Alternatives to eperi Gateway

Compare eperi Gateway alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to eperi Gateway in 2026. Compare features, ratings, user reviews, pricing, and more from eperi Gateway competitors and alternatives in order to make an informed decision for your business.

  • 1
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 2
    SharePass

    SharePass

    SharePass

    SharePass is a SaaS Secret Management platform that allows sharing and managing secrets and confidential information using a web application, extension, or mobile app. SharePass works with encrypted links transmitted from the sender to the receiver with various settings and flags. The settings include expiry restriction, availability, IP restrictions and an entire filtering funnel (patent pending). SharePass is platform-independent that can be used with your existing communication tools. When it comes to your privacy, SharePass or any of its employees cannot see the content of your secrets; the secrets can be seen only by the exchanging parties. SharePass meets the latest cybersecurity compliance and regulations. In the era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating your digital footprint. SharePass supports SSO with Office365, Google Workspace, MFA, and integration with Yubikeys for maximum security.
  • 3
    DATPROF

    DATPROF

    DATPROF

    Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
  • 4
    IRI FieldShield

    IRI FieldShield

    IRI, The CoSort Company

    IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones.
  • 5
    OpenText Data Privacy & Protection Foundation
    OpenText Data Privacy & Protection Foundation (Voltage) provides organizations with quantum-ready, format-preserving security that protects sensitive data without disrupting workflows or analytics. It helps companies meet evolving regulatory requirements by securing information at rest, in motion, and in use across hybrid and cloud environments. With NIST-standardized Format-Preserving Encryption and stateless key management, the platform delivers high-performance protection at enterprise scale. Its persistent data security approach ensures that sensitive information remains safeguarded throughout its lifecycle, even as it moves across systems and analytics platforms. Trusted globally across more than 50 countries, the solution is relied on by major financial, healthcare,& retail organizations to secure billions of daily data events. By combining proven cryptography with flexible integrations, OpenText enables organizations to reduce breach risk while maintaining operational agility.
  • 6
    Rixon

    Rixon

    Rixon

    Maximize data security & solve data privacy concerns with the fastest cloud-native vaultless tokenization platform. Knowing your business meets and exceeds compliance requirements gives you the time and peace of mind to focus on what is important for your business. Organizations are faced with increasing operating costs, threats from ransomware, and ongoing compliance audits. Rixon enables you to be safe and confident, giving you the freedom to bring your business value to the world. The Rixon privacy platform drives business outcomes by giving organizations the tools they need to deliver security, compliance, and privacy operations to the business and the applications they support. Rixon eliminates sensitive data exposure within your applications by leveraging our patented tokenization process. Sensitive information is securely ingested and converted into smart security tokens which armor the data from unauthorized data access.
    Starting Price: $99 per month
  • 7
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 8
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 9
    Protecto

    Protecto

    Protecto

    While enterprise data is exploding and scattered across various systems, oversight of driving privacy, data security, and governance has become very challenging. As a result, businesses hold significant risks in the form of data breaches, privacy lawsuits, and penalties. Finding data privacy risks in an enterprise is a complex, and time-consuming effort that takes months involving a team of data engineers. Data breaches and privacy laws are requiring companies to have a better grip on which users have access to the data, and how the data is used. But enterprise data is complex, so even if a team of engineers works for months, they will have a tough time isolating data privacy risks or quickly finding ways to reduce them.
    Starting Price: Usage based
  • 10
    Skyflow

    Skyflow

    Skyflow

    Skyflow lets you run workflows, logic and analytics on fully encrypted data. Skyflow leverages multiple encryption and tokenization techniques for optimal security. Manage data residency, access, and policy enforcement, with auditable logs and provenance. Get to compliance in minutes, not weeks. Our trusted infrastructure and simple REST and SQL APIs make it easy. Tokenization for compliance, plus an encrypted data store so you can search, analyze, and use secure data. Run Skyflow in a virtual private cloud you choose. Use it as secure gateway, zero trust data store, and more. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. Leverage the power of your sensitive data in any workflow or application without ever decrypting the data.
  • 11
    EncryptRIGHT

