Companies, Start Ups and Projects in the Privacy Space
Report abuse
Use this data
Sign up for free
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
Drag to adjust the number of frozen columns
Name
Website
Topic
Subtopic
Summary
Continent/Region
2B Advice
https://www.2b-advice.com/en/
Identity, Privacy and Security
2B Advice provides privacy compliance and risk management services and software. 2B Advice specializes in European and U.S. privacy compliance and data protection. With 17 years of experience and offices in Bonn, Berlin, Brezno, Munich, Paris, Verona, Vienna and San Diego, 2B Advice offers an experienced team of privacy and legal professionals who work with clients to develop privacy programs tailored to each client needs and budget. The 2B Advice PrIME privacy management software helps more tha
3PHealth
https://www.3phealth.com
Medical
Choice is a unique mobile interface that enables users to choose what data they share and with whom it’s shared with. It is designed to support privacy and commerce while working with business and privacy solutions to enable degrees of data sharing versus an all-or-nothing approach. It enables meaningful engagement through individualized navigation based on users’ data sharing preferences and usage behavior. Choice facilitates trust-based data ecosystem development by providing businesses with c
Accepto
https://www.acceptto.com/
ML
Identity, Privacy and Security
Acceptto is a transformative cybersecurity company driving a paradigm shift in passwordless solutions for enterprises. Our frictionless multi-factor authentication leverages AIML and integrates with existing IT infrastructure to classify, detect, and model behavior. We assign real-time risk scores to continuously validate digital identities prior to, during and post authentication to prevent identity access fraud across the enterprise and their customers. We deliver the smartest, most resilient
Achieved Compliance solutions
https://www.achievedcompliance.com
Identity, Privacy and Security
GDPR Compliance
Achieved Compliance offers privacy compliance solutions designed for anyone. Achieved helps organizations comply with the EU General Data Protection Regulation, the California Consumer Privacy Act and accountability-based laws across the globe. Achieved offers PrivacyMinder, a tool to build data and system inventories, account for processing, sources and other foundational information. The vData Protection Officer service will help organizations comply when an FTE is not yet needed. Achieved’s A
Acuratio
https://www.acuratio.com/
Identity, Privacy and Security
ML
Federated Learning
PSI
Differential Privacy
PPML
SMPC
The most advanced Federated Learning platform.
North America
Europe
ADCB - Org
https://adcg.org/
Identity, Privacy and Security
The Association for Data and Cyber Governance is a membership organization of individuals, companies and other organizations that are interested in building and maintaining their knowledge of data and cyber governance. This includes data protection, data privacy, cybercrime and cybersecurity. These professionals are not usually the technologists they are the executives and employees charged with compliance with the myriad of laws, regulation and standards.
Advanced Metadata
http://metricsinthemist.com/amd_web/index.html
ML
Advanced Metadata is a Data Science Company. We aspire to be data science and technology innovators. We partner with best in class technology companies, academic and research institutions, content subject matter experts and professional consulting organisations to ensure that we provide our customers with holistic solutions, customised and optimised for their unique needs.
Aindo
https://www.aindo.com/
Private Dataset
Identity, Privacy and Security
De-Identification
Synthetic Data
On a mission to make data anonymization technology as accessible as possible, by hiding all the complexity from the end user.
Europe
Aircloak
https://aircloak.com
ML
Identity, Privacy and Security
PPML
De-Identification
and machine learning. By simplifying the GDPR into a series of accessible steps, Data Solver’s software enables greater consistency and visibility of data-driven decision making, resulting in faster and less expensive real-time operational compliance, whilst also protecting the privacy of individuals.
Alation
https://www.alation.com
ML
Identity, Privacy and Security
variety of practitioner tools to support the day-to-day needs of a practice or organization such as our exclusive Practical Guidance collection, topically organized State and International Chart Builders, and In Focus pages providing analysis of privacy and data security issues that are driving change in the market.
Alexio Corporation
https://getalexio.com
Identity, Privacy and Security
Alexio provides an automated multi-layer approach to computer endpoint security virtually eliminating manual processes, labour, and the problems associated with variation of human talent.
alphaa.ai
https://www.alphaa.ai
for our customers - including drafting of risk assessments, policy manuals, conducting training, and a full suite of compliance tools to manage and maintain a program.
Anonos
https://www.anonos.com
ML
Identity, Privacy and Security
Anonos Lawful Insights API removes roadblocks to achieving your business data-use objectives by embedding policy, privacy and security controls into data flows. These are centralised controls over decentralised processing, applied to manage “in-use risk” for data sharing, combining, analytics, AI and ML. They do so by leveraging: Record-level dynamic pseudonymisation that supports relinking to all source data, not just reversal of pseudonyms. Microsegment (mSeg) pseudonyms that support privacy-r
Anonyome Labs
https://anonyome.com
To meet the challenges facing businesses and consumers, Anonyome Labs provides a platform that enables a next generation approach to security and privacy. A cornerstone of this platform includes limited disclosure digital identities, that we call “Sudos”. Using and interacting with them reduces the amount of personally identifiable information (PII) needed to navigate today’s digital world. Both consumers and businesses maintain everyday relationships, communications, commerce, and more without
Apheris AI
https://www.apheris.com/
Mobile
Medical
Differential Privacy
Federated Learning
Cryptography
PSI
Privacy-preserving data access is a fundamental building block to breaking down the biggest issues of our time - including COVID-19 and climate change. At Apheris our mission is to enable enterprises to collaborate and analyse data securely, without compromising privacy.
AppGate
https://www.appgate.com
Serving more than 1,000 organizations across 40 countries, AppGate is helping secure access for people and devices with a set of differentiated cloud- and hybrid-ready security and analytics products and services
Aptible Inc
https://www.aptible.com
We see a future where it's easy to bring a great idea into the world using the internet, while respecting data security and privacy. The next generation of businesses will design security and privacy into their operating processes. If every business is going to be a software business, every business will need to be a security business. We're working to make information security a core competency of every startup. We envision a world in which startups have access to great information security, a
Arcad
https://www.arcadsoftware.com
Identity, Privacy and Security
De-Identification
ARCAD Software is the only vendor to combine application modernization and DevOps in a wholly integrated, in-house developed product range. Whatever the scale of your enterprise or the technology you use, your success depends on delivering software applications to production faster and more reliably. The transformation of your applications and the continuous delivery of updates go hand in hand.
Ardent privacy
https://ardentprivacy.ai
Identity, Privacy and Security
Ardent provides privacy- centric data discovery and data minimization capabilities, such as data identification, mapping, inventory, data localization, secure deletion, and more. Ardent empowers enterprises to efficiently comply with data privacy regulations, like CCPA, GDPR and FISMA, while reducing the enterprise risk. Excess data is a liability for organizations and Ardent minimizes that privacy risk.
ARKHN
https://arkhn.org/en/federated/ , https://arkhn.org/en/datauser
Medical
Federated Learning
We believe it is essential to provide the latest academic research tools in privacy-preserving machine learning to AI industrial production systems. Indeed, data privacy has become an essential prerequisite for many industries ranging from healthcare to finance, and although tools to ensure user confidentiality exist, they remain out of reach for non privacy experts. Our ambition is to provide these tools to the largest number of people through open and community-supported projects. That's why
ARXIV paper - page 17
https://arxiv.org/pdf/1907.09693.pdf
AuraPortal
https://www.auraportal.com
Identity, Privacy and Security
AuraPortal enterprise software is the most complete low-code platform to rapidly build unlimited enterprise solutions and business applications designed to optimize productivity. It combines the sophistication of iBPMS (Intelligent Business Process Management Suite) for process automation with integration, innovation and intuitive design environments for you to easily optimize and transform business operations with end-to-end automation. Turn your ideas into applications with our easy-to-use Dig
Automated Intelligence
https://www.automated-intelligence.com
Identity, Privacy and Security
Automated Intelligence provides software and services that enable enterprises to manage their data throughout its lifecycle. Its analytics tool can analyze and categorize enterprise data to locate potential risk, duplications, and securely prepare it for migration to cloud services. Automated Intelligence can also provide insights that allow companies to identify and mitigate risks to help comply with the EU General Data Protection Regulation. This is done by identifying “personal data” in struc
AvePoint
https://www.avepoint.com/au
Identity, Privacy and Security
De-Identification
AvePoint offers numerous solutions to ensure regulatory compliance. Its data governance and data-centric audit and protection solutions allow companies to maximize compliance efforts by integrating polices to actively enforce data governance, while using tools to minimize privacy and security risks. AvePoint solutions enable organizations to take a risk-based approach to data protection across programs and systems. Its compliance solutions monitor and report on the actions and safeguards impleme
Baycloud
https://baycloud.com
Identity, Privacy and Security
PPML
Baycloud Systems develops scalable cloud based privacy and security enabling systems. Products include the CookieQ e-Privacy and Do Not Track compliance multi-domain, active management and malware blocking service, the CookieQ Audit automated audit scanner and the TrackerGate universal Do-Not-Track plug-in. CookieQ was the first e-Privacy compliance product and from the outset enabled active management of first-party and third-party cookies and other similar content. Our services are widely used
BigID
https://bigid.com
Identity, Privacy and Security
ML
PPML
Get unmatched data intelligence for Privacy, Protection, and Perspective.Discover and manage personal and sensitive data across the entire data ecosystem – and take action for privacy, protection, and perspective.
BitSight
https://www.bitsight.com
ML
Identity, Privacy and Security
BitSight offers a security rating platform designed to generate measurements on
Blockpass + Blockpass identity lab
https://identity-lab.blockpass.org
Identity, Privacy and Security
Cryptography
BIL is a collaboration between Blockpass IDN and Edinburgh Napier University which was announced in April 2018.The initial scope of the partnership is the creation of a pioneering new research lab, while further developing methods to protect consumer identity and the right of citizens to data privacy. As an identity system supporting verification of humans, organizations, objects, and connected devices, Blockpass will enable development of new applications that rely on a trusted connection betwe
Bloomberg law
https://news.bloomberglaw.com/?target=https%3A%2F%2Fwsauth.bna.com%2Fwsauth%2Fblawauth%3Ftarget%3Dhttps%253A%252F%252Fwww.bloomberglaw.com%252Fstart%26v%3D0.960.1
Bloomberg Law’s Privacy & Data Security
BreachRx
https://www.breachrx.com
Identity, Privacy and Security
BreachRx is an incident response platform that utilizes automation to enable organizations to respond to cyber incidents efficiently and in compliance with relevant regulations, policies and contracts.
