Alternatives to Informatica Data Privacy Management

Compare Informatica Data Privacy Management alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Informatica Data Privacy Management in 2024. Compare features, ratings, user reviews, pricing, and more from Informatica Data Privacy Management competitors and alternatives in order to make an informed decision for your business.

  • 1
    OneTrust Privacy & Data Governance Cloud
    Go beyond compliance and build trust through transparency, choice, and control. People demand greater control of their data, unlocking an opportunity for organizations to use these moments to build trust and deliver more valuable experiences. We provide privacy and data governance automation to help organizations better understand their data across the business, meet regulatory requirements, and operationalize risk mitigation to provide transparency and choice to individuals. Achieve data privacy compliance faster and build trust in your organization. Our platform helps break down silos across processes, workflows, and teams to operationalize regulatory compliance and enable trusted data use. Build proactive privacy programs rooted in global best practices, not reactive to individual regulations. Gain visibility into unknown risks to drive mitigation and risk-based decision making. Respect individual choice and embed privacy and security by default into the data lifecycle.
  • 2
    DATPROF

    DATPROF

    DATPROF

    Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
  • 3
    PrivIQ

    PrivIQ

    Compliance Technology Solutions

    PrivIQ is a complete data governance and privacy platform. We cover 8 data protection regulations representing 23% of the global economy PrivIQ is compliance software hosted in the cloud, that helps you to meet all the data protection regulations. Because we broke down the data protection regulations in 7 steps, you are able to manage your compliance journey, monitor the status and edit reports. From naming a DPO to managing subject access request and data breaches, PrivIQ is the all in one software you need to have to demonstrate compliance.
  • 4
    SAI360

    SAI360

    SAI360

    The most powerful, agile approach to risk management. The decisions you make today can help mitigate the risks you may encounter tomorrow. SAI360 is cloud-first software and modern ethics and compliance learning content designed to help your organization effectively navigate risk with a flexible, agile approach. Intelligent solutions, global expertise all in one award-winning platform. Solution configurability, extensible data model with configurable UI/forms, fields, relationships to extend solutions. Process modeling, easily modify or create new processes to automate and streamline risk, compliance, and audit activities. Data visualization and analysis, many out of the box and easy to configure dashboards to visualize and analyze data. Learning and best practice content – preloaded frameworks, control libraries, and regulatory content along with values-based ethics and compliance learning content. System integration – Integration framework with APIs and other protocols.
  • 5
    DataLark

    DataLark

    LeverX

    DataLark is an SAP-centric no-code / low-code data management platform that helps businesses streamline data migration, data maintenance, and integration processes. Using its customizable plugins and analytical tools, you can automate all ETL operations and orchestrate across all of your systems to drive better business decisions. DataLark's rapid deployment allows you to launch your data-related processes within hours with the help of live support and extensive documentation.
  • 6
    Mage Platform

    Mage Platform

    Mage Data

    Mage Data™ is the leading solutions provider of data security and data privacy software for global enterprises. Built upon a patented and award-winning solution, the Mage platform enables organizations to stay on top of privacy regulations while ensuring security and privacy of data. Top Swiss Banks, Fortune 10 organizations, Ivy League Universities, and Industry Leaders in the financial and healthcare businesses protect their sensitive data with the Mage platform for Data Privacy and Security. Deploying state-of-the-art privacy enhancing technologies for securing data, Mage Data™ delivers robust data security while ensuring privacy of individuals. Visit the website to explore the company’s solutions.
  • 7
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
  • 8
    iDiscover