    EncryptRIGHT

    Prime Factors

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.
  • 12
    Sotero

    Sotero

    Sotero

    Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment. The Sotero data security platform employs an intelligent data security fabric that ensures your sensitive data is never left unprotected. Sotero automatically secures all your data instances and applications, regardless of source, location or lifecycle stage (at rest, in transit, or in use). With Sotero, you can move from a fragmented, complex data security stack to one unified data security fabric that provides 360° management of your entire data security ecosystem. You’re no longer forced to go to point solutions to know who is accessing your data. You get governance, auditability, visibility, and 100% control via a single pane. The Sotero platform protects any data asset wherever it resides – whether the data is a relational database, unstructured, semi-structured, structured, on-premise or in the cloud.
  • 13
    Baffle

    Baffle

    Baffle

    Baffle provides universal data protection from any source to any destination to control who can see what data. Enterprises continue to battle cybersecurity threats such as ransomware, as well as breaches and losses of their data assets in public and private clouds. New data management restrictions and considerations on how it must be protected have changed how data is stored, retrieved, and analyzed. Baffle’s aim is to render data breaches and data losses irrelevant by assuming that breaches will happen. We provide a last line of defense by ensuring that unprotected data is never available to an attacker. Our data protection solutions protect data as soon as it is produced and keep it protected even while it is being processed. Baffle's transparent data security mesh for both on-premises and cloud data offers several data protection modes. Protect data on-the-fly as it moves from a source data store to a cloud database or object storage, ensuring safe consumption of sensitive data.
  • 14
    ALTR

    ALTR

    ALTR

    Easily and simply control your sensitive data in Snowflake today so you can get more value from it in minutes instead of months. With ALTR you can automatically discover and classify sensitive data with a checkbox on import. Add controls like data masking with a drop-down menu. Set alerts and limits on data access by user, amount, and IP address from a single screen. No on-prem hassles or added costs, no proxies to break with a platform change and no managed services disguised as SaaS. ALTR was born in the cloud and natively integrates with platforms like Snowflake. With ALTR’s complete data control, you can visualize data usage, detect anomalies and alert on them, block threats in real time, and tokenize critical data. Safeguarding all your data. Because ALTR is built for the cloud, there’s no large up-front commitment—you can start for free and only upgrade as needed.
    Starting Price: $10 per user per month
  • 15
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 16
    Adaptive

    Adaptive

    Adaptive

    Adaptive is a data security platform designed to prevent sensitive data exposure across all human and non-human entities. It offers a secure control plane to protect and access data, featuring an agentless architecture that requires zero network reconfiguration and can be deployed in the cloud or on-premises. The platform enables organizations to share privileged access to data sources without sharing actual credentials, enhancing security posture. It supports just-in-time access to various data sources, including databases, cloud infrastructure resources, data warehouses, and web services. Adaptive also facilitates non-human data access by connecting third-party tools or ETL pipelines through a central interface without exposing data source credentials. To minimize data exposure, the platform provides data masking and tokenization for non-privileged users without altering access workflows. Comprehensive audibility is achieved through identity-based audit trails across all resources.
  • 17
    Gretel

    Gretel

    Gretel.ai

    Privacy engineering tools delivered to you as APIs. Synthesize and transform data in minutes. Build trust with your users and community. Gretel’s APIs grant immediate access to creating anonymized or synthetic datasets so you can work safely with data while preserving privacy. Keeping the pace with development velocity requires faster access to data. Gretel is accelerating access to data with data privacy tools that bypass blockers and fuel Machine Learning and AI applications. Keep your data contained by running Gretel containers in your own environment or scale out workloads to the cloud in seconds with Gretel Cloud runners. Using our cloud GPUs makes it radically more effortless for developers to train and generate synthetic data. Scale workloads automatically with no infrastructure to set up and manage. Invite team members to collaborate on cloud projects and share data across teams.
  • 18
    VGS Platform

