Data Privacy
3 Отзыва
Privacy leaders simplify and automate their privacy programs with the TrustArc Privacy Management Platform. This single platform experience is delivered through its unique combination of privacy frameworks, insights, intelligence, knowledge and operations. Only TrustArc can deliver the depth of continuous privacy intelligence, coupled with with a…
Узнайте больше об этой компании3 Отзыва
CookieYes is a Cookie consent solution to help you make your website GDPR and CCPA compliant.
3 Отзыва
InCountry provides data residency-as-a-service in more than 90 countries for sensitive and regulated data, ensuring customers comply with local data protection regulations. You can integrate InCountry into your applications through a simple development API, a codeless border proxy solution or via turnkey integrations with leading SaaS platforms like…
Узнайте больше об этой компании3 Отзыва
eXate streamlines, automates and simplifies the processes of storing, interpreting and extracting value from data assets. It democratises data privacy for organisations by providing a simple, embedded platform that automates the technical enforcement of data policies.
3 Отзыва
Most Advanced Platform for Third-Party Risk, Privacy Management, Modern Slavery Act Compliance, Cyber Security Assessments, Operational Due Diligence, and Bank Network Management. Gain Efficiency. Reduce Risk. Scale Cost-Effectively. CENTRL is the first inter-company network designed to help companies manage their partner-client relationships in a…
Узнайте больше об этой компании3 Отзыва
AuraPortal zero-code Digital Business Platform is the fastest tool to transform enterprise operations.
3 Отзыва
An RFID Privacy Impact Assessment helps companies to assess the privacy risks - and identify the measures to be taken to address them - before a new RFID application is introduced onto the market.
3 Отзыва
InnoSec’s enterprise offering is the most robust cyber risk product on the market. We address all aspects of cyber risk management by quantifying cyber risk and automating all cyber security activities. Our STORM product is available on premise or as SaaS.
3 Отзыва
The PIA software aims to help data controllers build and demonstrate compliance to the GDPR.
3 Отзыва
A global privacy compliance suite. GDPR, HIPPA, DPA 2018 and more. Multi Data Controller, mult Data Processor and Sub-Processor. Integrated risk management, integrated document management. Create comprehensive Record of Processing/ Data Inventory. Fully customisable. Clean, simple, effective
3 Отзыва
Cloud application that provide the means to an organisation to become compliant and keep it. By supporting process, document and information flows and maintaining accountability at all data privacy stakeholders, GDPR is handled in a centralised and structured way. Besides all GDPR processes (Record of Processing Activities, DPIA, DSAR, Data Breach and…
Узнайте больше об этой компании3 Отзыва
MexonInControl for Privacy is an online service (Software-as-a-Service) with which every organization can build the registers required by the GDPR. Registers for processing activities, processors, processing agreements, standards, risks, measures and Data Protection Impact Assessments.
3 Отзыва
Nymity multiplies your privacy office resources, transforming the way you manage privacy within your organization.
3 Отзыва
Data anonymization is a type of information sanitization in order to protect privacy. It is the process of either encrypting or removing personally identifiable information from a data set so that the people whom the data describe remain anonymous.
3 Отзыва
Control.My.ID Enterprise Platform is a tool that will keep you compliant and give you the workflow tools you need to complete and keep track of requests.
3 Отзыва
Signatu is a comprehensive Software-as-a-Service (SaaS) platform for managing privacy on your sites and apps.
3 Отзыва
3 Отзыва
3 Отзыва
Consentric allows to manage customer consent and permissions aligned with GDPR, tailored for business and underpinned by a comprehensive audit trail.
3 Отзыва
When a cyber incident occurs, time is of the essence. Combing through millions of documents to find affected PII/PHI requires a new approach: Canopy. Our purpose-built breach response application reduces the time, cost, risk, and effort associated with the defensible discovery of personally identifiable data.