Alternatives to AnalyticDiD
Compare AnalyticDiD alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to AnalyticDiD in 2026. Compare features, ratings, user reviews, pricing, and more from AnalyticDiD competitors and alternatives in order to make an informed decision for your business.
-
1
IRI Voracity
IRI, The CoSort Company
Voracity is the only high-performance, all-in-one data management platform accelerating AND consolidating the key activities of data discovery, integration, migration, governance, and analytics. Voracity helps you control your data in every stage of the lifecycle, and extract maximum value from it. Only in Voracity can you: 1) CLASSIFY, profile and diagram enterprise data sources 2) Speed or LEAVE legacy sort and ETL tools 3) MIGRATE data to modernize and WRANGLE data to analyze 4) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. Use Voracity to comply with data privacy laws, de-muck and govern the data lake, improve the reliability of your analytics, and create safe, smart test data -
2
IRI FieldShield
IRI, The CoSort Company
IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones. -
3
Informatica Persistent Data Masking
Informatica
Retain context, form, and integrity while preserving privacy. Enhance data protection by de-sensitizing and de-identifying sensitive data, and pseudonymize data for privacy compliance and analytics. Obscured data retains context and referential integrity remain consistent, so the masked data can be used in testing, analytics, or support environments. As a highly scalable, high-performance data masking solution, Informatica Persistent Data Masking shields confidential data—such as credit card numbers, addresses, and phone numbers—from unintended exposure by creating realistic, de-identified data that can be shared safely internally or externally. It also allows you to reduce the risk of data breaches in nonproduction environments, produce higher-quality test data and streamline development projects, and ensure compliance with data-privacy mandates and regulations. -
4
HushHush Data Masking
HushHush
Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms. -
5
PK Privacy
PKWARE
Organizations are required to keep up with the ever-changing privacy landscape, and protect personally identifiable information they interact with. PK Privacy gives organizations the power to automate data discovery and reporting mechanisms to assist with reducing the operational complications of privacy legislation. Automate the DSAR response process to meet requirements faster and on budget. Create rules that will delete or redact sensitive data as soon as it is found. Enable pseudonymization, anonymization, and de-identification of private personal data. Find data that can and/or should legally be archived or deleted due to age or lack of use. Detect and confirm breaches with monitoring, then accurately estimate and report on the breach’s impact. Continuously monitor endpoints, servers, and enterprise solutions for privacy data. Organizations are required to keep up with the ever-changing privacy landscape and protect personally identifiable information they interact with. -
6
Randtronics DPM easyData
Randtronics
DPM easyData is a high-performance data spoofing or de-identification engine. Data spoofing examples include masking, tokenization, anonymization, pseudonymization and encryption. DPM data spoofing processes replace whole or parts of sensitive data with a non-sensitive equivalent (creates fake data) and is a very powerful data protection tool. DPM easyData is a software data security solution that allows web and app server applications and databases to tokenize and anonymize data and apply masking policies for unauthorized users when retrieving sensitive data. The software allows a high level of granularity, defining which authorized users have access to which protection policies, and what operations they may perform with those protection policies. DPM easyData is extremely customizable and is able to protect and tokenize many different types of data. The software has been designed to be flexible and users are free to define any format of input data and token format. -
7
Tonic
Tonic
Tonic automatically creates mock data that preserves key characteristics of secure datasets so that developers, data scientists, and salespeople can work conveniently without breaching privacy. Tonic mimics your production data to create de-identified, realistic, and safe data for your test environments. With Tonic, your data is modeled from your production data to help you tell an identical story in your testing environments. Safe, useful data created to mimic your real-world data, at scale. Generate data that looks, acts, and feels just like your production data and safely share it across teams, businesses, and international borders. PII/PHI identification, obfuscation, and transformation. Proactively protect your sensitive data with automatic scanning, alerts, de-identification, and mathematical guarantees of data privacy. Advanced sub setting across diverse database types. Collaboration, compliance, and data workflows — perfectly automated. -
8
Viacryp
Viacryp