    VGS Platform

    Very Good Security

    The VGS Vault enables users to safely store their tokenized data. This creates a safe haven for your most sensitive data. In the event of a breach, there’s nothing to steal. You can’t hack what’s not there. VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it. Use the interactive example to see how data is transformed by VGS. Choose Redact or Reveal to hide or display data, respectively. Whether you’re building a new product and want best-in-class security from the start or are an established company looking to eliminate compliance as a roadblock to new business, VGS can help. VGS takes on the liability of securing your data, eliminating the risk of data breaches and reducing compliance overhead. For companies that prefer to vault their own data, VGS layers on protection to the systems, preventing unauthorized access and leakage.
  • 19
    Acra

    Acra

    Cossack Labs

    Data leakage prevention in your app made simple. Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. Acra is easy to integrate, doesn't require significant modifications in the existing code, provides reliable data security, reduces MTTD and MTTR. Acra provides an integration library that can encrypt any record with AcraServer’s key.
    Starting Price: $10000 per year
  • 20
    Ubiq

    Ubiq

    Ubiq Security

    Encrypt your most sensitive data before it leaves the application, so the storage layer – and adversaries – only ever see ciphertext. Application-native client-side encryption protects data from sophisticated attackers, supply-chain attacks, and insider threats. Most at-rest encryption solutions – transparent disk encryption, full disk encryption, etc. – are ineffective against modern threats because they grant admins, key processes, and attackers (who exploit privileged access) implicit access to plaintext data. Eliminate this gap and bridge the divide between engineering, security, and compliance teams with Ubiq’s developer-first, encryption-as-code platform. Lightweight, prepackaged code and open source encryption libraries that quickly integrate into any application type for native client-side encryption and set-and-forget key management.
    Starting Price: $0.001 per encrypt
  • 21
    ShardSecure

    ShardSecure

    ShardSecure

    We desensitize sensitive data in multi-cloud, hybrid-cloud, and private cloud environments while reducing management complexity and improving business continuity. Securely adopt the cloud without losing control of your data knowing your data is unintelligible and of no value to unauthorized users – anywhere it is stored. Backups are popular targets for attackers and ransomware. Improve your backup data resiliency and protect against attacks. We preserve the integrity of your microsharded data and roll back attempts at file tampering, including files encrypted by malware while your operations continue unaffected. Confidently address data privacy and security requirements to enable your data analysis projects. Secure your source code and other intellectual property from data breaches and supply chain attacks.
  • 22
    CipherTrust Tokenization

    CipherTrust Tokenization

    Thales Cloud Security

    CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including personally identifiable information (PII). While there are no tokenization standards in the industry, most tokenization solutions fall into one of two architectures: vaultless- or vaulted tokenization Both secure and anonymize sensitive assets. Tokenization software can reside in the data center, big data environments or the cloud. Tokenization can remove card holder data from PCI DSS scope with minimal cost and effort, enabling organizations to save on costs associated with compliance with the industry standard. Modern IT architectures require both use and protection of personally identifiable information (PII). With CipherTrust tokenization, PII protection is gained without encryption key management required by the software developer.
  • 23
    Findora

    Findora

    Findora

    Deploy financial infrastructures with privacy-preserving transparency. Findora enables assets of any nature - dollar, bitcoin, equity, debt and derivatives. Its mission is to address the challenges necessary to support this broad class of assets and diverse financial use cases, providing confidentiality while retaining the transparency of other blockchains. Findora uses zero-knowledge proofs and secure multi-party computation to support many privacy-preserving features. Specialized zero-knowledge proofs allow Findora to be publicly audited, while data remains confidential. Findora features a high-throughput ledger design, and reduces storage requirements through cryptographic accumulators. Findora breaks open data silos for easy interoperability between the main- and side-ledgers. Findora provides you with the tools, documentation, and support to help you build your applications. Develop privacy-preserving applications on the Findora testnet today.
  • 24
    Enigma Vault