BSI Cybersecurity and Information Resilience
https://www.bsigroup.com/en-GB/our-services/Cybersecurity-Information-Resilience/Services/
Identity, Privacy and Security
As cyber-crime costs the global economy hundreds of billions of dollars each year, we want to help you counteract the threat. We have invested heavily to expand our global expertise and provide services that enable our clients to better respond to cyber threats and build more resilience around their critical information and IT infrastructure. Our experienced team of consultants can work with you to deliver the appropriate services that meet your business' needs.
Cambridge Network
https://www.cambridgenetwork.co.uk/content/software-systems-engineer-2
ML
PPML
We offer a blazing-fast, cutting-edge network that connects scientists, researchers and academics across Europe and the world Thanks to our terabit network, 50 million researchers, scientists, academics and students can share record volumes of data unconstrained by location, solving some of mankind’s biggest challenges. Work at GÉANT and you’ll be supporting critical research into sustainable energy, deep space, high-energy physics, earth observation, environmental disasters, medicine and more!
Canon USA
https://www.canon.co.uk
ML
Managing information securely is a fundamental aspect of Therefore software. Features include: System permissions that restrict unauthorized access to the repository; fully customizable access permissions for specific content and data; an anti-tamper measures ensure document authenticity; automatic document back-up for disaster recovery; automated data retention policies with workflows; and Audit Trail tracks user and document activity. For secure enterprise communcations, Canon’s image Runner A
CanopyCo LLC
https://www.canopyco.io
ML
Identity, Privacy and Security
Rooted in machine-learning technology that is calibrated to the intricacies of data mining for PII and PHI, Canopy software accelerates the detection, extraction and resolution of non-public and protected-data following a business email compromise. Our purpose-built data breach response application is the #1 choice for incident response teams. Our clients span cyber security firms, law firms, and legal service providers that need to quickly convert PII and PHI fragments within structured and uns
Cape Privacy
https://capeprivacy.com/product
ML
PPML
Our collective technical backgrounds are a mix of cryptography, machine learning, data science and software engineering. We’ve worked at large enterprises like Salesforce, Cisco, IBM, and DataDog, as well as startups like GoInstant, Snips, DigitalOcean, Zenly and OmniSci. Our team is fully-distributed across the United States, Canada and Europe, working productively across 9 time zones. At Cape Privacy our foundational core values are those of respect, collaboration and trust. We are proud of ma
Caps Group
https://www.caps-group.com
ML
Identity, Privacy and Security
Total Compliance Solutions is a fully automated and integrated solution that provides CAPS Group customers with all the operational, management and audit tools required to manage compliance with the EU General Data Protection Regulation, the California Consumer Privacy Act, PIPEDA, CAN-SPAM and CASL. In addition, TCS provides organizations with a GDPR management hub to ensure compliance with all eight individual’s rights as required by GDPR. Global email compliance is achieved in a single deploy
Carnegie Mellon ML dept
https://www.ml.cmu.edu/
ML
PPML
The Machine Learning Department at Carnegie Mellon University was founded in the spring of 2006 as the world’s first machine learning academic department. It evolved from an earlier organization called the Center for Automated Learning and Discovery (CALD), created in 1997. CALD was designed to bring together an interdisciplinary group of researchers with a shared interest in statistics and machine learning.
Caspar
https://caspar.ai
ML
PPML
Caspar.AI is a distributed AI operating system that converts the home into a computing platform. Our technology learns resident preferences and adapts the environment for applications such as fall detection, context-sensitive automation, and remote property management. Easily integrate Caspar.AI to run over your IoT platform.
CENTRL
https://www.oncentrl.com
ML
Identity, Privacy and Security
CENTRL is built by software experts who believe that bringing deep automation and analytics to risk and privacy operations empowers companies to focus on what matters: be the true custodians of their customers’ data
CHINO.IO
https://www.chino.io
ML
Identity, Privacy and Security
Building secure apps does not need to be complex. Our goal is to make products that help you to reach the top without problems. Compliance and security are important aspects in today's online business, especially when health data are the core. At Chino.io we created products to help you to create secure, interoperable, high quality services, and improve healthcare in Europe. Unleash the power of your ideas, we have spent years studying laws and coding.
ciphercloud
https://www.ciphercloud.com
ML
Identity, Privacy and Security
CipherCloud, the leader in cloud data security, enables companies to adopt the cloud while ensuring data protection, compliance, and control. CipherCloud delivers a comprehensive multi-cloud security platform that integrates advanced data protection, adaptive policy controls, monitoring, cloud risk analysis. The largest financial services, insurance, healthcare, telecommunication and government organizations across more than 25 countries have put their trust in CipherCloud. CipherCloud was name
Clarip Inc
https://www.clarip.com
ML
Identity, Privacy and Security
Privacy Governance Platform. Analyze billions of data points. Manage consent and preferences. Automate data mapping. Discover PII across thousands of data sources. Fullfill subject rights requests end-to-end. All on Auto-PILOT!
ClearSwift
https://www.clearswift.com
Identity, Privacy and Security
IT teams need trusted solutions to defend against inbound cyber-attacks and outbound data loss. Clearswift’s suite of data security products provides complete and consistent protection across email, web and endpoints, allowing teams to collaborate effectively and securely, while providing IT with control and visibility over important sensitive data. Data loss prevention (DLP) is a key concern for organizations who need to comply with regulatory requirements such as GDPR or HIPAA. Organizations
Clearwater Compliance
https://clearwatercompliance.com
Medical
Identity, Privacy and Security
Clearwater Compliance offers software designed to help companies create privacy and breach notification compliance programs. The software helps companies navigate through the
ClickDatos
http://www.clickdatos.es
Identity, Privacy and Security
GDPR Compliance
ePrivacy
Legal
Europe
COINSTAC
www.github.com/trendscenter/coinstac
ML
Medical
Open-Source
Differential Privacy
SMPC
Federated Learning
The Collaborative Informatics and Neuroimaging Suite Toolkit for Anonymous Computation (COINSTAC) is software to foster collaborative research, removing large barriers to traditional data-centric collaboration approaches. It enables groups of users to run common analyses on their own machines over their own datasets with ease. The results of these analyses are synchronized to the cloud, and undergo aggregate analyses processes using all contributor data. Decentralized pipelines allow for distrib
North America
Collibra
https://www.collibra.com
Identity, Privacy and Security
We accelerate trusted business outcomes by connecting the right data, insights, and algorithms for all Data Citizens. True Data Intelligence allows organizations to unlock the value of their data and turn it into a strategic, competitive asse
Compliance Log
https://www.compliancelog.dk
Identity, Privacy and Security
GDPR Compliance
Compliancelog offers users the ability to create records of processing and visualized data-mapping along with keeping track of data processors and IT-systems. The system allows users to create systematic reviews on documents, periodic controls and provides the compliance officer with a place to hold GDPR-related documents and procedures. Finally, Compliancelog supports the reporting of data-breaches and the controllers obligations in regards to the data subjects rights by providing a user-frien
Compliance Point
https://www.compliancepoint.com
GDPR Compliance
Identity, Privacy and Security
CompliancePoint’s OnePoint Portal is a real-time, easy-to-use solution that helps organizations maintain visibility, implement monitoring, and simplify critical privacy, security and compliance tasks. OnePoint enables organizations to operationalize risk management programs, capture valuable institutional knowledge, and easily demonstrate compliance with regulations and industry standards such as the GDPR, HIPAA, PCI, SSAE 16, FISMA, NIST, ISO, Cyber Security Framework, and more. OnePoint is a c
Compliance Technology solutions B.V.
https://www.gdpr365.com
Identity, Privacy and Security
GDPR Compliance
GDPR365 is a collaborative online hub that uses workflows and processes to simplify compliance with data protection regulations. The solution offers the following comprehensive suite of tools: HR, marketing, consent and data security compliance checklists; video courses for employee awareness and training; personal data mapping; case management tools for handling subject access requests; data breach incidents reporting; generation of required reports such as records of processing activities; gen
CompLions
https://complions.com
GDPR Compliance
Identity, Privacy and Security
GRCcontrol from CompLions is a GRC management solution that offers tools to help an organization with its risk & compliance based objectives. CompLions specializes in privacy and information security, IT Risk management and internal control. GRCcontrol combines the mapping of rules and regulations over a multitude of standards and laws. GRCcontrol offers GRC management tools, such as task-oriented PDCA cycles, roll based access & span of control, 1st line risk analyses, 2nd line risk operations,
ComplyCloud
https://complycloud.com/en/home-en/
GDPR Compliance
Identity, Privacy and Security
ComplyCloud is developed by Danish lawyers and enables users to create all legal documentation required under the EU General Data Protection Regulation to demonstrate compliance. Documents are created by answering questionnaires, and users are advised by a dynamic “to-do list” that automatically adapts itself to the specific company and follows an annual cycle of controls and assessments to secure ongoing documentation of compliance. All required documents and controls are incorporated and inclu
Consent Eye
https://www.consenteye.com
GDPR Compliance
Identity, Privacy and Security
ConsentEye is a secure and scalable consent management platform that empowers organizations by building trusted and transparent relationships while complying with privacy regulations, including the GDPR, PECR and U.K. DPA. ConsentEye provides a user- friendly dashboard system to check and manage what permissions customers and employees have given for their personal data; a real-time risk register for the data protection officer; and ePrivacy portal to provide a self-service tool for customers an
Consentua
https://consentua.com
GDPR Compliance
Identity, Privacy and Security
Consentua provides a record of consent for processing personal data. It is designed to be as lightweight as possible and interoperable with other personal data systems through adoption of the Kantara receipt standard. In addition to providing easy integration into web services, Consentua also specializes in embedded systems such as motor vehicles, controlling the access to the personal data a modern car collects. Consent can be requested and checked throughout the customer experience, building t
Contact Herald
https://www.contactharald.com/
Medical
Covid
Keep your business going The smart and easy-to-use COVID-19 Bluetooth card and contact tracing platform, built for business, health and education.