Experience the convenience of a Trusted Third Party ( TTP ) for the careful pseudonymization of personal data, so that you can perform data analysis within the framework of the GDPR. Our basic service consists of pseudonymizing personal data. For this, we apply the principles of irreversible pseudonyms and thickening of behavior. The pseudonymized data is the source of further processing by our clients. Our filter service offers the possibility to share personal data proportionally and therefore with respect for privacy. We filter the information based on an expertly pseudonymized whitelist and only forward the information of individuals who appear on the whitelist. Viacryp provides privacy advice regarding the protection and security of personal data. Together with our partners, we advise on the measures to be taken as an organization to comply with the frameworks of the GDPR. This concerns both technical measures and organizational and process measures. -
9
Nymiz
Nymiz
Hours spent anonymizing data manually is time taken away from actual work. When data isn’t easily shareable, information gets trapped, creating silos within the organization and leading to poor knowledge management. The constant worry of whether shared data is compliant with ever-evolving regulations (GDPR, CCPA, HIPAA & more). Nymiz securely anonymizes personal data, through reversible or irreversible methods. The original data is replaced with asterisks, tokens or synthetic surrogates to improve privacy while maintaining the value of the information. By recognizing context-specific data like names, phone numbers, and social security numbers, we achieve superior results compared to tools that lack artificial intelligence capabilities. Additional security layer at the data level. Anonymized or pseudonymized information has no practical value if it is stolen through a security breach or exposed by human errors. -
10
DOT Anonymizer
DOT Anonymizer
Mask your personal data while ensuring it looks and acts like real data. Software development needs realistic test data. DOT Anonymizer masks your test data while ensuring its consistency, across all your data sources and DBMS. The use of personal or identifying data outside of production (development, testing, training, BI, external service providers, etc.) carries a major risk of data leak. Increasing regulations across the world require companies to anonymize/pseudonymize personal or identifying data. Anonymization enables you to retain the original data format. Your teams work with fictional but realistic data. Manage all your data sources and maintain their usability. Invoke DOT Anonymizer functions from your own applications. Consistency of anonymizations across all DBMS and platforms. Preserve relations between tables to guarantee realistic data. Anonymize all database types and files like CSV, XML, JSON, etc.Starting Price: €488 per month -
11
Clario Image Redact AI
Clario
Clario’s Image Redact AI automatically redacts sensitive patient identifiers from videos, photos and PDFs. Our industry-leading solution pairs AI-driven de-identification with expert human oversight of a quality control (QC) team to help you comply with EU GDPR and other privacy regulations for videos. Avoid steep fines and downstream liability from potential data breaches by redacting sensitive patient identifiers. De-identification of every image using our proprietary AI functionality and human visual QC review to verify all appropriate de-identification is complete. Every image is backed up in multiple geographic locations using data centers and systems that adhere to the latest advanced security best practices. Easily access and review your secure videos, photos and PDFs on any device for clinical trial research projects. -
12
HealthVerity Census
HealthVerity
Resolve patient identity on-demand by seamlessly mastering and linking data in real-time. By transforming protected health information into universal, de-identified HealthVerity IDs, life sciences organizations can accurately build and share the patient journey across partner datasets, while creating a single source of truth for patient identity. Enable internal enterprise data share to better understand the patient journey across organizational departments. Create the flexibility for external data exchange with patient registries, health insurers and other companion companies. HealthVerity Census is the first step in driving a data strategy built upon data activation, data interoperability and patient longitudinality. It leverages a state-of-the-art PaaS de-identification solution to activate internal and external touch points and data isolated in silos across the enterprise. -
13
Integral
Integral
Effortlessly accelerate your data processing, collaborate securely, and unlock new insights. Our software aligns with HIPAA regulations and has strong security & privacy protections. Experiment with different elements to optimize for your business use case & maintain compliance. Auto tracking and generating of all documentation for easy compliance reporting management. Leveraging de-identified data enables companies to discover novel insights and make innovative business decisions. However, safely working with de-identified data requires expert certifications. Today, expert certifications are conducted by consultants who lack transparency, speed, and flexibility. Integral is an automated expert certification software that enables you to work with your data in hours, rather than months. -