    Enigma Vault

    Enigma Vault

    Enigma Vault is your PCI level 1 compliant and ISO 27001 certified payment card, data, and file easy button for tokenization and encryption. Encrypting and tokenizing data at the field level is a daunting task. Enigma Vault takes care of all of the heavy liftings for you. Turn your lengthy and costly PCI audit into a simple SAQ. By storing tokens instead of sensitive card data, you greatly mitigate your security risk and PCI scope. Using modern methods and technologies, searching millions of encrypted values takes just milliseconds. Fully managed by us, we built a solution to scale with you and your needs. Enigma Vault encrypts and tokenizes data of all shapes and sizes. Enigma Vault offers true field-level protection; instead of storing sensitive data, you store a token. Enigma Vault provides the following services. Enigma Vault takes the mess out of crypto and PCI compliance. You no longer have to manage and rotate private keys nor deal with complex cryptography.
  • 25
    Tonic

    Tonic

    Tonic

    Tonic automatically creates mock data that preserves key characteristics of secure datasets so that developers, data scientists, and salespeople can work conveniently without breaching privacy. Tonic mimics your production data to create de-identified, realistic, and safe data for your test environments. With Tonic, your data is modeled from your production data to help you tell an identical story in your testing environments. Safe, useful data created to mimic your real-world data, at scale. Generate data that looks, acts, and feels just like your production data and safely share it across teams, businesses, and international borders. PII/PHI identification, obfuscation, and transformation. Proactively protect your sensitive data with automatic scanning, alerts, de-identification, and mathematical guarantees of data privacy. Advanced sub setting across diverse database types. Collaboration, compliance, and data workflows — perfectly automated.
  • 26
    PlatON

    PlatON

    PlatON

    Combining blockchain and privacy-preserving computation technologies, PlatON is building a decentralized and collaborative AI network and global brain to drive the democratization of AI for safe artificial general intelligence. PlatON, initiated and driven by the LatticeX Foundation, is a next-generation Internet infrastructure protocol based on the fundamental properties of blockchain and supported by the privacy-preserving computation network. “Computing interoperability” is its core feature. By building a computing system assembled by verifiable computation, secure multi-party computation, zero-knowledge proof, homomorphic encryption and other cryptographic algorithms and blockchain technology, PlatON provides a public infrastructure in open source architecture for global artificial intelligence, distributed application developers, data providers and various organizations, communities and individuals with computing needs.
  • 27
    ACI Omni-Tokens
    Secure your customers, reduce your compliance burden, and retain the flexibility and independence to effectively manage your business with single- and multi-use tokens from ACI. ACI’s omni-tokens can be used across channels and with card and alternative payment methods. Our omni-tokens link the customer to their tokenized payment method with ease, while ensuring their highly sensitive personal data remains secure. Tokenization is one piece of the puzzle when it comes to data security — and its perfect teammate is point-to-point encryption (P2PE), which encrypts sensitive card and customer information at the terminal. Hackers target customer payment data from merchants’ back-office systems as it travels from the payments terminal to the processor. Combine tokenization and P2PE capabilities to give you peace of mind that customer data is protected at every touchpoint.
  • 28
    NymVPN

    NymVPN

    Nym Technologies

    Enjoy secure browsing, streaming, and messaging with our unmatched blend of decentralized VPN, mixnet, and zero-knowledge payments. Elevated privacy with advanced onion encryption, data splitting, mixing, and concealment in cover traffic. Swift two-hop decentralized mode with onion encryption but no cover traffic. Inability to correlate IPs with network requests, by design. No backdoor or covert access to traffic and private data. Unmatched privacy within a single application thanks to the unique blend of mixnet and decentralized VPN. Zero-knowledge payment method, ensuring privacy and concealing user identity for transactions.
  • 29
    Roseman Labs