    iDiscover

    Mage Data

    Uncover hidden sensitive data locations within your enterprise through Mage's patented Sensitive Data Discovery module. Find data hidden in all types of data stores in the most obscure locations, be it structured, unstructured, Big Data, or on the Cloud. Leverage the power of Artificial Intelligence and Natural Language Processing to uncover data in the most complex of locations. Ensure efficient identification of sensitive data with minimal false positives with a patented approach to data discovery. Configure any additional data classifications over and above the 70 out of the box data classifications covering all popular PII and PHI data. Schedule sample, full, or even incremental scans through a simplified discovery process.
  • 9
    Privacy360
    Discover, measure and mitigate data privacy risk to quickly get in compliance with the growing number of privacy regulations, from GDPR to CCPA and beyond, in a single, end-to-end, enterprise-grade platform. Comply with GDPR, CCPA, LGPD, PDPA and the hundreds of evolving global privacy laws. Automate the capture and fulfillment of consumer and data subject access rights (DSAR) requests. Leverage intelligent risk mitigation to uncover and remediate risks faster and more comprehensively. Embed branded request forms on your website, or inside of your product. Leverage intelligent templates and manage request dates and extensions per regulation (GDPR, CCPA & beyond). Quickly track down data through connectors and quickly collaborate with data process owners to resolve. Monitor the entire process with a dashboard, revealing patterns or requests and ways to optimize the process. Quickly benefit from a comprehensive view of all your privacy data, locations, and all your processing activities.
  • 10
    CYTRIO

    CYTRIO

    CYTRIO

    Automatically discover PI data across cloud and on-premises data stores and correlate with customer identity. Orchestrate data subject access requests (DSAR) and build customer trust. Enable customers to exercise data privacy rights with a secure, customizable privacy portal. Easily answer the critical who, what, why, and where questions about your PI data. Automated workflows for data, security, and privacy teams. Meet auditor obligations with detailed DSAR lifecycle history. Customizable and brandable privacy center. Secure communication and data download. Get up and running in minutes, no professional services required. Ideal for resource-constrained organizations. Data discovery, classification and ID correlation.
  • 11
    DatAnswers

    DatAnswers

    Varonis

    Easily respond to data subject access requests by surfacing personal information across cloud and on-prem files with fast and powerful search. Find any file with personal data in seconds with Varonis’ purpose-built search engine. We instantly surface and collect the information you need for DSARs, right to be forgotten, or e-discovery—all with super lean infrastructure. Our DSAR form uses sophisticated logic on the backend to ensure you get high-fidelity results, so you can avoid false positives (and fines). Keep a pulse on how much data you’ve indexed and any failed documents so that you always know the scope of your searches. Sensitive data creation doesn’t stop and privacy regulations are ever-evolving. Privacy automation can help you stay ahead. Easily see where you have overexposed PII with dynamic dashboards that highlight privacy issues. Reduce the risk of breaches and fines by monitoring for unauthorized access to sensitive information and restricting access to least privilege.
  • 12
    Mandatly

    Mandatly

    Mandatly

    Offers the ideal GDPR, CCPA, LGPD and other privacy compliance solutions to manage privacy management activities, build accountability and achieve regulatory compliance. Automates your privacy management program and ensure compliance with minimal manual effort. Built-in intelligence to analyze and assess risks, provide recommendations that enable mitigation. Enhanced dashboard and reporting capabilities provide visibility and enable decision making. Predefined PIA/DPIA questions templates, automated workflows and notification templates enable you to conduct assessments periodically and engage business teams and IT effectively. Workflow driven surveys to identify systems and personal data sources to generate "Record of Processing Activities (RoPA)." Predefined process steps to maintain data inventory efficiently. Fully automated process to fulfill DSAR, enabled with automated workflow and data discovery.
  • 13
    Privacy Nexus

    Privacy Nexus

    Privacy Nexus

    Create and maintain your record of data processing activities with ease and in accordance with article 30 of the GDPR. Use the dashboard to track your progress, identify risks and determine priorities. The dashboard is the perfect starting point for all privacy professionals. Perform data protection impact assessments to identify privacy risks and to take appropriate measures to minimize them. Handle your incidents and data breaches with a clear workflow that guides you through the process from beginning to end. ‍Send out questionnaires to your vendors to periodically assess their compliance with your data processing agreements. ‍Create a clear overview of all the data subject requests your organization has received and monitor their progress. ‍Use the privacy, information security and data management scans to establish how your organization is doing in these areas and receive recommendations for improvement.
  • 14
    PrivacyPioneer