14
PHEMI Health DataLab
PHEMI Systems
The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden. PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools. -
15
IRI DMaaS
IRI, The CoSort Company
Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.Starting Price: $1000 per day -
16
DataVantage
DataVantage
DataVantage offers comprehensive data management solutions designed to secure and manage sensitive information across mainframe and distributed environments. Key offerings include DataVantage for IMS, Db2, and VSAM, which provide advanced data masking, editing, and extraction capabilities to protect Personally Identifiable Information (PII) during non-production processes. DataVantage DME (Data Masking Express) offers cost-effective, on-the-fly data masking for Db2, IMS, and VSAM environments, ensuring compliance without disrupting existing workflows. For distributed systems, DataVantage Global delivers robust data masking, obfuscation, and de-identification, supporting compliance and operational efficiency across platforms. Additionally, DataVantage Adviser simplifies COBOL file management post-mainframe rehosting or application modernization, enhancing data accessibility and editing. -
17
Privacy1
Privacy1
Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmenStarting Price: $159 per month -
18
Rectify
Rectify
Automating privacy with secure redaction for document distribution. Rectify leverages privacy-enabled artificial intelligence to automate the removal of private information when data sharing occurs. We help organizations decrease the human involvement required to identify and remove consumer identities, trade secrets, IP and other private data in data sets that are being sent to third parties. Our experts have protected tens of millions of pages, and counting. Automating data protection with "privacy-enabled AI" deidentification. Break free from manual redaction with Rectify's secure AI redaction. The consequences of sharing sensitive information without using a secure redaction tool can be daunting. Rectify provides a complete end-to-end solution for your redaction needs. Choosing the right redaction service is crucial to the security and privacy of your business. Automate privacy with Rectify's secure redaction.Starting Price: $49.99 per user per month -
19
Salesforce Privacy Center
Salesforce
Salesforce Privacy Center is a robust data privacy management solution designed to help businesses comply with privacy laws like the GDPR. It allows users to easily de-identify and delete sensitive data, streamline data subject access requests (DSARs), and simplify customer consent management. The platform features tools like the Preference Manager to manage consent and configure no-code templates for customer communication preferences. By ensuring proper data handling and compliance with privacy regulations, Privacy Center helps businesses mitigate risks while preparing data for applications like Agentforce and Customer 360. -
20
Privacy Analytics
Privacy Analytics
Privacy Analytics provides data anonymization services and software for organizations in the consumer and healthcare industries. We enable you to use your sensitive data assets safely and responsibly for innovation that benefits everyone. With Privacy Analytics you can safely de-identify health data to the highest standard, while preserving its utility. Regulatory deadlines are getting more stringent. Timelines to fulfill data requests are getting tighter. Pressure to uphold your company’s reputation has never been more apparent. The climate around data privacy continues to intensify. Everyone from consumers to regulators are holding organizations accountable. With so many stakeholders demanding more transparency, the pressure for drug makers to safely disclose clinical data and documents has never been higher. And as pressure rises, so too does the bar for privacy. You need solutions that both maximize transparency and protect the privacy of trial participants. -
21
LexisNexis Health Equity
LexisNexis
LexisNexis Health Equity and Inclusion Insights is a solution that delivers comprehensive and actionable individual-level data on social drivers of health (SDoH). The insights enable healthcare organizations to advance population health, clinical research, and health equity initiatives. The solution helps identify barriers to care, improve care delivery, and create more equitable healthcare options and more diverse clinical research programs. It provides de-identified datasets that can be combined with other de-identified datasets using LexisNexis Gravitas, a tokenization solution that leverages a referential data layer to match de-identified records from disparate sources with unprecedented precision. The key to achieving these goals and improving health equity is identifying barriers to health and predictors of poor health outcomes in a way that enables targeted action to make a difference, one patient at a time. -
22
IRI Data Protector Suite
IRI, The CoSort Company
The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you. -
23
integrate.ai
integrate.ai