    Roseman Labs

    Roseman Labs

    Roseman Labs enables you to encrypt, link, and analyze multiple data sets while safeguarding the privacy and commercial sensitivity of the actual data. This allows you to combine data sets from several parties, analyze them, and get the insights you need to optimize your processes. Tap into the unused potential of your data. With Roseman Labs, you have the power of cryptography at your fingertips through the simplicity of Python. Encrypting sensitive data allows you to analyze it while safeguarding privacy, protecting commercial sensitivity, and adhering to GDPR regulations. Generate insights from personal or commercially sensitive information, with enhanced GDPR compliance. Ensure data privacy with state-of-the-art encryption. Roseman Labs allows you to link data sets from several parties. By analyzing the combined data, you'll be able to discover which records appear in several data sets, allowing for new patterns to emerge.
  • 30
    DERO

    DERO

    DERO

    DERO is a general-purpose, private, and scalable decentralized application platform that allows developers to deploy powerful and unstoppable applications, while users retain total control over their assets with complete privacy. Account balances and data are never decrypted by the blockchain. Only account owners can decrypt and access their data. Welcome to a new data privacy paradigm. DERO has been developed from scratch in Golang and is being actively developed by the original developers. It is not a fork of any other coin. DERO is a homomorphically encrypted protocol that can serve individuals and businesses worldwide, with fast and anonymous transactions, smart contracts, and service models. The DERO Project has created a platform for developers to deploy secure, open, scalable, and privacy-preserving decentralized applications. DERO is unique because we value security and privacy above all else.
  • 31
    ShieldConex
    Tokenize PAN (primary account number) data and associated PII/PHI data so you maintain compliance for regulations governing the handling of sensitive data. PCI DSS scope reduction across all channels and trusted third parties. Tokenization masks data at the time of input and helps your organization meet evolving security standards. The ShieldConex platform provides vaultless, format-preserving tokenization for every data element. Payment data, including credit or debit card primary account number (PAN), expiration, date, CVV, cardholder name, and more. Standardize the payment experience across businesses, locations and channels including mobile, online, and in-store.
  • 32
    TrueZero Tokenization
    TrueZero’s vaultless data privacy API replaces sensitive PII with tokens allowing you to easily reduce the impact of data breaches, share data more freely and securely, and minimize compliance overhead. Our tokenization solutions are leveraged by leading financial institutions. Wherever PII is stored, and however it is used, TrueZero Tokenization replaces and protects your data. More securely authenticate users, validate their information, and enrich their profiles without ever revealing sensitive data (e.g. SSN) to partners, other internal teams, or third-party services. TrueZero minimizes your in-scope environments, speeding up your time to comply by months and saving you potentially millions in build/partner costs. Data breaches cost $164 per breached record, tokenize PII & protect your business from data loss penalties and loss of brand reputation. Store tokens and run analytics in the same way you would with raw data.
  • 33
    Solix EDMS

    Solix EDMS

    Solix Technologies

    The Solix Enterprise Data Management Suite (Solix EDMS) brings together all the tools for an effective Information Lifecycle Management (ILM) program. From a single web-based console, the platform offers industry-leading database archiving, test data management, data masking, and application retirement solutions. Solix EDMS is designed to control costs, boost application performance and availability, and meet compliance objectives. It offers universal access to all archived data for business users through full-text search, structured SQL queries, forms & reports. Solix EDMS helps you quickly identify infrequently accessed historic data from your production applications, and ‘move’ it to a secure archive with data integrity and access preserved. Retention management holds the archived data for a given period of time, and purges the data automatically, or manually when the data retention policy meets its criteria.
  • 34
    Delphix