    PrivacyPioneer

    PrivacyPioneer

    Cover cap found from the data to delete the data life cycle of personal information protection systems, integrated automation, intelligence, visualization processing power, on the basis of the legal compliance, high efficiency and low cost to help business customers manage personal information, data Value innovation. Automatic personal data discovery, support structured and unstructured data, compatible with various mainstream databases. Construct a visual data map to visually display data attribution, relationship, processing history, etc. Manage the rights requests of data subjects and realize the automatic matching and response of personal information. Manage personal data processing behaviors and permissions, and ensure compliance with all access, processing behaviors, and access permissions. Intelligent privacy impact assessment and data protection impact assessment, combined with periodic automatic internal audits, minimize compliance risks.
  • 15
    Opsware

    Opsware

    Opsware

    Legal and engineering teams are using Opsware to embed privacy workflows across their organizations to simplify compliance with modern privacy laws. No coding is required. Eliminate the tedious work that comes with building data maps and managing vendors. Discover data sources using our fast and reliable data discovery and classification solutions. Trust our automation technology to complete your customers' data requests and consent changes across every data system and vendor. Get your teams on one tool and workflow. Track the flow of personal data across your company to operationalize compliance and get visibility into risk. We cover the workflows required to build out processing records with a single click. Your company data is fully controlled by you. Provision our virtual appliance on-premise so you can ensure that personal data doesn't leave your secure data context. Every business is data first and every company collects personal data.
  • 16
    MineOS
    💯 The #1-rated Data Privacy & Security platform on G2, custom-built with a people-centric approach to please and empower privacy and compliance professionals. We're so confident you'll love our platform, too, that our PoCs are completely free. Thanks to the fastest implementation time and the highest ROI on the market, companies can strengthen their privacy programs to handle DSARs, RoPA reports, and other privacy tasks faster and get true oversight over user data within days. We’re innovating the sphere so anyone within an organization can use and understand the value of data privacy through: Email Navigator Technology, Continuous Data Classification & Smart Sampling, Mine Radar, Data Mapping, Automated DSR/DSAR, Automated ROPA, DPIA and PIA reports, AI Suggestions, Consent Management, Vendor Risk Assessment. With MineOS, you’re not just investing in data governance, you’re creating a two-way street with your customers to show you respect their digital rights. MineOS.ai
  • 17
    Data Sentinel

    Data Sentinel

    Data Sentinel

    As a business leader, you need to trust your data and be 100% certain that it’s well-governed, compliant, and accurate. Including all data, in all sources, and in all locations, without limitations. Understand your data assets. Audit for risk, compliance, and quality in support of your project. Catalog a complete data inventory across all sources and data types, creating a shared understanding of your data assets. Run a one-time, fast, affordable, and accurate audit of your data. PCI, PII, and PHI audits are fast, accurate, and complete. As a service, with no software to purchase. Measure and audit data quality and data duplication across all of your enterprise data assets, cloud-native and on-premises. Comply with global data privacy regulations at scale. Discover, classify, track, trace and audit privacy compliance. Monitor PII/PCI/PHI data propagation and automate DSAR compliance processes.
  • 18
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
  • 19
    Proteus NextGen Data Privacy
    Proteus NextGen Data Privacy software provides DPOs, Privacy teams and Legal teams with the data privacy management tools required to manage GDPR compliance, CCPA compliance or other data privacy compliance programme, comprehensively and effectively. Designed for enterprise organisations using current, secure technologies, Proteus NextGen is often regarded as the most highly configurable and comprehensive data privacy software on the market. Covering Privacy Impact Assessments, DPIAs, Transfer Impact Assessments, data mapping, reporting (eg Records of Processing Activity reports), Subject Access Request management, breach notification, vendor management, risk assessment and even automated SCC generation to help with Schrems II compliance, plus other features you would and would not expect. With training and consultancy available to get you up and running quickly, we aim for ultimate customer satisfaction. Go to our website to request a demo www.proteuscyber.com
  • 20
    Iconfirm