We help developers solve the world’s most important problems by unlocking the value from sensitive data, without increasing risk. That's why we're building tools for privacy-safe machine learning and analytics for the distributed future of data. Data of all types are being generated and stored in the cloud, on prem, and increasingly at the edge. The cost of de-identifying, moving, centrally storing, and managing high volumes of data can be prohibitive. HIPAA, GDPR, PIPEDA, CCPA and other regulations limit the ways data can come together, especially across jurisdictions. With federated learning and analytics, only model parameters leave each private server, so data custodians retain full control of their data. Grow your business with existing customers by building valuable new product features that harness the collective intelligence of your customers' data. -
24
Astracore Biobanking
Astracore
The Astracore Biobanking System can be used for a variety of purposes such as managing biological samples (specimens), research or anywhere a hierarchical transaction based storage management and analysis system is required. The biobank can be any kind of repository or bio-repository that requires storing, tracking and management of samples of any kind, whether low temperature or ambient. Storage medium may be of any type including physical or virtual samples. Participant personal information can be stored as either fully identified, as a pseudonym or de-identified. Access can be restricted to select users via security profiles. The system uses an intuitive, hierarchical and normalised structure for managing storage at multiple levels. The levels are configurable via drag-n-drop. Included is a 2D visualisation tool for viewing details which shows vacant and occupied positions of storage. The actual storage used can be local, remote, physical or virtual. -
25
FedEHR
GNUBILA
Disrupting the traditional data value chain, we provide you with risk-aware solutions to de-identify sensitive data and allow for their further processing. Whether you need it on premise with full control or as an externalized secure service, FedEHR is your GDPR and HIPAA compliant one-stop solution. Our world is changing and so is our data. There is a unprecedented amount of IoT devices flooding the market resulting in large amounts of data are as many signs of our emerging ubiquitous and interconnected society. This is inexorably leading towards the question of our "quantified self ". But what are the benefits and risks associated with sharing? Who has access to data and for what purpose? What is the actual value of data? Who owns it? At the same time of being a fantastic opportunity to learn from ourselves, this wealth of personal and sensitive data can be a challenge for our societies to come up with state-of-the-art governance models. -
26
Anonomatic
Anonomatic
Safely store, anonymize, mask, mine, redact, and share sensitive data with 100% data accuracy and full international data privacy compliance. Reap significant time and cost savings, with no loss of functionality, when you separate PII from identified data. Embed PII Vault to create innovative solutions, reduce time to market, and deliver the most PII secure solutions anywhere. Unlock data to deliver more accurate and targeted messaging. Provide one, simple step to anonymize all data before it reaches your platform. Combine disparate, anonymous data sets at the individual level without ever receiving PII once that data has been anonymized with Poly- Anonymization™. Replace PII with a compliant multi-value, non-identifying key used in anonymous data matching to link data from multiple organizations. -
27
Flatiron Horizon
Flatiron
Flatiron Health's Evidence Solutions offer a flexible approach to generating both prospective and retrospective real-world evidence, empowering life sciences companies to achieve their oncology research goals more efficiently. Central to these solutions is Flatiron Horizon, which integrates a vast repository of over 5 million de-identified patient records and 1.5 billion data points, advanced curation methods, and disease-specific machine-learning models. This platform supports various stages of the biopharma lifecycle, including discovery, clinical study design, regulatory submissions, and post-marketing commitments. Flatiron's services encompass real-world data configurations tailored to specific oncology needs, prospective evidence generation through low-interventional studies, protocol optimization, patient identification, and seamless EHR-to-EDC data transfer via Flatiron Clinical Pipe. -
28
Azure Health Data Services
Microsoft
Azure Health Data Services is a suite of purpose-built technologies for protected health information (PHI) in the cloud. It's built on the global open standards Fast Healthcare Interoperability Resources (FHIR)® and Digital Imaging Communications in Medicine (DICOM). Ensure data privacy within compliance boundaries, de-identify data for secondary use, and generate insights with analytics and AI tools. Azure Health Data Services is the evolved version of Azure API for FHIR and offers additional technology and services. Existing customers can continue using the product without disruption to service or change in pricing structure. Unify healthcare data in the cloud to make PHI easier to exchange across the care continuum. Standardize diverse data streams such as clinical, imaging, device, and unstructured data using FHIR, DICOM, and MedTech services.Starting Price: $0.39 per GB per month -