    Delphix

    Perforce

    Delphix is the industry leader in DataOps and provides an intelligent data platform that accelerates digital transformation for leading companies around the world. The Delphix DataOps Platform supports a broad spectrum of systems, from mainframes to Oracle databases, ERP applications, and Kubernetes containers. Delphix supports a comprehensive range of data operations to enable modern CI/CD workflows and automates data compliance for privacy regulations, including GDPR, CCPA, and the New York Privacy Act. In addition, Delphix helps companies sync data from private to public clouds, accelerating cloud migrations, customer experience transformation, and the adoption of disruptive AI technologies. Automate data for fast, quality software releases, cloud adoption, and legacy modernization. Source data from mainframe to cloud-native apps across SaaS, private, and public clouds.
  • 35
    Ziroh Store

    Ziroh Store

    Ziroh Store

    It’s unsafe to store/sync your critical files to cloud storage platforms. Because there is no cloud that is able to keep your details completely private to you. All your files on the cloud are telling tales about you to your cloud storage provider, your personal images, academic transcripts, bank details, and work documents. You really don’t have a say in who reads your information, and what they do with it. When you sync your gallery to your cloud, it exposes the personal photos and videos on your device to all third parties who have a backdoor to your cloud storage. They are privy to every private moment you capture and even delete. Do a simple search to check when your cloud storage provider was last hacked. Your files on the cloud are private to you, your cloud storage provider and their allies only until a savvy hacker looks your way. Ziroh Store is a privacy-preserving intuitive software that helps you to upload your files end-to-end encrypted to any of your cloud platforms.
  • 36
    TestBench for IBM i

    TestBench for IBM i

    Original Software

    Testing and test data management for IBM i, IBM iSeries, AS/400. Complex IBM i applications must be checked from top to bottom, right into the data, wherever it is. TestBench IBM i is a comprehensive, proven test data management, verification and unit testing solution that integrates with other solutions for total application quality. Stop copying the entire live database and hone in on the data you really need. Select or sample data with full referential integrity preserved. Simply decide which fields need to be protected and use a variety of obfuscation methods to protect your data. Track every insert, update and delete including intervening data states. Create rules so that data failures are flagged to you automatically. Avoid the painful save/restores and stop attempting to explain bad test results based on poor initial data. Comparing outputs is a well proven method to verify your test results but it can be laborious and prone to error. This unique solution can save hours.
    Starting Price: $1,200 per user per year
  • 37
    BooleBox

    BooleBox

    Boole Server

    BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. With boolebox solutions, we protect your data wherever it is, at work, in the cloud, in transit via e-mail, in shared projects, and in the most commonly used platforms, such as Windows, Outlook, Gmail, OneDrive, and SharePoint. We understand your potential digital vulnerabilities, and we protect them like no one else can because our protection is the bodyguard of your data. It never abandons it and follows it everywhere! We protect large amounts of data in different types of business sectors. We have been doing this every day since 2011.
  • 38
    FIS Tokenization
    The solution secures card payments anywhere by concealing sensitive cardholder information everywhere. FIS® Tokenization™ dynamically encrypts your card payments for ultimate security when customers pay online, with their phone or in a store. By replacing sensitive cardholder data with unique tokens that can’t be matched back to the cardholder or their account, our payment tokenization solutions can ease Payment Card Industry Data Security Standard (PCI DSS) compliance, better protect cardholders and manage your risk. Replace sensitive cardholder information with a unique token for reduced fraud risk. Enable cardholders to load card credentials to different payment apps quickly and securely. Simplify compliance by reducing the scope of systems that fall under the PCI DSS.
  • 39
    OmniToken
    OmniToken uses the same cryptographic key management principles used for industry standards such as PCI DSS, PCI Point-to-Point Encryption (P2PE). Best practice security standards help significantly reduce your risk from card data theft. OmniToken works across your payment environment, in store or online. It's used with all other processing and value-added Worldpay services, including account updating, fraud, recurring billing and back-office tools. OmniToken is flexible and interoperable across your other third-party service providers to meet the complex needs of your enterprise.
  • 40
    Finema