    Iconfirm

    Iconfirm

    Ensuring high precision privacy provides greater opportunity for data-driven value creation and reduces the risk of a breach. This requires a systemic approach and to organize the work in the right way. Many organizations struggle with lack of competence and resources and a growing gap between policies and practice. This represents an unnecessary risk and organizations need to operationalize and automate. Privacy cannot be organized segregated from ordinary activities, but must be embedded where the processing of data actually happens. Iconfirm ensures efficient and structured collaboration between individuals, systems and organizations to automate privacy documentation and adherence. A high precision tool for consents or confirmations. Efficient management of data processors and vendors. Data subjects privacy portal builds trust and makes it easy to collaborate. Secure storage, sharing and automated erasure across systems.
  • 21
    Raptor Compliance

    Raptor Compliance

    Raptor Compliance

    Evaluate your high-risk data processing. Risks must be controlled and monitored. For this purpose it is necessary to define responsibilities. Data protection impact assessment documentation is an important tool for authorities and other stakeholders to demonstrate the lawfulness of processing operations that present risks. What is the risk in a procedure, what are the risks to the rights and freedoms of natural persons? These must be determined. How high is the risk? What effects and probabilities are associated with a risk? These factors determine to a large extent whether processing can take place. The DPMS creates a web form for you to integrate into your digital channels. In this way, inquiries are immediately recorded in case management. Case Management provides you with an overview of current cases and their processing. Of course, each case processing is logged in order to fulfill the legal obligations to provide evidence.
  • 22
    Secuvy AI
    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 23
    DATA LEGAL DRIVE

    DATA LEGAL DRIVE

    DATA LEGAL DRIVE

    The diagnostic allows you to assess your GDPR compliance level. It will help you identify areas for improvement, build an action plan, and prioritize the steps required to move smoothly through the compliance process. Work collaboratively and speed up processing mapping using built-in templates. Select standard processing activities or add new ones, complete the information required and validate to finalize processing mapping. Whether you’re contacting data subjects or processing their requests via secure authentication, it’s easy to manage and archive data subject requests from your employees, customers or service providers directly, all on a single platform. Discover the highly intuitive, simple and secure user interface. Automate your processes, map your processing activities and generate your record in a few clicks, easily manage and archive employee, customer and service provider DSRs. Use built-in templates to create standard contracts, clauses, emails et legal notices.
  • 24
    1touch.io Inventa
    Partial visibility into your data is putting your organization at risk​. 1touch.io uses a unique network analytics approach, powerful ML and AI techniques together with unprecedented data lineage accuracy to continuously discover and catalog all your sensitive and protected data into a PII Inventory and a Master Data Catalog. We automatically discover and analyze all usage of data and its lineage without relying upon the organization’s knowledge of the existence or location of the data. Adding a multilayer machine learning analytic engine gives us the ability to “read and understand” the data and link all the pieces into a full picture represented as both a PII inventory and a Master Catalog. Finding your known and unknown sensitive data within your network allows for immediate risk reduction. Organizing your data flow to understand precise data lineage and business processes enables you to achieve core compliance requirements.
  • 25
    DataWise

    DataWise

    Data Protection People

    Our cybersecurity dashboard, DataWise, has been designed and built to manage Data Protection in a single dashboard. It provides practical features and templates for data protection compliance, allowing organisations to automate and control many of the tasks required to comply with legislation like the Data Protection Act 2018 (DPA) and General Data Protection Regulation (GDPR). We have been busy behind the scenes developing an updated release of DataWise 2.0. The new update is mobile-friendly, simple to use and practical. The cybersecurity dashboard now features a comprehensive register of all your data assets, data processes and risks. Sign up for our newsletter to receive information on the release date!
  • 26
    BigID

    BigID

    BigID

    BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2
  • 27
    Auditrunner

    Auditrunner

    Auditrunner

    The Secure Audit, Risk, Compliance & Quality Software. With On-Premise and Cloud-based deployment options. Auditrunner offers granular encryption and role-based access control for audit files and documents at-rest. All data transfers are protected. We have automated 3000 business processes for enterprises around the world. Our GRC platform modules are just a few of them. Cloud-based or On-Premise, deploy and start using. Hassle-free integration process enables you to enjoy the benefits of the platform within weeks of kickoff . The low-code platform we are built upon is fully customizable and allows for compliance with any standard or regulation. Operate in a responsive manner in today’s fast-moving, ever-changing regulatory environment and comply with multitude of different legislation instantly without the need for assistance. The ease of use we offer is unmatched.
  • 28
    WeControl