29
Doculayer
Doculayer
Forget about manual content classification and data entry. Doculayer.ai offers a configurable pipeline with document processing services like OCR, document type classification, topic classification, data extraction and data masking. Doculayer.ai puts business users in the driver's seat by making training/learning easy via an intuitive user interface for labeling of documents and data. With our hybrid data extraction approach machine learning models can be combined with rules, patterns and library scripts to obtain better results with less training data in less time. For the protection of sensitive data within documents, data masking can be anonymized or pseudonymized. Doculayer.ai adds document intelligence to your Content Services Platform, Business Process Management systems, and RPA solutions. Supercharge your existing IT environment for document processing with machine learning, natural language processing, and computer vision technologies. -
30
BIOSPEC
DDOTS
Assign unique identification number to each specimen and capture relevant clinical data. Catalog specimens to participants, protocols, departments, investigators, institutions, disease sites, anatomical locations, etc. Divide samples into new specimens with new unique ID and associated data. Track specimen from collection through freezing/thawing and possible destruction. HIPAA compliant with ability to de-identify data. Manage multiple biospecimen repositories. Collect specimens per protocol calendar timepoints or via single event timepoint. Track/upload consents and other documents. Design freezer/storage container configuration to mimic physical storage. Multiple configurable reports for inventory, QA, consents, manifest creation/tracking, invoice creation/tracking, and more. Easily query specimen repository for specific sample type.Starting Price: $14,500 per year -
31
BizDataX
Ekobit
BizDataX is a data masking that provides test data of production-level quality. It enables compliance with GDPR and other regulations by masking customers' identity while preparing data for testers and developers. By using masked/anonymized data instead of production data, the risk is significantly reduced. Focus on policy management, business requirements, sensitive data governance and other regulations. Track inventory of databases, data sources, tables and want to know where sensitive data is located. Manage large customer databases and exchange data with online partner shops and parcel delivery companies. Management of medical records is heavily regulated and regulatory compliance can be achieved with data anonymization. -
32
Kiprotect
Kiprotect
KIProtect develops software solutions that help you to process sensitive and personal data in a secure, legally compliant and privacy-friendly manner. Data security and data protection are becoming increasingly important. Unfortunately, they are often neglected, because technical data protection is complex and takes time. We want to change that! With our open source solutions, we help companies to apply modern anonymization and pseudonymization techniques to their data and thus protect it in the best possible way during processing. -
33
The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.Starting Price: $230 one-time payment
-
34
Wayfinder
Kythera
Wayfinder is the all-in-one, SaaS big data platform for healthcare and life sciences, unifying data, analytics, and AI workloads into an ecosystem that accelerates the time to insights for the healthcare and life sciences industries. Wayfinder makes it possible to find granular insights from healthcare data faster. Built on the Databricks Lakehouse platform, Wayfinder delivers access to over 45 terabytes of de-identified, remastered claims data and meets the unique data and processing needs of the healthcare and life sciences industries at scale. With Wayfinder, you can analyze higher-quality claims data to identify rare patients, and target providers, build comprehensive patient journeys, and identify market trends, all with granular detail to inform strategies that drive differentiation and growth. Wayfinder is your big data infrastructure, so you can stop preparing and managing your data and start analyzing. -
35
Manetu
Manetu
The Manetu data crypto-vault provides enterprise class personal and sensitive data management services across critical business priorities. A repository where personal and, or sensitive data is ingested, secured and de-identified such that it can be used for analytics, testing, discovery and, other revenue generating capabilities. Data use across organizations compromises security, privacy and, consent. Needs a copy of the data to develop new applications to maintain good client satisfaction. Needs a copy of the data to run new sales plays, grow the business or deliver on goods and services. Needs a copy of the data for analysis to create new, targeted marketing campaigns. Needs a copy of the data to run reports on how the business is doing. Needs a copy of the data to develop new models and algorithms to drive margin expansion. These data usage models propagate risk as more exposure is created throughout an organization. -
36
Subsalt
Subsalt Inc.