    Finema

    Finema

    We provide a holistic solution to all your credential ownership and management. Not only applicable to a wide range of scenarios, it is secure, convenient and fully owned by you. You can check whether the information presented is a real human, real transcript, authentic brand-name bag, or malevolent fraudster from barely revealing any data, thanks to our cryptographic technique. Our platform provides secure, privacy-preserving and cost-effective — the way to help people manage their identity on the internet.
  • 41
    Borneo

    Borneo

    Borneo

    Borneo is a real-time data security and privacy observability platform designed to help organizations discover, remediate, and govern data risks while ensuring privacy and compliance. It enables users to discover where health data, financial data, and PII are stored across unstructured data, SaaS apps, and public cloud environments. Borneo's risk correlation engine identifies data that violates security frameworks and privacy regulations, prompting immediate action. It offers automatic remediation through data masking, access changes, and encryption, and continuously monitors changes across the data landscape to maintain compliance and eliminate regulatory risk. Built by security practitioners from Uber, Facebook, and Yahoo, Borneo is crafted to handle data at scale. It features a powerful connector framework to integrate across diverse data landscapes, supports flexible and modular deployment, and ensures that data never leaves the user's cloud environment.
  • 42
    IRI Data Manager

    IRI Data Manager

    IRI, The CoSort Company

    The IRI Data Manager suite bundles the tools you need for faster data manipulation and movement: 1) CoSort makes light work of big data processing "heavy lifts" in DW ETL, BI/analytics, DB loads, sort/merge offload, etc. 2) FACT dumps very large database (VLDB) tables in parallel to flat files for ETL, DB migration, reorg, and archive. 3) NextForm performs and speeds file and table conversion, remapping, DB replication, data re-formatting, and federation. 4) RowGen subsets DBs or synthesizes structurally and referentially correct test data in tables, files, and reports. These IRI products address data integration and staging (ETL/ELT), big data packaging and provisioning, BI reporting and data wrangling (preparation) and DevOps. Use them alone or in the IRI Voracity platform to: improve data quality; speed sorting and data transformation; migrate and replicate data; replace legacy sorts; and, synthesize (plus virtualize) smart RDB and file test data.
  • 43
    Binarii Labs

    Binarii Labs

    Binarii Labs

    Binarii Labs has a patented data security process that uniquely solves cyber security risks, resilience, and bad actor threats. To revolutionize data security through a platform to enable people and enterprises to take back control, and ownership and secure custody of their own and their stakeholder’s data. This is achieved through our UK & UK-US-patented process which involves encryption, fragmentation, and distribution across multi-cloud storage solutions that enable business continuity, risk mitigation, and enterprises to uphold regulation and compliance. The secure storage of your data is proven through the world's first immutable ledger by providing the user a proof of record on the blockchain. Our patented data security process encrypts, fragments, and distributes your data wherever you want, and records its provenance on the blockchain for unprecedented security. 
However, you always own and control your data.
    Starting Price: €15 per month
  • 44
    generatedata.com

    generatedata.com

    generatedata.com

    Ever needed custom formatted sample / test data, like, bad? Well, that's the idea of this script. It's a free, open source tool written in JavaScript, PHP and MySQL that lets you quickly generate large volumes of custom data in a variety of formats for use in testing software, populating databases, and so on and so forth. The out-the-box script contains the sort of functionality you generally need. But nothing's ever complete - maybe you need to generate random esoteric math equations, pull random tweets or display random images from Flickr with the word "Red-backed vole" in the title. Who knows. Everyone's use-case is different.
  • 45
    Actifio

    Actifio

    Google

    Automate self-service provisioning and refresh of enterprise workloads, integrate with existing toolchain. High-performance data delivery and re-use for data scientists through a rich set of APIs and automation. Recover any data across any cloud from any point in time – at the same time – at scale, beyond legacy solutions. Minimize the business impact of ransomware / cyber attacks by recovering quickly with immutable backups. Unified platform to better protect, secure, retain, govern, or recover your data on-premises or in the cloud. Actifio’s patented software platform turns data silos into data pipelines. Virtual Data Pipeline (VDP) delivers full-stack data management — on-premises, hybrid or multi-cloud – from rich application integration, SLA-based orchestration, flexible data movement, and data immutability and security.
  • 46
    Enveil