Context space solutions ltd
https://www.contextspace.com
GDPR Compliance
Identity, Privacy and Security
ContextSpace provides an open, operational solution to compliance regulations for the EU General Data Protection Regulation and other national privacy laws. ContextSpace contains a data encryption, privacy firewall and data subject rights engine that simplifies and reduces the cost of application remediation and privacy by design. Included in the suite is a Privacy Impact Assessment module that generates lawful, purpose-limitation policies that are enforced by ContextSpace’s privacy firewall. Th
Cookie Information
https://cookieinformation.com
GDPR Compliance
Identity, Privacy and Security
ePrivacy
Cookie Information offer services to ensure compliance with the EU General Data Protection Regulation and ePrivacy across websites and mobile apps. It provides a Privacy Management Platform that includes a Consent Management Platform with website scanning, and privacy widgets such as Consent pop-up’s, Privacy Controls and Cookie Policies. The platform also includes a Compliance Dashboard with an overview of consent rates, data processing to unsafe third countries, data retention and other compli
Cookiebot
https://www.cookiebot.com/en/?gclid=Cj0KCQjwsuP5BRCoARIsAPtX_wGrztDKEaq69lSNGxbA3q_tx86hw-d_K7vJDzn7K7Gl6Sb1f_BqmaYaAtkwEALw_wcB
GDPR Compliance
ePrivacy
Cookiebot is a cloud-based tool that gives full control to website owners, empowering them to build transparency and trust with their users and assists in compliance efforts with the EU General Data Protection Regulation and ePrivacy. Through fully rendered user simulations, Cookiebot automatically identifies and maps out all cookies and other trackers on any website. Based on this information, Cookiebot generates a cookie declaration, as well as a customizable consent banner, which fully suppor
CRM Partners
https://www.crmpartners.com
GDPR Compliance
Identity, Privacy and Security
De-Identification
Our anonymization app offers solutions for several essential privacy requirements, including parts of the EU General Data Protection Regulation. The application allows for a user-friendly way of anonymizing and scrambling personal data in Microsoft Dynamics 365. This application is built on top of Dynamics 365, and provides IT professionals with two main functionalities. First, it allows users to delete personal data on demand or at the end of a data retention period. Second, the application mak
Crownpeak
https://www.crownpeak.com
GDPR Compliance
Identity, Privacy and Security
Crownpeak offers companies a GDPR consent solution designed to give users the ability to opt-in to any services while maintaining a website’s functionality. The solution places banners onto any website page, giving patrons the ability to give their consent when needed. Crownpeak’s solution has templates where companies can place their privacy policy, while letting visitors update their preferences whenever they choose. Internet users can also fill out one of the solution’s personal data request
CSR privacy solutions inc
https://csrps.com
GDPR Compliance
CSR Readiness® Pro is an award-winning bundle of privacy solutions that businesses use to mitigate the risk of data breach and consequences related to non-compliance associated with the handling of legally protected personal information. CSR provides privacy systems specifically designed to address the need-set of the SMB: prioritized remediation and a data breach reporting service that uses both experienced IAPP professionals and expert systems. CSR Readiness delivers a PROACTIVE solution, en
CUBE
https://www.cube.global/privacy-policy/
Identity, Privacy and Security
CUBE is an enterprise regulatory intelligence and change management platform that automates the entire end-to-end compliance lifecycle, cutting costs out of people-centric compliance processes, and ensuring a defensible position with the regulators. Leveraging AI (machine learning and natural language processing) to automatically capture global regulatory data (180 countries, 60 languages), CUBE has created a vast proprietary data lake of regulatory intelligence that is updated continuously. CUB
Cyber Reliant
https://www.cyberreliant.com/
Identity, Privacy and Security
Cryptography
From storied financial institutions and government entities to healthcare providers and large enterprises, Cyber Reliant’s data protection solutions help organizations keep their most important data safe and secure.
Cybernetica
https://cyber.ee
Identity, Privacy and Security
De-Identification
Sharemind is a secure data analysis product designed by Cybernetica. Data owners encrypt their data, upload it into Sharemind. Sharemind processes it without removing the encryption. All intermediate and final results are encrypted as well. No single organisation can decrypt the data or run a query that would breach privacy. Sharemind MPC uses secure multiparty computation based on homomorphic secret sharing and Sharemind HI is based on trusted execution environments, e.g. the Intel(R) SGX instr
CyberSaint security
https://www.cybersaint.io
Identity, Privacy and Security
The CyberStrong platform provides visibility, measurement, and intelligence to cyber program management. The CyberStrong Security Operations, Analytics and Reporting platform uses machine learning and artificial intelligence for intelligent cybersecurity program management tailored to any existing or growing program. The software allows companies of any size to comply to their regulations and standards based on the depth of the NIST Cybersecurity Framework. CyberStrong allows for swift framework
D.Day labs
https://d-day.uy
ML
Founded in 2016, D.Day Labs uses artificial intelligence to automatically manage both structured and unstructured data in various repositories. D.Day Labs’ solution, DataSense is able to classify data, enforce security policy, and actively respond to both internal and external security threats in real time. DataSense provides actionable risk and compliance assessment with automated violation remediation. The solution brings an integrative approach to data management and compliance with a single,
Darktrace
https://customers.darktrace.com/en/email/?utm_source=wired&utm_medium=banners
Identity, Privacy and Security
A new approach to email security uses AI to understand the unique ‘patterns of life’ for every user and correspondent, building an evolving understanding of the human behind email communications. While traditional email controls rely on a pre-defined conception of ‘bad’ in the form of blacklists and signatures, a self-learning approach allows Antigena Email to catch novel attacks which evade other tools.
Data Grail
https://www.datagrail.io
GDPR Compliance
Identity, Privacy and Security
DataGrail is a privacy platform helping companies comply with the EU General Data Protection Regulation, the California Consumer Privacy Act, and Brazil’s LGPD. Using DataGrail, enterprises can perform data discovery and map personal data; operationalize privacy requests; and manage company-wide communication preferences. DataGrail’s 200+ pre-built application connectors and integrations for data lakes provide a no-code onboarding for customers. New systems are automatically detected without man
Data Legal Drive
https://en.datalegaldrive.com
GDPR Compliance
Identity, Privacy and Security
Data Legal Drive is an innovative SaaS platform that allows companies to accelerate their GDPR compliance by digitizing their data governance. The platform offers a large library of legal content and news on personal data protection.
Data Protection People
Identity, Privacy and Security
GDPR Compliance
The DataWise solutions feature a single dashboard that includes templates for data protection compliance, allowing organizations to automate and control many of the tasks to meet the Data Protection Act and General Data Protection Regulation. It includes asset and risk registers, activity reports, training and incident logs and offers task reminders and workflow assignments, document review logs, an agreement repository, and an audit schedule.