    WeControl

    WeControl

    WeControl is a comprehensive platform that makes your journey smooth and simple. We guide you carefully through various GDPR disciplines to help you make your compliance activities controlled and demonstrable. A list of simple tasks and a comprehensive compliance roadmap that guide you through the whole process with a seamless toolset at your fingertips - everything you need in a single dashboard to make GDPR compliance management simple and less time-consuming. Whether you do standard processing, automated profiling or processing special categories of data we are here to guide you step by step through managing all of your Data Protection Impact Assessments (DPIA) with valuable advice on how to safeguard your business and your users.
  • 29
    PrivacyPerfect

    PrivacyPerfect

    PrivacyPerfect

    Your accountability solution for easy GDPR compliance. Enjoy an easier and smoother regulatory compliance process, empowering privacy professionals worldwide. Empower your privacy program with one smart, easy-to-use, and secure tool, with integrated automation to help to perform all your compliance tasks. Make your compliance visible towards your key stakeholders. Easily communicate your results within the privacy team and towards upper management through pre-designed, automated reports. Gain overview of your entire privacy administration, whilst remaining in full control. Use smart automation wherever you please to help streamline and standardize your processes. Comply with all requirements of the GDPR while simplifying your data protection efforts.
  • 30
    PK Privacy
    Organizations are required to keep up with the ever-changing privacy landscape, and protect personally identifiable information they interact with. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation. Automate the DSAR response process to meet requirements faster and on budget. Create rules that will delete or redact sensitive data as soon as it is found. Enable pseudonymization, anonymization, and de-identification of private personal data. Find data that can and/or should legally be archived or deleted due to age or lack of use. Detect and confirm breaches with monitoring, then accurately estimate and report on the breach’s impact. Continuously monitor endpoints, servers, and enterprise solutions for privacy data. Organizations are required to keep up with the ever-changing privacy landscape and protect personally identifiable information they interact with.
  • 31
    Transcend

    Transcend

    Transcend

    Transcend is the data privacy infrastructure that makes it simple for companies to give their users control over their personal data. Personal data is disorganized, hard to spot, and stored across many systems. That makes offering data rights—like deleting your data—very hard for companies. Transcend automatically fulfills data subject requests inside companies, across all of their data systems and vendors. Transcend also provides their end-users with a control panel, or “Privacy Center”, hosted at privacy.<company>.com where users can manage their privacy preferences, export their data, or delete it. By making data subject requests painless for companies, Transcend is putting users everywhere in the driver’s seat of their personal data.
  • 32
    Privacy Tools

    Privacy Tools

    Privacy Tools

    Stay compliant with the most advanced privacy management solution. Manage cookies and make your portal compliant. Create and manage your website policies. Register and manage universal consent. Comply with the rights of data subjects. Let the user exercise their preferences. Generate monitoring reports on your projects. React quickly and provide the necessary notifications. Discover, analyze, and correct data at scale. Define and implement the controls, actions, and strategies of your ESG program. Allows you to register, manage, and renew the consent of data subjects, integrating them with the tools used by the organization. A module for capturing and managing consents, which works universally. Our solution allows simple integration with your website and systems for managing consents, such as terms of use, marketing, cookies, applications, authorizations, and others. Identify which users consented or revoked their consent, presenting an audit of these events.
  • 33
    Cloud Compliance

    Cloud Compliance

    Cloud Compliance

    Operationalize privacy compliance and data security on Salesforce with the most comprehensive suite of products. The success of privacy programs requires thorough data inventory and risk assessment. However, most organizations end up overlooking pockets of data and struggle with manual processes and spreadsheets. Our Personal Data Inventory product is designed to automate and streamline DPIA and enterprise data inventory flows. Make it easy for your organization to have an accurate data inventory and clear risk assessment. Most organizations are seeing an increase in privacy right requests. Trying to meet these requests manually is inconsistent, error-prone, and increases the risk of non-compliance. Our Privacy Rights Automation product enables self-service and automates all privacy rights related activities. Mitigate the risk of non-compliance with a standardized and error-free solution.
  • 34
    Smart Privacy