    Enveil

    Enveil

    Data is the backbone of the digital economy, we change the paradigm of how and where organizations can leverage data to unlock value. Enterprises use Enveil’s award-winning ZeroReveal® solutions to securely and privately use data in-place across organizational boundaries, jurisdictions, and third parties while ensuring that the content of the interaction and the results are never exposed. Our PETs and homomorphic encryption-powered capabilities deliver an efficient and decentralized data collaboration framework designed to reduce risk and address business challenges including data sharing, monetization, and regulatory compliance. Protecting data while it's being used or processed, the ‘holy grail’ of secure data usage, we deliver the most mature encrypted search, analytic, and machine learning products on the market. Enveil is a pioneering privacy enhancing technology company protecting data in use for secure data usage, sharing, and monetization.
  • 47
    Symmetry DataGuard
    Modern businesses make decisions based on data. Modern privacy legislation is focused on the security and privacy of data. Some businesses are built on data. And as businesses become increasingly digital and move to the cloud, securing that data is more important than ever. While the cloud offers many advantages with flexibility and scalability, it also presents new challenges for data protection. One of the biggest challenges is the sheer volume of data that organizations need to protect. With the cloud, enterprises can generate and store vast amounts of data more easily than ever before. This data is often spread across multiple platforms and locations, making it more difficult to keep track of and protect. DataGuard DSPM extends the zero-trust philosophy to your hybrid cloud data stores and develops a complete understanding of what data types you have, where it data is stored, who and what has access, and how it’s secured.
  • 48
    SecurDPS Enterprise
    Protecting data transfer and use from initial data capture to its final destruction limits exposure to attack, accidents, oversights, or unauthorized access. The goal in this is to provide these benefits over the entire data lifecycle, helping to meet compliance objectives more quickly. Implementing data-centric security requires a platform that not only offers protection methods fitting your specific use cases, but that also allows you to identify and classify datasets and perform data analytics across all of them. The solution must be able to exceed minimum viable compliance and minimum viable security, while at the same time delivering maximum agility. It must furthermore enable you to integrate these capabilities easily into your enterprise applications and existing cyber security infrastructure. Ease of integration often can be the deciding factor in determining the cost and risk associated with any data protection project.
  • 49
    Z1 SecureMail Gateway
    25% of the 100 German companies with the highest turnover choose Zertificon. Z1 SecureMail Gateway is our highly automated Enterprise Email Encryption solution for effortless, secure communications with anyone, anywhere. Your entire organization encrypts and decrypts, just as well manages & verifies email signatures smoothly in the background. Z1 SecureMail Gateway requires minimal maintenance. And the browser-based admin interface needs no special skills. Keys are managed automatically & central policies enforce security. Integration is fast into your Cloud or On-premises email infrastructure. Your workflows and business are uninterrupted — no employee training needed plus frictionless experience for recipients. With Z1 SecureMail Gateway, encryption is centrally configurable and proofed against human error. You easily achieve and maintain compliance and the highest security standards. You also own all encryption keys and attain German-engineered data sovereignty with no backdoors.
    Starting Price: from $ 1.50 per user/per month
  • 50
    Mage Platform

    Mage Platform

    Mage Data

    Mage Data™ is the leading solutions provider of data security and data privacy software for global enterprises. Built upon a patented and award-winning solution, the Mage platform enables organizations to stay on top of privacy regulations while ensuring security and privacy of data. Top Swiss Banks, Fortune 10 organizations, Ivy League Universities, and Industry Leaders in the financial and healthcare businesses protect their sensitive data with the Mage platform for Data Privacy and Security. Deploying state-of-the-art privacy enhancing technologies for securing data, Mage Data™ delivers robust data security while ensuring privacy of individuals. Visit the website to explore the company’s solutions.