Data Solver
https://www.datasolver.com
Identity, Privacy and Security
De-Identification
Data Solver’s privacy management software is designed to enable organisations to demonstrate their ongoing GDPR compliance. It automates the requirements of the GDPR, through case management processing, process re- engineering, risk mapping, data analytics and machine learning. By simplifying the GDPR into a series of accessible steps, Data Solver’s software enables greater consistency and visibility of data-driven decision making, resulting in faster and less expensive real-time operational com
DataFleets
https://www.datafleets.com/
Differential Privacy
Federated Learning
SMPC
DataFleets is an enterprise software platform that enables organizations to run analytics, perform machine learning and build software application on distributed and private data, without the need to aggregate, move or expose it. DataFleets aims to make data sharing, access, and innovation faster and more efficient, while helping manage controls and meet compliance requirements. Project owners and data scientists can perform machine learning and simple queries across siloed datasets without requ
DataGuard
https://www.dataguard.com
Identity, Privacy and Security
GDPR Compliance
DataGuard is a “privacy-as-a- service” solution offering both a comprehensive privacy suite and a team of a privacy professionals, including a DPO, data protection lawyers and IT consultants. The platform uses machine-learning to solve complex privacy issues in a cost-effective and efficient manner. DataGuard supports all phases of privacy management, including industry-specific gap assessments, data subject requests, cross-border data transfers, and third- party risk management. Our platform d
Dataguise
https://www.dataguise.com
Identity, Privacy and Security
GDPR Compliance
De-Identification
Dataguise enables organizations to earn the trust of their customers by protecting privacy as they use personal data to drive business value. Dataguise delivers a data privacy and security platform to enable Personal Data Provisioning as a seamless business process that detects, protects and reports on personal data everywhere. It works in real time across repositories - on premises, in the cloud, in applications and includes structured, unstructured, and semi-structured data types. Dataguise he
Datastreams.io
https://www.datastreams.io
Identity, Privacy and Security
GDPR Compliance
Datastreams’s data driven collaboration solution provides governed access to trusted data sources. Its ‘Data Stream Manager’ offers instant, compliancy-first, data-driven logistics. With the DSM, enterprises can quickly and easily leverage extensive data source and destination connectors to access the right data, in the right place, in the right format, at the right time. For more than 10 years, its data management team has built up its leading edge expertise from hundreds of complex worldwide i
Datatrue
https://datatrue.com
GDPR Compliance
DataTrue is an automated quality assurance platform designed to scan websites to audit tags, datalayer values, data variables and exposed data, monitor sites, critical workflows and email campaigns for unapproved vendors and tags, report exposure to third parties of sensitive data, personally identifiable information, and data subject to privacy regulation, validate data as part of a software release process to identify errors before release and apply regression testing and unit testing methodo
Datawallet
https://www.datawallet.com
GDPR Compliance
Identity, Privacy and Security
Datawallet Consumer First Compliance is a CCPA- and GDPR-focused unified and flexible consent management and data subject request platform. Captured consents and requests are integrated into your current tech stack via out-of-the-box integrations or robust APIs and webhooks. All consumer choices are recorded on an immutable blockchain to provide consumers transparency and regulators an impeccable audit history. Offerings include a simple portal for known customers, a verification flow for non-ac
Datex Inc
https://www.datex.ca/q1-2018
GDPR Compliance
Identity, Privacy and Security
Instead of trying to block unauthorized access at the perimeter of an IT environment, or installing alert and monitor software to notify when unauthorized access has already occurred, DataStealth takes a more proactive approach to addressing data privacy concerns. DataStealth is a plug-n-play data protection solution that combines an organization’s privacy, regulatory, compliance and other standards and requirements, with our suite of tokenization, deidentification and encryption options, to cr
DE-ID Data corp
http://de-id.com
Identity, Privacy and Security
De-Identification
DE-ID Data Corp provides accurate, automated solutions to meet patient privacy standards while achieving a high level of data access and integrity for the development of data repositories, clinical, quality and outcomes research, multi-institution data sharing, and clinical trial recruitment. Our software, DE- ID, integrates easily into data management systems to provide cost-effective and rapid deidentification of patient information in all forms of data, including discharge summaries, patholog
Didomi
https://www.didomi.io/en/
Identity, Privacy and Security
Didomi is a consent management platform helping brands and businesses collect, store and leverage their customer consents. Didomi provides widgets and solutions, such as banners, notices, pop-ups and forms, to collect consents across web, mobile and offline channels. Didomi widgets integrate with clients’ vendors and tag managers to automatically enforce customer consents. With Didomi Preference Center solution, brands give their customers access to a dedicated space where they can access and ma
Digi.me
https://digi.me
Identity, Privacy and Security
Digi.me is a platform allowing individuals to build and store data where they choose in a personal cloud. It facilitates the sharing of medical, financial, fitness, music, and social data from many different sources for sharing with businesses via consent. It is normalized, aggregated, curated using tiles. It provides insights and views of a person’s data at no fee to the individual. Businesses can then request access to data using digi.me’s Consent Access APIs SDK for a fee. Digi.me is a librar
Direct Line to Compliance
https://dl2c.com
Identity, Privacy and Security
GDPR Compliance
ColorCodeIT is cloud-based software that calculates real-time updates on an organization’s regulatory compliance status, mapped to the exact language elements of the compliance standards themselves. AI and natural language processing assist the standards parsing process, generating color- coded templates with core language metrics. During configuration, binary mapping to the organization’s digital evidence is completed. Updated files are imported from web containers to sustain compliance on an o
DLP Assured
http://www.dlp-assured.com
Identity, Privacy and Security
GDPR Compliance
“The Governance, Privacy, Risk and Compliance Hub is an integrated platform that extends control beyond the EU General Data Protection Regulation to help organizations manage risk. Its GDPR capabilities integrate into an organization’s wider compliance obligations, such as ISO 27001 and ISO 9001. The GPRC Hub has data protection processes to manage and promote the practice of good information security and privacy. It assists with GDPR compliance by handling data subject requests, and providing d
DocEx
https://www.docex.com
Identity, Privacy and Security
DocEx allows protection and access-control for sensitive documents in-transit, internally or externally. Companies can maintain full custody, control and track forwards, views, prints, downloads, and all other actions. You can manage consents, authentications, watermarks, bates numbering, and geo-location rules. You can also manage service levels, revoke access manually or automatically, and download full reports for proof-of-compliance. Live policy enforcements, alerts, and dashboards make you
dpify
https://www.dpify.com
GDPR Compliance
Identity, Privacy and Security
Dpify is a simple and user-friendly web-based software tool specifically designed for maintaining such a record in an intuitive and efficient way. It can be used as the record of processing activities of both an individual business or organization, as well as an entire group. You can work together with colleagues from various departments or other group entities anywhere in the world to jointly feed and maintain the record
DPMS
https://www.dpms.eu/en/software-for-dpo-gdpr/
GDPR Compliance
PRIVACIL-DPMS is designed for all organizations and all data privacy professionals, such as data controllers, data protection officers, information systems security managers, project managers and any other authorized persons. PRIVACIL- DPMS provides, in addition to the basic components such as keeping of the data processes register, the publication of the DPO reports (and GDPR documentation), the demands and rights management, such as access, rectification, opposition, portability, limitation an
DPO organizer
https://www.dporganizer.com
Identity, Privacy and Security
GDPR Compliance
DPOrganizer helps organisations turn unstructured privacy work into streamlined processes. Organizations can map, visualise and report all aspects of their personal data processing in a tool designed by privacy professionals. Guided workflows make managing breaches, data subject requests, and extensive processing records easier to document and automatically update. Colleagues can become involved with DPOrganizer’s built-in collaboration features. From custom risk assessments to assigned processi
Draftit AB
https://www.draftitprivacy.com
Identity, Privacy and Security
GDPR Compliance
Draftit AB offers a EU General Data Protection Regulation suite with products and services supporting companies and organizations to incorporate privacy compliance into their operations. Our range of solutions includes products such as Privacy Records, an intuitive web-based solution designed to map and manage records of processing activities and monitor privacy procedures to ensure GDPR compliance. Our Privacy Evaluation tool provides an overview and snapshot of the organizations data privacy c
DSS Consulting Limited
https://dss.hu/en/about-us
Identity, Privacy and Security
GDPR Compliance
GDPRoofed supports the principle of accountability complying with the GDPR and other key principles, enabling the organization to manage all GDPR-related information and activities at a single place, in a single system. Connecting GDPRoofed to IT systems storing personal data, companies can maintain an up-to-date central filing system for all personal data. GDPRoofed provides automation tools for data mapping, managing data transmission by data processor, incident management, data privacy impact
Europe
Echoworx Corporation
https://www.echoworx.com
Identity, Privacy and Security
Cryptography
As a pure-play encryption solutions provider, Echoworx works with finance, government, healthcare, legal, and compliance professionals to tailor secure communication solutions that don’t impede on customer experience. Our encryption experts transform chaos into order for leading multi-national enterprises using our SaaS encryption platform. Clients in 30 countries use the OneWorld encryption platform and more than 5,000 business, public sector, and institutional deployments are serviced through
Ecomply.io
https://ecomply.io
Identity, Privacy and Security
GDPR Compliance
ECOMPLY.io is the most efficient and user- friendly Data-Protection-Management-System. There are three solutions available: SME: Guided path towards GDPR compliance. Features include records of processing activities, data protection impact assessment, vendor management, data processing agreements, data map, logbook for accountability as well as incident tracking and data subject requests. Consultant: The “Supervision” feature makes it possible for external DPOs and lawyers to manage multiple cli
eDatask
https://www.edatask.com
Identity, Privacy and Security
GDPR Compliance
eDatask is an integrated risk management solution. eDatask implements into its software a concept which combines enterprise architecture and a continual improvement process, which includes the best practices of security/ privacy management system frameworks. eDatask helps an organization identify its information assets, evaluate the compliance/security maturity, detect the information security risks and prevent security incidents by implementing control and monitoring systems. With a collaborati
Edgify
https://www.edgify.ai/about-us/
Identity, Privacy and Security
Federated Learning
By training AI models at the edge where the data is generated, one can train on the entire data generated, without compressing, or sampling the data in order to make it easily transferable to the cloud/server, and without the need to anonymise it for privacy reasons. This ability to decentralise the training process, and by doing so, allowing to train on entire datasets, will bring forth a potential new level of accuracy to the world of AI. These new obtainable accuracies can generate both high
Egnyte
https://www.egnyte.com/content-services-platform/plans-pricing?ad=352911038281&target=/corp/registration/secure-online-file-server-2.html&utm_source=google&utm_medium=cpc_emea&utm_campaign=UK+File+Server+2020&gclid=Cj0KCQjwsuP5BRCoARIsAPtX_wEAb0u5iJkyS4qScTmQ32_Cgi2_3geQVNrnAevBGipshRedmWSfsaoaAhqSEALw_wcB
Identity, Privacy and Security
GDPR Compliance
Egnyte has released a platform supporting compliance with the General Data Protection Regulation in all 28 EU member states. The platform allows an organization to identify all the personally identifiable information it holds, whether it’s in the cloud, or on site. The platform makes sure all software, tools, servers, and apps are updated and complaint with the GDPR. Egnyte’s platform allows organizations to categorize all forms of PII in case a data subject makes a right-to-be-forgotten reques
Enactia
https://enactia.com
Identity, Privacy and Security
GDPR Compliance
Enactia Ltd is a collaboration of professionals who specialize in the fields of cybersecurity, privacy, compliance, corporate governance and software cloud applications development. Enactia’s flagship product is a cloud- based application for businesses all around the world. Enactia was created to help to address recent directives and legislation regarding privacy, cybersecurity along with other frameworks from different jurisdictions. By utilizing Enactia Privacy and Cybersecurity compliance su
Engaiz
https://engaiz.com
Identity, Privacy and Security
GDPR Compliance
ENGAIZ provides an AI-Driven SaaS platform to help enterprises mitigate third-party risks such as cybersecurity, data privacy, regulatory, financial and more through an effective governance and engagement framework. The platform helps enterprises identify, assess, control and continuously monitor risks as a result of third-party relationships. Through an automated third-party privacy risk assessment, enterprises will be able to do a quick gap analysis and test the effectiveness of various contro
Ensighten
https://www.googleadservices.com/pagead/aclk?sa=L&ai=DChcSEwj21-vIvaDrAhXVgFAGHQ25AugYABAAGgJkZw&ohost=www.google.com&cid=CAESQOD2taygCr0ZcSaFMsQTb1c9EZ4PuzY5sGKmJvc44GQX_B69s40kdC3FWWZJ8s7OQzOlSjq4xKLJIq1yJq36s4U&sig=AOD64_1_KtMEaCyBSik6OY5iu0CDE-ZfLA&q&adurl&ved=2ahUKEwi7m-PIvaDrAhVpVRUIHfubAJMQ0Qx6BAgcEAE
Identity, Privacy and Security
GDPR Compliance
Ensighten is a comprehensive website security company, offering next generation compliance, enforcement and client- side protection against data loss, ad injection and intrusion. Ensighten’s MarSecTM platform protects some of the largest brands in the world, enabling real-time website compliance in line with the California Consumer Privacy Act, the EU General Data Protection Regulation and other global data privacy regulations, as well as stopping unauthorized leakage or theft of data.