    Smart Privacy

    Smart Privacy

    One tool, easy to use for all your DPIA, ROPA and Audit needs. Our record of processing helps you in Locating data, ensuring visibility and compliance. Edit easily to update and Filter and sort by Process or legal entities and assign To business owners. We have designed questionnaires for DPIA and ROPA compliance needs. Use our pre-built DPIA with Pre-defined checklists and Remediation actions to Make DPIA’s easy to manage and monitor and track risks and actions. Smart Privacy lets you see how well you are complying at anytime. Generate information about your level of compliance in Excel and PDF, Word format to use internally or to provide to Regulators.
  • 35
    Privacy Control Center

    Privacy Control Center

    Privacy Control Center

    Through tailor made modules and workflows, Privacy Control Center bolsters all aspects of protecting and working with personal data. The status of your organization's privacy activities summarized in an easy-to-understand visual representation. The status of your organization's privacy activities summarized in an easy-to-understand visual representation. Extensive, but accessible register for recording processing activities, data subjects' requests and data leaks. The audit and control module has been developed to safeguard your privacy policy in the short and long term. All privacy measures translated into a plan of action and planning. All internal and external documents collected in one place. The knowledge base is supplied with a set of basic documents, which you can expand with internal knowledge and processing agreements. The Privacy Control Center has been developed as a maintenance solution for processing data, through administration, in a structured manner.
  • 36
    ServiceNow Privacy Management
    Identify and manage privacy risks across the enterprise with workflow automation. Stay compliant with evolving global data privacy regulations. Operationalize risk and resilience as part of the employee experience. Eliminate privacy risks, respond promptly to emerging threats, and comply with global data privacy regulations, all powered by the Now Platform®, a single system of action for the enterprise. Embed privacy management into daily workflows, making it a natural part of the enterprise fabric. Privacy Management includes AI and other powerful platform capabilities so you can get access to real-time intelligence to improve visibility and data privacy-related decisions. Transform your business with a single, unifying platform for digital business.
  • 37
    Granite GDPR Data Protection
    Granite GDPR Data Protection is a digital tool developed to answer the need and requirements of EU's General Data Protection Regulation. With an easy-to-use data protection solution you effectively assess your data protection situation, manage corrective measures and produce automated reports for monitorin of results and deliver on set goals. With Granite Data Protection challenges are easily identified and systematically assessed which makes easy to comply with the General Data Protection Regulation (GDPR) and other regulations. Create an up-to-date-snapshot of your data protection situation with Granite Data Protection. Stay informed about changes in data protection and focus your development efforts effectively Granite Data Protection. Create and maintain compliance with the GDPR Granite Data Protection.
  • 38
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
  • 39
    OMNIPRIVACY

    OMNIPRIVACY

    OMNIPRIVACY

    AVG/GDPR is not a tick in the box. It is there to stay and needs to be embedded in the way organizations are organized and working. OMNIPRIVACY, a 360°AVG/GDPR management tool, has been designed by OMNINET Software Solutions with the aim of insuring 100% control and oversight of AVG/GDPR Readiness by continuously monitoring 7 processes: the processing register, contract management, data leaks, privacy requests, document management, risk management and dashboards. Read on and discover how OMNIPRIVACY can contribute to this within your organization. Manage and document all processing activities related to personal data. Manage all types of privacy requests from one central point (right to be forgotten, right of access, etc.). Easily gain insight into previously made agreements or agreements yet to be made which relate to data processors or data controllers. Manage identified risks and define procedures and measures.
  • 40
    Manetu