Subsalt is the first platform built to enable the use of anonymous data at enterprise scale. Subsalt's Query Engine dynamically optimizes the tradeoffs between data privacy and fidelity to the source data. Queries return fully-synthetic data that preserves row-level granularity and data formats without disruptive data transformations. Subsalt provides compliance guarantees supported by third-party audits that satisfy HIPAA's Expert Determination standard. Subsalt supports multiple deployment models to meet the unique privacy and security requirements of each client. Subsalt is SOC2-Type 2 and HIPAA compliant. The system has been designed to minimize the risk of exposure or breach of real data. Existing data and ML tools integrate directly with Subsalt's Postgres-compatible SQL interface, making adoption a breeze. -
37
AddReality
AddReality
In retail, transportation and outdoors, centrally manage actionable information and ads across any digital device, including audio marketing. Automate content management on digital screens. A platform for quick and easy remote control of a network of digital screens. Clear interface. Support for any hardware. Enable the display of content and ads according to the specified parameters. Get de-identified audience data in real time in physical locations. Maximize the revenue of your digital screen network by connecting to the advertising exchange and minimizing idle time. Our computer vision algorithms are suitable for working in real conditions, locally on the device and even without the Internet. Detection, tracking, recognition and identification. All necessary technical solutions in one product. No special equipment or launch preparation. Just use any USB cameras for work. -
38
Trūata Calibrate
Trūata
Operationalize your data pipelines with privacy-centric data management software. Trūata Calibrate empowers organizations to make data usable while leveraging privacy as a commercial differentiator. Our frictionless, cloud-native software enables businesses to operationalize privacy-compliant data pipelines at speed, so teams can work with data responsibly and confidently. Powered by intelligent automation, Trūata Calibrate facilitates fast and effective risk measurement and mitigation via a centralized dashboard. The platform provides a smart, standardized solution for managing privacy risks and ensures that data can be effectively transformed for safe use right across your business ecosystem. Access dynamic recommendations for data transformation and view privacy-utility impact simulations before performing forensically targeted de-identification to mitigate risks. Transform data to create privacy-enhanced datasets that can be shared or transferred and used responsibly by teams.Starting Price: $5,000 per month -
39
trust-hub
trust-hub
trust-hub is an innovative, hosted platform that enables organizations to capitalize on shifts in the data protection and privacy landscape. The unique framework offers secure storage, processing and rights management for personal data on a case-by-case basis and is designed to support data protection and privacy regulations, including GDPR. Create secure and universally accessible personal data sets in accordance with GDPR. Encrypt and pseudonymize each customer and employee data item uniquely. Store personal data in one of the world’s most secure data storage facilities. Rapidly retrieve personal data as and when required. Increase productivity and efficiency across your organization. Enable accredited individuals and teams to access and share data easily and securely. Provide your Data Protection Officer (DPO) with the tools required to operate effectively. Exploit digital and commercial innovations by facilitating the safe flow of consent-driven customer data. -
40
Enlitic Curie
Enlitic
Enlitic focuses the power of artificial intelligence into data management applications, enabling effective administration, processing, and sharing of patient data throughout the healthcare enterprise. The Enlitic Framework standardizes, protects, integrates, and analyzes medical imaging data to create the foundation of a real-world evidence platform that improves clinical workflows, increases efficiencies, and expands capacity. ENDEX™ standardizes your data. By using computer vision and natural language processing, ENDEX maps DICOM and metadata to consistent and standardized study descriptions enabling consistent hanging protocol displays, accurate data routing, improved billing capabilities and administrative staff can reclaim time from fixing hanging protocols or searching for studies. ENCOG™ is designed to de-identify medical imaging data while retaining clinically relevant information, saving you time and resources.Starting Price: $0.20/study -
41
Privacera
Privacera
At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™. -
42
Verana Health
Verana Health
Verana Health is a real‑world data platform that transforms structured and unstructured electronic health record information into de‑identified, curated, disease‑specific data modules via its clinician‑informed and AI‑enhanced VeraQ population health data engine. Aggregating data from strategic partnerships with leading medical registries (including the American Academies of Ophthalmology, Neurology, and Urological Association), it encompasses over 20,000 clinicians and roughly 90 million patient records, providing near real‑time, high‑quality datasets to power real‑world evidence generation, clinical trial site and subject identification, clinician quality reporting, and medical registry management. Accessible through cloud services such as AWS Data Exchange and Amazon Redshift, the platform offers self‑service API access, an intuitive dashboard, and customizable cohort discovery tools, while advanced AI/ML algorithms, robust data quality assessments. -
43
Data Secure
EPI-USE