Enterprivacy
https://enterprivacy.com
Identity, Privacy and Security
Enterprivacy’s suite of privacy tools includes the Privacy Risk Calculator to quantify privacy risks to individuals, thePrivacy Design Wizard to help companies walk through and identify strategic controls to mitigate privacy risks and Privacy Sales Tool to help sales teams promote their privacy posture to business clients.
EPI-USE Labs
https://www.epiuselabs.com
Identity, Privacy and Security
GDPR Compliance
Our SAP GDPR Compliance suite has three components. Data Disclose is a reporting tool for highlighting sensitive data across your SAP portfolio - addressing the right of access (GDPR article 15). Data Redact intelligently removes or replaces sensitive data in your SAP systems and beyond - addressing the right to be forgotten (GDPR article 17). Data Retain - Rule framework for periodic redaction of sensitive data - to proactively address the right to be forgotten (GDPR article 17).
Ethos by Sentinel
http://sentinel-rpi.co.uk/ethos/
Identity, Privacy and Security
The Ethos platform allows an organization to identify and manage key legal, contractual, strategic, ethical and customer-centric commitments it has made. A customizable catalog of privacy requirements broken down into assignable operational tasks enables a privacy team to mobilize business units to fulfill requirements and drive alignment with privacy goals. With comprehensive program automation and measurement capabilities, you can drive actions necessary to address regulations, while also unde
Ethyca
https://ethyca.com/?nab=0&utm_referrer=https%3A%2F%2Fwww.google.com
Identity, Privacy and Security
GDPR Compliance
De-Identification
Ethyca offers privacy technology that integrates with an organizations software systems to provide end-to-end compliance with data privacy regulations across sectors and jurisdictions, including the EU General Data Protection Regulation, ePrivacy and the California Consumer Privacy Act. Ethyca’s platform scales for businesses of every size with hosted or on-premise and cloud options and is designed for dev
Eura Nova
https://euranova.eu
Identity, Privacy and Security
digazu, a tech solution developed by EURA NOVA , is software that enables companies to realize the value of their data. digazu collects data from all the data sources of a company and enables the implementation and automation of data science use cases in a compliant manner. digazu provides companies with a map of their data and by keeping data traceable, it allows them to discover where their data resides and for what reason it is being processed. With digazu, companies can track every transform
EuroComply
eurocomply.com
GDPR Compliance
EuroComply’s software is designed to help companies implement and understand the General Data Protection Regulation. The software offers a self-service audit function to guide an organization through a data protection audit of the entire company, assessing its current state of compliance. The answers from the audit will help the software offer suggestions of training to prepare for the GDPR and demonstrate accountability. The software also helps evaluate privacy awareness and training effective
Evernym
https://www.evernym.com/
Identity, Privacy and Security
SSI
When you work with Evernym, you work with the world’s leading expert in decentralized identity. With deep skills in digital identity, cryptography, privacy, security and new governance frameworks, we are the original developers of Hyperledger Indy and the creator of the Sovrin Network and the Sovrin Foundation. We are passionate about open source and open standards, so there’s no vendor lock-in to our solutions. We believe in true data interoperability and delivering the highest levels of secur
Evervault
https://evervault.com
ML
Identity, Privacy and Security
Cryptography
Process sensitive data Encrypt data at source, process it in a Cage — a secure, serverless function — and never store it unencrypted.
Evidon
https://www.evidon.com
GDPR Compliance
Identity, Privacy and Security
Evidon offers a full suite of privacy- consent & monitoring solutions for compliance with the GDPR, ePrivacy Directive, Ad Choices and other programs. Evidon’s Site Notice is a patented desktop, mobile and in-app consent solution that ensures compliance with GDPR, ePrivacy Directive, PIPEDA, CalOPPA and more. Evidon’s Trackermap identifies all website tracking and is a key part of any GDPR-readiness assessment and ePrivacy Directive compliance program. Ad Notice powers compliance with the trans
Exate Technology
https://www.exate.com
Identity, Privacy and Security
De-Identification
eXate provides data access controls to ensure that sensitive attributes, such as names, addresses and passport numbers, are only viewed by the right people, at the right time and in the right geography. The eXate platform delivers trust between organizations and their customers by using technology to uphold their regulatory and internal policies on sensitive data.The eXate solution has been designed for micro data, as well as for global complex organisations with imperfect data. The platform co
Exonar
https://www.exonar.com
Identity, Privacy and Security
Exonar enables organizations to understand what information they’ve got, where it is stored, and how it could be used. Customers in defense and banking use Exonar’s data discovery technology to index data at scale. Using machine learning, millions of documents and Terabytes of files can be crawled, indexed and understood across fileshares, shared drives, mail servers and cloud storage systems, giving a holistic view of both structured and unstructured data. The ability to reveal data and then ta
Expert Tech Source
https://www.klassify.in
Identity, Privacy and Security
Klassify is an enterprise discovery and data classification tool. It scans the complete enterprise and maps out the data to ensure compliance with different laws such as the EU General Data Protection Regulation and HIPAA. Klassify also has the capability perform data classification documents are generated, and has complete drilled down forensic capabilities.
Exterro
https://www.exterro.com
Identity, Privacy and Security
Exterro helps clients with regulatory and legal compliance in the fields of data privacy, data subject requests, data minimization and vendor process risks. Exterro has created a way to develop and maintain a comprehensive data inventory to help companies meet their regulatory requirements and to develop, resolve and maintain their inventory in less than 30 days. Exterro also offers a complete DSR solution that orchestrates the entire process — request reception, verification, workflow, search,
EY
https://www.ey.com/en_gl
Identity, Privacy and Security
EY’s DPO One is an end-to- end data privacy managed service solution. It automates the privacy activities via integrated workflows, processes and databases in a centralized overview, providing an organization control over its processes. This solution supports and keeps track of communications and interactions with stakeholders. EY DPO One enables an organization to understand, monitor and anticipate on privacy risk. EY DPO One provides a complete offering to stay in control of privacy regulation
FairWarning
https://www.fairwarning.com
Identity, Privacy and Security
FairWarning helps our customers manage the full lifecycle of privacy incidents, from prevention to governance, across their applications. FairWarning uses advanced automation, expert managed services and responsible AI to evaluate every event for suspicious behavior such as workflow anomalies, drug diversion, identity theft, snooping and fraud. FairWarning’s security solutions provide data protection and governance for electronic health records, Salesforce, Office 365, and hundreds of other appl
FastWeb
https://www.fastweb.it
Identity, Privacy and Security
GDPR Compliance
Fastweb is offering its Fast GDPR Suite, a platform designed to help companies ensure they are compliant with the EU General Data Protection Regulation. The platform helps an organization assess their systems and procedures, and identifies the areas in need of improvement. The suite offers companies a set of tools to help protect customer information and to protect their systems against cyberattacks. The solution also allows organizations to access their data during instances of disruption throu
FATE
https://fate.fedai.org/community-overview/
Open-Source
Federated Learning
Here is an open, equal, and inclusive federation learning corporative community, where you can connect with other users and contributors, and you can get help and get involved. Read on to learn more.
Feroot Privacy
https://www.feroot.com
Identity, Privacy and Security
Feroot is a privacy operations platform that automates the ongoing maintenance of an organization’s data inventory through a Dynamic Data Registry. The Dynamic Data Registry drives action across multiple jurisdictions and third-party applications, giving an organization full data visibility and control across all on-premise applications and third-party vendors. With Feroot’s privacy platform, users can quickly and easily scale privacy across your entire organization from one central location.
Filerskeepers
https://www.filerskeepers.co
Identity, Privacy and Security
Filerskeepers provides multinationals insight into how long they should store their data based on legal requirements. filerskeepers provides data retention schedules that give insight into the legal maximum and minimum retention periods applicable in the countries relevant to them. This helps companies to justify why they are storing data and for how long. Retention schedules can be ordered one-off or as a subscription. The vendor’s data retention schedules include all relevant country specific
Frama Systems India
https://www.frama.in/about-frama/profile/company-profile/
Identity, Privacy and Security
Frama’s RMail platform allows an organization to track the emails they send to find out when they have been received. All emails sent through the RMail platform are encrypted, with the platform ensuring each message has a proof of encryption upon delivery for compliance purposes. The platform allows users to send a system-generated password for the recipient of the message, or the sender can create a password of their own. The platform offers a receipt record designed to prove when a message has
Galois
https://galois.com/
Identity, Privacy and Security
ML
Cryptography
Galois develops technology to guarantee the trustworthiness of systems where failure is unacceptable. We apply cutting edge computer science and mathematics to advance the state of the art in software and hardware trustworthiness.