    Manetu

    Manetu

    The Manetu data crypto-vault provides enterprise class personal and sensitive data management services across critical business priorities. A repository where personal and, or sensitive data is ingested, secured and de-identified such that it can be used for analytics, testing, discovery and, other revenue generating capabilities. Data use across organizations compromises security, privacy and, consent. Needs a copy of the data to develop new applications to maintain good client satisfaction. Needs a copy of the data to run new sales plays, grow the business or deliver on goods and services. Needs a copy of the data for analysis to create new, targeted marketing campaigns. Needs a copy of the data to run reports on how the business is doing. Needs a copy of the data to develop new models and algorithms to drive margin expansion. These data usage models propagate risk as more exposure is created throughout an organization.
  • 41
    Data443 Global Privacy Manager
    We make it possible for retailers to champion their customers’ privacy rights while maintaining conversion and simplifying SAR processing. Make your privacy settings the new standard for user experience and customer service. Give your customers clear access to easy-to-understand settings. Give customers a one-stop location for all their privacy needs. Provide clear, accurate explanations of the data you collect and how it is used. Earn increased trust in return. All-or-nothing consent doesn’t benefit you or your customers. Allowing customers to opt-in or out of specific data collection gives them more control and improves your conversion rates. Provide an easy-to-understand report that allows customers to see what data you’ve collected, how it’s being used, and that it’s being protected properly. Enhance your customers’ privacy experience with rapid responses to Subject Access Requests (SARs) while simplifying processing for your team.
  • 42
    Privacy Request

    Privacy Request

    Privacy Request

    Demonstrate and automate compliance for GDPR & CCPA. Build trust with your customers. Simplify & scale privacy at your business. Eliminate the tedious work that comes with building data maps and compliance records. Discover data sources using our fast and reliable data discovery and categorization solutions. Trust our automation technology to complete your customers' data requests and consent changes across every data system and vendor. Track the flow of data to, through and from your company to ensure strict compliance and risk mitigation. We cover all privacy operations from data sources and business processes, to identifying data owners, vendors and stakeholders. We provide a self-service, no-code integration builder that enables your team to build privacy automation into your proprietary or home-brewed systems. No coding or engineering required.
  • 43
    Trunomi

    Trunomi

    Trunomi

    Trunomi is the leading Data Privacy platform for businesses who want more than just a compliance suite. Our technology is preferred by businesses for privacy compliance as we are the only platform to offer comprehensive solutions without needing to see, copy or store the PII held by your business. Instead, Trunomi uses only metadata to provide seamless Privacy Services – making it fast and secure to implement and making it a truly Privacy-by-Design service. Automate necessary actions against any data sets when time periods expire – based on rules defined by you. Match personal data records across databases and systems and combine them into a single record. Visualise where data travels across systems, partners and borders, and map where it is stored. Understand where source data ends up in your business, and where it gets copied to and from.
  • 44
    Data Privacy Manager

    Data Privacy Manager

    Data Privacy Manager

    Our team of talented and skilled developers started working on Data Privacy Manager with a vision of creating a well-rounded data privacy platform that will be used by our clients to provide them with a single and unique 360 degrees view of their customers’ personal data lifecycle. Data Privacy Manager is a mature platform and is used in many different vertical markets, helping its users, both data controllers and data processors, to regain control over personal data they’ve been entrusted with. In addition to the traditional full-time Data Protection Officer (DPO) scenario, this product is also designed specifically to support the shared-DPO model, where different firms can buy the service of a single DPO, typically from legal or consulting firms. But the real value of this offering is the opportunity to manage security controls for data retention schedule and deletion of data.
  • 45
    NetApp Cloud Data Sense
    Driven by powerful AI algorithms, NetApp® Cloud Data Sense provides automated controls and reporting so that you can always stay on top of your data. Data availability, ownership, completeness, and quality are crucial for business efficiency and cost optimization. Make smart data decisions, and automate and execute those data optimization plans you’ve been delaying. NetApp Cloud Data Sense automatically discovers, maps, and classifies your data, wherever it might be. With Cloud Data Sense, you can automatically label and act on information stored in files and database entries. By using granular data parameters and AI-driven contextual language identification, Cloud Data Sense makes it easier to govern your data. It visualizes your data for you at all times. Cloud Data Sense lets you analyze a wide and growing range of data sources. You can analyze structured and unstructured data, in the cloud or on premises.
  • 46
    Ohalo