Protect your sensitive SAP data. Solve your SAP data security challenges and comply with data privacy legislation such as the EU's. General Data Protection Regulation (GDPR), South Africa's POPI Act and the California Consumer Privacy Act of 2018 (CCPA) with Data Secure™. Data security is critical in today's business environment. Data Secure™, part of EPI-USE Labs' Data Sync Manager™ (DSM) suite, solves your data security challenges. Data Secure is a comprehensive protection solution that comes with pre-defined masking rules. With these rules you can scramble any non-key field in any client-dependent SAP table in a number of different ways (such as mapping table look-up, constant value, clear a field). You can also extend these rules to cover your own particular security needs. Data Secure enables your company to meet all well-known data privacy and protection standards such as the General Data Protection Regulation (GDPR), Sarbanes Oxley and the BDSG (Bundesdatenschutzgesetz). -
44
ConsentGrid
ConsentGrid
Define policies for different data processing and exchange scenarios to classify, mask, filter, or pseudonymize data. Manage privacy settings to honor consumer preferences and data processing/exchange agreements. Integrate granular consent decisions to data flow. Use ConsentGrid™ consumer-facing privacy dashboard to collect user consent and preferences for data processing and sharing. Accept and securely respond to data subject requests (DSRs). Use consent decision service to make contextual consent decisions. Filter, pseudonymize, and track data as it moves between systems for machine learning and ETL pipelines. Apply privacy filters to data shared with third parties. Eliminate ad-hoc privacy controls. Data stays in the network. Process data inside your infrastructure. Organization deploys ConsentGrid schema processor to apply privacy controls. Personal data stays in organization network. -
45
Truveta
Truveta
Truveta is a health data and analytics platform dedicated to saving lives with data. By aggregating de-identified electronic health records from over 30 health systems, Truveta offers researchers access to comprehensive patient data, including clinical notes, images, and genomics. This extensive dataset encompasses more than 120 million patients, providing a representative view of patient care across the United States. Truveta Studio, the platform's integrated analytics solution, empowers researchers to analyze precise populations with powerful tools, including notebooks and dashboards, all within a secure, HIPAA-compliant environment. The platform's data is updated daily, ensuring timely insights into patient care and outcomes. Truveta's commitment to data quality is evident through its use of the Truveta Language Model, a large-language, multi-modal AI model designed to transform EHR data into clean and accurate data points for medical research. -
46
BeeKeeperAI
BeeKeeperAI
BeeKeeperAI™ uses privacy-preserving analytics on multi-institutional sources of protected data in a confidential computing environment including end-to-end encryption, secure computing enclaves, and Intel’s latest SGX enabled processors to comprehensively protect the data and the algorithm IP. The data never leaves the organization’s protected cloud storage, eliminating the loss of control and “resharing” risk. Uses primary data - from the original source - rather than synthetic or de-identified data. The data is always encrypted. Healthcare-specific powerful BeeKeeperAI™ tools and workflows support data set creation, labeling, segmentation, and annotation activities. The BeeKeeperAI™ secure enclaves eliminate the risk of data exfiltration and interrogation of the algorithm IP from insiders and third parties. BeeKeeperAI™ acts as the middleman & matchmaker between data stewards and algorithm developers, reducing time, effort, and costs of data projects by over 50%. -
47
AlarisPro
AlarisPro
AlarisPro is a comprehensive UAS fleet management SaaS platform that provides real-time data and component-level tracking to optimize fleet operations. The UAS community operates a great number of shared technology and components without sharing information about their performance, reliability and incidents. Beyond just an individual software solution, we have built a collaborative system that aggregates & utilizes component, aircraft, and incident data generated from our broad user base, creating a unique safety net for your operations. Reliable early warnings based on statistically relevant crowdsourced de-identified data from multiple users. High-quality collaborative data informing component performance and issues as a basis for predictive and non-scheduled maintenance. Rapid distribution of service bulletins, airworthiness directives and configuration-related issues to the entire user base. -
48
Benerator
Benerator
Describe your data model on an abstract level in XML. Involve your business people as no developer skills are necessary. Use a wide range of function libraries to fake realistic data. Write your own extensions in Javascript or Java. Integrate your data processes into Gitlab CI or Jenkins. Generate, anonymize, and migrate with Benerator’s model-driven data toolkit. Define processes to anonymize or pseudonymize data in plain XML on an abstract level without the need for developer skills. Stay GDPR compliant with your data and protect the privacy of your customers. Mask and obfuscate sensitive data for BI, test, development, or training purposes. Combine data from various sources (subsetting) and keep the data integrity. Migrate and transform your data in multisystem landscapes. Reuse your testing data models to migrate production environments. Keep your data consistent and reliable in a microsystem architecture. -
49
Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
-
50
MediKeeper Wellness Portal
MediKeeper
MediKeeper offers a comprehensive suite of population health management tools intended for employer groups, health plans, brokers, TPA’s, and wellness companies. MediKeeper’s Wellness Portal and Health Risk Assessment tools enable healthcare consumers to make smarter health-related decisions. Founded in 2003, The MediKeeper technology gathers and analyzes disparate health data. By providing de-identified population reporting in a seamlessly integrated portal, MediKeeper’s customers are better able to manage their population’s health and make smarter wellness investments.Starting Price: $1.00/month/user