Gamma Networks
https://www.gamma.co.uk
Identity, Privacy and Security
Gamma is a data loss prevention platform. Gamma uses artificial intelligence and machine learning to classify an organization’s most sensitive and confidential data in real time and proactively prevents employees from negligently sharing it over incorrect channels. Organizations can use Gamma to mitigate data exposure risks, minimize insider threats and prevent social engineering attacks
GDPR in schools
https://www.gdpr.school
GDPR Compliance
Identity, Privacy and Security
GDPR in Schools provide a web-based platform (GDPRiS) to support schools on their journey to data protection and privacy compliance. GDPRiS equips staff with the knowledge and confidence to handle personal data securely and gives reassurance that they are doing everything they can to help protect the children in their care. Almost 3,000 schools rely on GDPRiS to monitor and manage their data protection compliance. With tools to support self-assessment, RoPA, IAR, subject request management, brea
GDPRsimple
https://www.keepgdprsimple.com
Identity, Privacy and Security
GDPR Compliance
GDPRsimple is a SaaS tool that helps small- to medium-sized businesses and larger enterprises that are resource constrained to implement, and demonstrate their implementation of, the GDPR. GDPRsimple consists of managers that help keep track of actions taken, templates that help implement GDPR requirements and assessments that are completed to determine compliance with GDPR provisions. It also contains resources such as a glossary and cross-references to guidance.
Gensyn
https://www.gensyn.ai/
Identity, Privacy and Security
PPML
Federated Learning
Europe
Global IDs
https://www.globalids.com
ML
Identity, Privacy and Security
Global IDs offers several types of software designed to examine the data within an organization. Global ID allows a company to view their data as business is conducted across the enterprise, while allowing CISOs to monitor all databases for attacks within and outside of their organization. Global IDs Data Profiling software lets large organizations map out of the data within their ecosystem, while its Data Quality software allows a business to measure the worth of the information it possesses. T
Gretel
https://gretel.ai
ML
Private Dataset
Identity, Privacy and Security
Differential Privacy
Synthetic Data
Gretel offers simple APIs to help developers anonymize and share data.
North America
Europe
International
GTB
https://gttb.com
Identity, Privacy and Security
The GTB Data Protection that Works platform offers real-time, accurate data discovery, data mapping & data classification of sensitive data whether it be on servers, workstations, endpoints or the cloud. Completely transparent, policies are accurately enforced in real-time, providing an accurate way to become secure and compliant with government data security regulations related to the GDPR, PII, PCI- DSS, FERC/NERC, ITAR, NY DFS, NIST, SOX, PIPEDA, and many more.
Guild
https://guild.co
Identity, Privacy and Security
Guild is a messaging app designed for professionals and businesses. Privacy features include: Invitations require explicit consent users cannot be added without their permission, only hosts and admins can invite or remove members, hosts and admins can moderate content by deleting anything inappropriate, admins can download group conversation data for compliance and record-keeping purposes, users can always edit or delete their content, access to content can be completely removed and revoked by a
HaloPrivacy
https://www.haloprivacy.com
Identity, Privacy and Security
Halo Privacy runs its solutions through its Halo – Corona privacy appliance, allowing for companies to use its collaboration and messaging applications. Halo offers software to let users bring all of their communications under one roof, providing private, real-time messaging and searchable archives. Halo also lets an organization secure all their information onto the privacy platform, and allows users to securely deliver emails on the platforms they currently use. The company also offers a secur
Hazy
hazy.com
Identity, Privacy and Security
Synthetic Data
Hazy synthetic data generator lets you share the value of your data across your organisation and with strategic partners without any privacy risk. Since it’s highly accurate, completely artificial data, backed by differential privacy, it’s completely safe to share. This unlocks speed to innovation for leveraging external vendors, data monetisation and cross-organisational data portability, while remaining fully compliant.
International
Heliometrics
https://heliometrics.net
Medical
ML
Heliometrics’ solutions include its Healthcare Privacy Analytics, which monitors the access to electronic protected health information within a health care organization to ensure patient data privacy. All findings are displayed as interactive visualizations, allowing organizations to identify any behavior requiring further attention. Heliometrics also helps health care organizations and patients monitor when participants access electronic health records. Heliometrics’ Individual Patient Access R
HerbertSmithFreehills
https://hsfnotes.com/tmt/
Legal
Digital TMT and Sourcing Notes” is Herbert Smith Freehills’ new know-how and news blog where you will find the latest legal developments on digital, technology, media, entertainment, telecommunications, outsourcing, cyber security, and data protection and privacy.
Heureka Software
https://www.heurekasoftware.com
Identity, Privacy and Security
Heureka Software is a technical leader in endpoint searching, identifying and classifying information. Heureka brings order to unstructured data by automating the identification of risk and provides the tools needed to remediate and control private and sensitive data regardless of location or type. Heureka Software’s clients operate in higher education, technology, energy, as well as legal, government and healthcare.Heureka Software is a technical leader in endpoint searching, identifying and cl
Hexatier (acquired by Huawei)
https://www.cyberdb.co/vendor/hexatieracquiredbyhuawei/
Identity, Privacy and Security
De-Identification
HexaTier can discover and classify sensitive data. It will scan according to regulations, and will scan for data on a schedule assigned by the company. The solution offers database activity monitoring, which means it will compile an audit of logins, admin commands, access, queries, and stored procedures. It will send out real-time alerts and compliance reports and offers advanced notice before and after auditing for personally identifiable information. The solution also masks data when it is in
Hotshot technologies
https://www.hotshot.mobi
Identity, Privacy and Security
Hotshot is a high-performance team-messaging that eliminates information handling and compliance concerns for businesses. It helps companies solve the toughest data security problems in a way that positively impacts company culture and productivity. Hotshot’s encrypted messaging system is focused on reducing data handling liabilities for employers through the use of a time- and location-based encryption engine. Hotshot has all of the security benefits of Signal with the collaboration potential o
https://satoricyber.com
https://satoricyber.com
Identity, Privacy and Security
The Satori Cyber Secure Data Access Cloud provides data-flow mapping with transparent, secure and compliant data access across all cloud and hybrid data stores. Its Secure Data Access Cloud seamlessly integrates into any environment to deliver complete data- flow visibility utilizing activity-based discovery and classification. The platform provides context-aware and granular data access along with privacy policies across all enterprise data flows, data access and data stores. With Satori Cyber,
https://www.dataguidance.com
https://www.dataguidance.com
Identity, Privacy and Security
OneTrust DataGuidance is an in-depth and up-to-date privacy and security regulatory research platform powered by more than two decades of global privacy law research. Hundreds of global privacy laws and over ten thousand additional resources are mapped into OneTrust DataGuidance to give customers in-depth research, information, insight and perspectives on the world’s evolving list of global privacy regulations.
https://www.nice.com/engage/contact-center-compliance/compliance-recording/compliance-center/
https://www.nice.com/engage/contact-center-compliance/compliance-recording/compliance-center/
Identity, Privacy and Security
The Compliance Center is an end-to-end compliance solution for contact centers, bringing together the abilities to visualize data, take action on policies, and bridge silos between data systems to efficiently manage interactions and policies. The solution offers a “Compliance Assurance” application displaying multiple dashboards to gauge the adherence to data minimization. The “Policy Manager” application centralizes all retention policies and empowers authorized users to take direct actions on
HyTrust
https://www.hytrust.com
Identity, Privacy and Security
GDPR Compliance
In a multi-cloud world where technology moves at lightning speed and security often plays catchup, organizations face the daunting challenge of eliminating the gaps and resolving the inconsistencies in policy enforcement and adherence to compliance mandates.
IBM corporation
https://www.ibm.com/thought-leadership/smart/uk-en/?p1=Search&p4=43700052448832894&p5=e&cm_mmc=Search_Google-_-1S_1S-_-EP_GB-_-ibm%20co_e&cm_mmca7=71700000064785422&cm_mmca8=kwd-327452978294&cm_mmca9=Cj0KCQjw-O35BRDVARIsAJU5mQUrysluA805deexyVfd-6RnAeTQPqqoBOjCdfgHFvg6Zz7YZMh4b5waAsZGEALw_wcB&cm_mmca10=426614683840&cm_mmca11=e&gclid=Cj0KCQjw-O35BRDVARIsAJU5mQUrysluA805deexyVfd-6RnAeTQPqqoBOjCdfgHFvg6Zz7YZMh4b5waAsZGEALw_wcB&gclsrc=aw.ds
Identity, Privacy and Security
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. Designed to help organizations protect against threats and address compliance, the portfolio includes security and data privacy solutions that are designed to help clients understand their privacy risk landscape, apply controls to help safeguard personal data, and help identify and respond to privacy data breaches.
iCaas
https://myicaas.com
Identity, Privacy and Security
GDPR Compliance
The Data Support Agency’s cloud- based software platform, iCaaS (Compliance as a Service), helps businesses to manage and maintain their compliance with the EU General Data Protection Regulation in one place. The platform will take users through a step-by-step process, highlighting areas that require attention, providing users with all the necessary tools, templates, and processes required, all of which are held securely in a private digital portal.The Data Support Agency’s service includes data
Iconfirm AS
https://thehub.io/startups/iconfirm-as
Identity, Privacy and Security
De-Identification
ICONFIRM is an operational tool that helps companies demonstrate continuous EU General Data Protection Regulation compliance. The technology was originally designed as a collaboration platform between health insurance, clinics and patients. The tool provides consent management, rights management and personal identifier processing, using the APIs to automate data processing with embedded privacy. The Privacy Portal enables you to inform and interact with the data subjects in a timely manner while
ID Experts
https://www.idexpertscorp.com
Identity, Privacy and Security
ID Experts’ SaaS platform is built to protect people from the consequences of data breaches and privacy and identity risks. The platform protects individuals from the latest threats including social media, health care and child identity theft.
Idka
https://www.idka.com
Identity, Privacy and Security
Idka is a modern cloud-based platform for simple communication and collaboration across teams and organizations. With Privacy by Design, Idka offers chat, newsfeed, notes, groups and organizations, and built-in storage — all in one secure and private place. With privacy as its foundation, Idka doesn’t share or sell user data. The user controls the sharing.
IITR Datenschutz GmbH
https://www.iitr.us
Identity, Privacy and Security
The web based Compliance- Kit 2.0 is a certified privacy management system for medium-sized and large companies. It helps organizations to meet the accountability requirements under the EU General Data Protection Regulation. The documentation is based on the ISO high level structure and can be used to prepare for a certification under ISO27701. Embedded checklists help to determine a company’s privacy status. The eLearning system of IITR Datenschutz GmbH can be added in the Compliance-Kit 2.0.
