
ReadyMage
Deliver Magento and ScandiPWA projects faster and cheaper by using ReadyMage development and production environments available in 15 minutes with no setup costs. SSR provides the content of your PWA store to the search engine and social network bots for the best indexing and display. Save costs by paying for the actual amount of pages that your store requires to pretender. Connect CDN for free and get unlimited WebP image optimization for 20$ per month. WebP compression helps to make your store faster reducing image size up to 50%. You will get containerized local dev environment with PHP, MySQL, Varnish, Redis, and WebPack Dev Server. Backed by 24/7/365 monitoring and support from a member of Amazon Select Consulting partner network. Cloud solution comes with a GitHub repository connected to our 1-Click deploy that allows customizing ScandiPWA and Magento. Code is deployed with zero-downtime using our 1-Click build-and-deploy tool made for ScandiPWA and Magento 2.Starting Price: $199 per month -
44
TCS MasterCraft DataPlus
Tata Consultancy Services
The users of data management software are primarily from enterprise business teams. This requires the data management software to be highly user-friendly, automated and intelligent. Additionally, data management activities must adhere to various industry-specific and data protection related regulatory requirements. Further, data must be adequate, accurate, consistent, of high quality and securely accessible so that business teams can make informed and data-driven strategic business decisons. Enables an integrated approach for data privacy, data quality management, test data management, data analytics and data modeling. Efficiently addresses growing volumes of data efficiently, through service engine-based architecture. Handles niche data processing requirements, beyond out of box functionality, through a user-defined function framework and python adapter. Provides a lean layer of governance surrounding data privacy and data quality management. -
45
Subsalt
Subsalt Inc.
Subsalt is the first platform built to enable the use of anonymous data at enterprise scale. Subsalt's Query Engine dynamically optimizes the tradeoffs between data privacy and fidelity to the source data. Queries return fully-synthetic data that preserves row-level granularity and data formats without disruptive data transformations. Subsalt provides compliance guarantees supported by third-party audits that satisfy HIPAA's Expert Determination standard. Subsalt supports multiple deployment models to meet the unique privacy and security requirements of each client. Subsalt is SOC2-Type 2 and HIPAA compliant. The system has been designed to minimize the risk of exposure or breach of real data. Existing data and ML tools integrate directly with Subsalt's Postgres-compatible SQL interface, making adoption a breeze. -
46
ZBrushCoreMini
ZBrushCoreMini
Enjoy a true ZBrush experience as you take your first steps into the exciting world of digital sculpting with ZBrushCoreMini. ZBrushCoreMini is designed for new artists of all ages, with a streamlined interface that lets anyone jump right in and start sculpting immediately. ZBrushCoreMini is all about sculpting. Start with a simple sphere or a stone block, then use a select group of the most popular digital sculpting brushes from ZBrush to add or remove material and simply create! ZBrushCoreMini frees you to explore your imagination. Once you are happy with your creation, it also provides an exciting new way to share your work with others, through the iMage3D format. On any website, this will simply appear as a regular 2D image. But other users of ZBrushCoreMini can open the file in full 3D! And with 3D printers increasingly coming into their own, ZBrushCoreMini includes the ability to export your model for real-world printing.Starting Price: $39.95 per month -
47
IRI CoSort
IRI, The CoSort Company
What is CoSort? IRI CoSort® is a fast, affordable, and easy-to-use sort/merge/report utility, and a full-featured data transformation and preparation package. The world's first sort product off the mainframe, CoSort continues to deliver maximum price-performance and functional versatility for the manipulation and blending of big data sources. CoSort also powers the IRI Voracity data management platform and many third-party tools. What does CoSort do? CoSort runs multi-threaded sort/merge jobs AND many other high-volume (big data) manipulations separately, or in combination. It can also cleanse, mask, convert, and report at the same time. Self-documenting 4GL scripts supported in Eclipse™ help you speed or leave legacy: sort, ETL and BI tools; COBOL and SQL programs, plus Hadoop, Perl, Python, and other batch jobs. Use CoSort to sort, join, aggregate, and load 2-20X faster than data wrangling and BI tools, 10x faster than SQL transforms, and 6x faster than most ETL tools.Starting Price: $4,000 perpetual use -
48
IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
-
49
Okera
Okera
Okera, the Universal Data Authorization company, helps modern, data-driven enterprises accelerate innovation, minimize data security risks, and demonstrate regulatory compliance. The Okera Dynamic Access Platform automatically enforces universal fine-grained access control policies. This allows employees, customers, and partners to use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives. Okera began development in 2016 and now dynamically authorizes access to hundreds of petabytes of sensitive data for the world’s most demanding F100 companies and regulatory agencies. The company is headquartered in San Francisco. -
50
Informatica Test Data Management
Informatica
We help you discover, create, and subset test data; visualize test data coverage; and protect data so you can focus on development. Automate provisioning of masked, subsetted, and synthetically generated data to meet development and testing needs. Identify sensitive data locations quickly with consistent masking in and across databases. Store, augment, share, and reuse test datasets to improve testers’ efficiency. Provision smaller data sets to minimize infrastructure requirements and speed performance. Use our comprehensive set of masking techniques to consistently protect data across applications. Support packaged applications to ensure solution integrity and speed deployments. Engage risk, compliance, and audit teams to align with data governance initiatives. Improve test efficiency with reliable, trusted production data sets; reduce server and storage footprints with data set sizes targeted for each team.