    Ohalo

    Ohalo

    Ohalo's Data X-Ray platform automates data governance tasks like: - Data Discovery & Classification - Data Mapping & Cataloguing - Redacting Files containing sensitive personal information - File Analysis & Data Extraction ⚡️ML-Driven Data Governance | 100,000 words/second | 300 built-in Integrations | Integration with any DLP/SIEM | 360-degree Unstructured Data Visibility | Agentless | Supports 100s of formats | Find PII, payment card information (PCI), and protected health information (ePHI). | Custom connectors for individual data sources (bespoke/legacy) ⚡️ Designed for enterprises, Data X-Ray is provided as a self-managed or fully-managed service. Our customers rely on Data X-Ray for file activity monitoring, security enhancement, and privacy compliance. ⚡️ Deploy Data X-Ray in hours in cloud and on-premise environments ⚡️ Find sensitive data in minutes ⚡️ Easily classify files and records from multiple file repositories and locations
  • 47
    WireWheel

    WireWheel

    WireWheel

    WireWheel is a leader in the privacy and data protection space. Leveraging the team’s deep privacy expertise, WireWheel has developed an easy-to-use software-as-a-service platform that enterprises, including large financial institutions, telecoms, and consumer-facing brands use to manage their privacy programs. A central hub to quickly launch and grow your privacy program. Get up and running in minutes with pre-built templates and easy to configure workflows. Use technology to solve your problems, not create them! Accelerate compliance with pre-built templates and workflows for EU GDPR, CCPA, Privacy Shield, LGPD and more. Empower people to build privacy into products and processes from the start. Use WireWheel as a powerful orchestration layer for your privacy program by quickly integrating with existing processes and systems. Automate daily privacy challenges with a simple to use and configurable platform where extended teams can easily collaborate.
  • 48
    Concord Consent & Compliance
    Build trust and loyalty with your users, reduce opt-outs and drop-offs, and ensure compliance with the latest data privacy regulations. Our client library and powerful APIs make it dead simple to automatically capture any type of consent event, from cookie consent to terms of service to others (newsletter sign-ups, SMS opt-ins, etc.). Build trust with your users by allowing them to quickly see their communication preferences and data privacy options with our single line of code data privacy widgets. Quickly handle data privacy requests from users that are required by certain data privacy regulations like CCPA and GDPR (including data subject access requests or DSARs). Integrate with the existing technology investments that you have made for marketing, personalization, etc. by feeding consent and compliance data to those systems or by pushing user data into Concord. View and manage your verified data privacy requests as they are processed, moving them from acceptance to completion.
  • 49
    ContextSpace

    ContextSpace

    ContextSpace

    Make the shift from a slow, expensive, and reactive privacy programme to an agile, effective, and affordable privacy enforcement solution. It's a dynamic approach that can replace dozens of point solutions, offering holistic and integrated privacy & data protection enforcement. We directly produce comprehensive compliance outcomes, preventing over 90% of GDPR and other regulatory infringements from ever happening, proactively preventing unlawful data processing and data disclosure, proactively preventing external data breaches fulfilling all personal data subject rights, generating detailed records of processing, and updating all necessary compliance documentation. At the heart of the "Data Protection by Design" concept is the requirement to proactively enforce privacy policies in real-time, preventing privacy and data protection infringements. Your data might live everywhere, but we can connect to it.
  • 50
    Ethyca

    Ethyca

    Ethyca

    Let Ethyca do the legwork for all CCPA & GDPR tasks. Save your team hours of effort with an instant, birds-eye view of the business’s data supply chain. Ethyca makes Subject Access, Edit, & Erasure Requests light work or if your team prefers, no work at all. Automate the return of all user data categorized by processing activities upon request. Automate the ability for Subjects to select and rectify their data records with Ethyca’s ability to retrieve individual attributes. Automate CCPA compliance by letting Ethyca process all “do not sell my data” Requests. You could run around the office every day trying to update your users’ consent preferences. Or you could just use Ethyca. Ethyca links cookie consent to processing activities for each user’s personal data record. Ethyca comes with a custom-branded, easy-to-use interface to let your users manage their consent.