Immuta
https://www.immuta.com
ML
Identity, Privacy and Security
Cryptography
Our founding team spent over a decade working with the U.S. intelligence community, tackling some of the most complex and sensitive data governance problems. In 2015, we founded Immuta to help organizations across a range of industries harness the value of their data, but in a way that preserves data privacy and security. Since then, we’ve raised $30M from investors who believe in our mission: to enable the legal and ethical use of data.
InCountry inc
https://incountry.com
Identity, Privacy and Security
InCountry provides companies access to a data storage platform so they may comply with local data residency requirements of countries they are operating in. The company will soon also enable local processing for jurisdictions that require that certain types of data never leave the country. InCountry focuses on highly regulated data categories such as profile data, health data, payments data, employee data and transactions data. Access to InCountry’s platform is offered via SDK available in sever
Index Engines
https://www.indexengines.com
Identity, Privacy and Security
Index Engines was designed to meet the challenges of today’s data center and deliver a highly scalable and efficient indexing platform across both primary and backup storage data environments. It provides search, reporting, disposition and preservation of unstructured user data in support of stakeholders such as IT, legal and security. Index Engines’ architecture to support petabyte-class data centers with minimal resources or disruption to the environment. Clients, including top financial serv
Indica
https://indica.nl
Identity, Privacy and Security
GDPR Compliance
Indica GDPR Module is a dedicated solution on top of our e-discovery solution tailored to help companies prepare for new regulations. It provides a comprehensive overview of the data and finds out what personal data is stored; where it is stored; and who has access to it. Indica inherits access policies, scans all the data available, correlates structured and unstructured data, recognizes privacy data attributes (CC, telephone, Social Security, IBAN, etc..), shows who has access to the data and
Informatica
https://www.informatica.com/gb/magic-quadrant-MDM.html?formid=8689&programName=20Q1-C-DPDS-ENO-360-CEXP-NP-NI-IF-ANRP-UK2019MDMMQ-0-PT3798-C&gclid=Cj0KCQjw-O35BRDVARIsAJU5mQV8pWpOJt_pwr6x-jO2HVShTqFWyo1BXvDOnJhGFTLORzOx-J3iMmUaAu6gEALw_wcB&gclsrc=aw.ds
ML
Identity, Privacy and Security
De-Identification
Informatica Data Privacy Governance offers metadata-driven artificial intelligence capabilities to accelerate privacy compliance, data protection and transparency through its data management platform. It brings stakeholders, processes and workflow together to define policies. The platform works to discover and classify information, map data subjects with identities, analyze and prioritize risk exposure, orchestrate and monitor data protection activities, respond to access and consent requests,
Information Builders
https://www.ibi.com/en-au/manufacturing-data-analytics-solutions/
ML
The Data Management Platform provides complete administrative control of an organization’s vital data assets. The software can be implemented on sight or in the cloud and enables access to timely, accurate data across all systems, processes and stakeholders. The Omni-Gen provides technology that aligns business users and IT to define and manage their most important data domains.
Information First
https://www.info-first.com
ML
Identity, Privacy and Security
De-Identification
Information First provides information governance, file analytics, data protection services and software solutions for government and regulated industry. Information First has experience with the EU General Data Protection Regulation, HIPAA, Privacy Act, DoD 5015.2, CFR 21 Part 11 and GxP, SOX, SEC and related compliance mandates. Its services include: GDPR and file analytics assessments; legacy data cleanup, ROT analysis and records autoclassification solutions; records management services and
InfoSum
https://www.infosum.com
Identity, Privacy and Security
Federated Learning
InfoSum has released a product called Link, designed to help companies combine large datasets into one pool while ensuring the privacy rights of the data subjects are respected. Link uses decentralized technology to perform its tasks, moving data into a separate location rather than sending it to a third party. All of the data can only be accessed by the organization, with all of the data gathered from the databases placed into the central location. Link will match any of the personal informatio
InnoSec
http://storm.innosec.com
Identity, Privacy and Security
InnoSec offers its own privacy impact and risk assessments to help companies ensure they are compliant with the EU General Data Protection Regulation. InnoSec’s GDPR solutions will help companies with several GDPR-related tasks, including determining how they will comply with each article, figuring out a GDPR budget, assigning tasks to staff and defining the tasks needed to comply with the rules. After the assessments are conducted, reports will be generated for data protection authorities.
Inpher
https://www.inpher.io/#home
ML
Identity, Privacy and Security
Cryptography
Inpher has pioneered cryptographic Secret Computing® that enables advanced analytics and machine learning models while keeping data private, secure, and distributed. At Inpher, we believe that privacy and security are foundational to the future of computing, and have built enterprise products to make this vision a reality. Our world-class cryptographers have won numerous international encrypted data competitions, regulatory techsprints, and Gartner Cool Vendor awards. We are a global company he
Integrate.ai
https://integrate.ai
ML
Integrate.ai helps consumer enterprises get the insights they need to unlock the power of AI with its AI-powered consumer intelligence network. The network looks at deidentified consumer behaviors, not personal data, to deliver predictions about consumer needs. Integrate.ai is working to make responsible AI a reality across consumer enterprise.
Integris Software
https://integris.io
Identity, Privacy and Security
De-Identification
Integris Data Privacy Automation identifies and tags personal data across any system, applies rules and obligations, assesses risk, and takes action. The solution allows users to connect to any data type, at rest or in motion, and use machine learning and natural language processing to create a live map of an organization’s data privacy landscape, continuously monitor sensitive data against the EU General Data Protection Regulation, California Consumer Privacy Act, DSRs, the right-to-be- forgott
IOR atlas
https://ioranalytics.com/ior-products
Identity, Privacy and Security
IOR ATLAS scans for sensitive data usage and/or crowdsources business process context in a way that is sustainable and stays up to date. IOR ATLAS’ operational technology enables automated analysis of data discovery alerts for loss prevention, application owner engagement, delegated administration for stewards, policy violation analysis, content attestation with attribution, and integrated workflow with other technologies.
Iron Mountain
https://www.ironmountain.co.uk/?utm_campaign=%5BG%5D_Iron+Mountain_UK_EN_Branded_Brand_Core_NS_(Exact)&utm_keyword=iron+mountain&utm_medium=paid_search&utm_source=google&infinity=ict2~net~gaw~ar~417966264365~kw~iron%20mountain~mt~e~cmp~%5BG%5D_Iron+Mountain_UK_EN_Branded_Brand_Core_NS_(Exact)~ag~Brand+-+Core+-+Exact&infinity=ict2~net~gaw~ar~417966264365~kw~iron%20mountain~mt~e~cmp~%5BG%5D_Iron+Mountain_UK_EN_Branded_Brand_Core_NS_(Exact)~ag~Brand+-+Core+-+Exact&&infinity=ict2~net~gaw~ar~417966264365~kw~iron%20mountain~mt~e~cmp~%5BG%5D_Iron+Mountain_UK_EN_Branded_Brand_Core_NS_(Exact)~ag~Brand+-+Core+-+Exact&gclid=Cj0KCQjw-O35BRDVARIsAJU5mQWmVp1Uu9VQGg16Oys32jPsb70RWVuAzNV5nwimEDQkAy0s8mNXwuoaAk5sEALw_wcB&gclsrc=aw.ds
Identity, Privacy and Security
Iron Mountain’s Policy Center solution is a cloud-based retention and privacy policy management platform that provides a way for an organization to know its obligations and show compliance. As laws related to retention and privacy change, users receive high quality research from Iron Mountain’s international network of law firms to know how changes impact can organization so it can update its policies accordingly. To show compliance, users have tools to document critical information about busin
ISMS.online
https://www.isms.online
Identity, Privacy and Security
ISMS.online is a cloud-based software solution that helps organisations implement, manage and improve their information security management systems. It includes the frameworks, policies and tools to meet the requirements of ISO 27001, and to prepare for and manage GDPR compliance. Other available frameworks include NIST, NCSC Cloud Security Principles, SSAE 16, Cyber Essentials, PCI:DSS, and more. ISMS. online provides one secure, ISO 27001 accredited, place where teams can manage policies and c
Iubenda
https://www.iubenda.com/en/
Identity, Privacy and Security
Legal
GDPR Compliance
ePrivacy
iubenda offers SaaS solutions to 70,000 customers in more than 100 countries. iubenda has a 360 degrees approach to legal compliance, thus offering a full suite of integrated legal solutions: Privacy and Cookie Policy Generator, Cookie Solution, Consent Solution, Internal Privacy Management and Terms and Conditions Generator. This solution and its components help companies comply with various privacy regulations, including the EU General Data Protection Regulation (GDPR), the California Consumer
iWelcome
https://www.iwelcome.com
Identity, Privacy and Security
iWelcome offers organizations an “Identity & Access Management as-a- Service” platform designed to help with EU General Data Protection Regulation compliance efforts.The platform allows organizations to store consent preferences, while giving data protection officers to the ability to check on consent statuses in real time. Consumers are also given the ability to view, edit, and export their personal data whenever they choose. Users can freeze their accounts and delete their personal data as lon
Janusnet
https://www.janusnet.com
Identity, Privacy and Security
Serving customers globally, Janusnet offers a range of technologies to control unstructured sensitive information including personal data. Janusnet technologies enforce data classification policies, which is particularly important for organizations handling personal data. In addition, Janusnet technologies are designed to interface with DLP software, data governance systems, and other information-security systems to alert and control access to information, control distribution, and avoid acciden
JLINC Labs
https://www.jlinc.com
Identity, Privacy and Security
JLINC Labs offers a GDPR- safe email solution for organizations using MailChimp, or similar mailing systems, and a real-time personal data and consent solution integrated into Salesforce. JLINC is a way for people to manage their own data and permission preferences across all of their organizations. The outsourced user preferences portal and mobile app allows end users to set their own preferences and permissions and apply them each new organization with one click.
Keepabl
https://www.google.com/search?client=safari&rls=en&q=keepabl&ie=UTF-8&oe=UTF-8
Identity, Privacy and Security
GDPR Compliance
Keepabl has developed a solution designed to help organizations comply with the EU General Data Protection Regulation. It allows organizations to produce and update required reports and outputs, as well as provide a Privacy Policy Pack with GDPR policies, procedures and templates. Keepabl benchmarks an organization’s readiness, illuminates risks in their processing and creates reports including Article 30 Records and Activity Analysis, showing answers about their Data Map. Keepabl’s breach modul
Keyed Systems
http://keyedsystems.com
Identity, Privacy and Security
Keyed Systems delivers products, services and executive consulting to assist organizations in assessment of risk, training/education and ongoing privacy program management. Keyed’s Governance utilities include use case modeling, data asset control/ classification, process flow, and new trust framework definitions. In conjunction with its frameworks mapper, organizations can vet practice mechanisms and requirements against known and published guidelines, positioning gaps for internal or third-par
KPMG International
https://home.kpmg/xx/en/home.html
Identity, Privacy and Security
KPMG Privacy Apps can help automate key privacy processes, such as Rights Requests, Records of Processing, Privacy Impact Assessments, Data Breach Management, Vendor Risk Management, and Privacy Helpdesk. The apps leverage innovative robotic process orchestration capabilities to enable sustainable and effective Privacy Risk Management, and are designed to reduce cost, time and effort. These tools aim to provide a clear view of an organization’s privacy compliance with simple-to-use dashboards an
Kroll
https://www.kroll.com/en
Identity, Privacy and Security
GDPR Compliance
Kroll offers several different technology solutions for its users. Kroll offers flexible technology tools to help companies design and set up compliance programs and policies. Kroll’s Third Party Compliance portal is a web-based due diligence, governance and compliance platform allowing companies to manage the risk they take on by assessing the third parties they work with. Kroll also offers a 3rd Party Risk Assessor compliance software solution accomplishing the same goal. Kroll features a web-
Kryptowire
https://www.kryptowire.com
Identity, Privacy and Security
Cryptography
Kryptowire’s services are designed to examine mobile applications. Its analytics services collect, store and continuously monitor mobile app data from marketplaces across all major platforms. Its EMM+S continuously monitors the security of every mobile app on a device against high assurance standards, while enforcing enterprise- wide privacy and security policies. Its software assurance solution performs security analysis on third-party apps from different operating systems to identify apps put
Kybele Joint Stock Company
Identity, Privacy and Security
Kybele is an end-to end-Enterprise Privacy Management GRC Software that lets organizations manage all governance processes by integrating with existing business and IT infrastructure. Kybele provides an approach to gather all different perspectives into a single solution. It will ensure that an organization will start managing risks associated with the EU General Data Protection Regulation from the first day and keep it continuous by integration with existing tools such as service desks, contrac
LCubed AB (iGrant.io)
https://igrant.io
Identity, Privacy and Security
LCubed AB is a SaaS provider that offers data protection services via the brand iGrant.io. iGrant.io is a personal data exchange and consent mediation platform that helps organizations unlock the value of personal data. For consumers, it is a self service privacy tool to manage their personal data in real-time via an app, allowing them to exercise their privacy rights. For businesses it provides a compliance solution with interfaces that can be plugged into existing IT systems. Using iGrant.io,
LeapYear.io
https://leapyear.io
Identity, Privacy and Security
Differential Privacy
LeapYear is the world’s first platform for differentially private reporting, analytics and machine learning. We enable enterprises across highly regulated industries to safely create value from their most sensitive datasets. The platform embeds mathematically proven privacy into every computation, statistic and model enabling analysts and data scientists to generate insights from data without exposing the data itself. Our customers safely leverage and share data across institutional silos, geo
Legal Monster
https://www.legalmonster.com
Identity, Privacy and Security
Legal Monster helps companies by enabling them to collect legally-compliant consent when potential customers sign up for their service or for marketing emails. Legal Monster has built a solution that is inserted into customers’ marketing, signup and checkout forms, which automatically shows a compliant consent-request depending on the end-users jurisdiction and language. By implementing this solution, customers reach a much higher level of compliance while ensuring that they still have the best
Lenos Software
https://lenos.com
Identity, Privacy and Security
De-Identification
Lenos Software’s Strategic Event Management Platform enables management of meetings and events enterprise wide (processes and supply-chain) to achieve strategic goals and data governance, and provide financial transparency and consolidated financial reporting. The GDPR Consent and Data Management Module is integral to the lifecycle of meetings and events as it (a) tracks and retains privacy policies, consents and withdrawals of consent, (b) provides for correction of data, withdrawals and re- af
LiveRamp
https://liveramp.com/our-platform/preference-consent-management/
Identity, Privacy and Security
LiveRamp offers a consent management platform in which users can manage their consent and preferences for advertising and marketing. Companies can offer the Privacy Manager to their visitors to ensure GDPR compliance for digital advertising, reduce data leakage, maintain revenue and to empower their users. The Privacy Manager is in line with the Transparency & Consent Framework provided by IAB Europe and the IAB Tech Lab, but also features custom vendor lists, audit trail and full customization.
LiveRamp Holdings, Inc.
https://liveramp.com
Identity, Privacy and Security
LiveRamp Privacy Manager, an Enterprise Platform for Privacy Preference and Consent Management, enables compliance for opt-outs and consent management for the EU General Data Protection Regulation and the California Consumer Privacy Act. It provides full customizability to clients and allows them to completely white label the platform with pre-defined templates and easy implementation. Via conditional firing capabilities, it gives clients and data subjects and consumers control over all third pa
Madana
https://www.madana.io
Identity, Privacy and Security
De-Identification
Madana’s solution offers a method and a system to protect electronic data from its origins to when it is processed by a third party. The system allows a data analysis buyer to provide funds in exchange for more unique insights without knowing the identity of a data producer. Madana helps an organization all of this is done in compliance with the EU General Data Protection Regulation. This is made possible through the combination of its three main technological components: asymmetrical encryption
MEGA International
https://www.mega.com
Identity, Privacy and Security
MEGA International is a global software firm developing governance, risk and compliance solutions for more than 15 years. HOPEX GDPR provides a collaborative workspace for DPOs and cross-functional stakeholders to manage a GDPR-compliance initiative. Our solution gives you the right tools to understand how your organization complies with the GDPR to implement the needed changes and automatically produce documents required by the regulator. Our methodology has been developed with Gruppo IMPERIALI
Mentis
https://www.mentisinc.com
Identity, Privacy and Security
De-Identification
MENTIS provides a single platform solution that integrates seamlessly throughout the data lifecycle from data discovery to pseudonymization in production and non-production, to continuously monitor and deidentify sensitive data. MENTIS’s data discovery module can find sensitive data by dictionary search, patterns, master data, NLP and code matching. The pseudonymization module leverages the metadata generated by the data discovery module and pseudonymizes data using masking, encryption or tokeni
MetaCompliance
https://www.metacompliance.com
Identity, Privacy and Security
MetaCompliance offers a one- stop-shop Privacy Management solution specifically designed to provide organizations with step-by-step guidance in preparing for, and operating in compliance with, the General Data Protection Regulation The solution resides within the MyCompliance Cloud platform which provides customers with a fully integrated suite of GDPR capabilities which includes processing activity assessments, risk management, task management, policy management, incident management and eLearni
Metomic
https://metomic.io/
Identity, Privacy and Security
GDPR Compliance
De-Identification
Cryptography
Differential Privacy
Metomic enables companies to identify, minimise and control data across its lifecycle to put compliance on autopilot. Currently in beta.
International
Metrisolve
https://www.metrisolve.com
Identity, Privacy and Security
Metrisolve delivers workflow- driven case management solutions to organizations and has developed a specific SaaS solution for organizations to manage their data subject requests. Metrisolve is focusing on the automated compliance of organizations to the regulation’s processes. Our product, JustGDPR is a SaaS solution that delivers automated workflows and processing of EU General Data Protection Regulation-mandated DSRs with regulatory reporting in line with the EU guidelines.
Mexon Technology
MexonInControl for Privacy is made specifically for organizations to adhere to the GDPR. The registers you need to maintain to show compliance with the regulation and the assessments you have to execute to comply (or explain) are provided to you in a multi-language SAAS solution. Highly configurable to fit your organization’s needs, without the need for unnecessary technical skills. Not only does MexonInControl support standard DPIA assessments, you can also create your own or import others to s
Mexon Technology
https://www.mexontechnology.com/home-2/
GDPR Compliance
MexonInControl for Privacy is made specifically for organizations to adhere to the GDPR. The registers you need to maintain to show compliance with the regulation and the assessments you have to execute to comply (or explain) are provided to you in a multi-language SAAS solution. Highly configurable to fit your organization’s needs, without the need for unnecessary technical skills. Not only does MexonInControl support standard DPIA assessments, you can also create your own or import others to s
Micro Focus
https://www.microfocus.com/en-us/home
Identity, Privacy and Security
De-Identification
Secure Content Management suite helps organizations balance the requirements for collaboration and productivity with information security, privacy and compliance across enterprise systems. Authorized access, exposure and ongoing use of content from business applications, including emails and SharePoint/O365, and database applications is managed with reduced risk, complexity and cost. Content is analyzed for sensitivity and risk, classified accordingly with policy applied to govern access and ret
Microsoft Presidio
https://microsoft.github.io/presidio
Open-Source
ML
Identity, Privacy and Security
De-Identification
Presidio helps to ensure sensitive data is properly managed and governed. It provides fast identification and anonymization modules for private entities in text and images such as credit card numbers, names, locations, social security numbers, bitcoin wallets, US phone numbers, financial data and more.
Microsoft SEAL
https://www.microsoft.com/en-us/research/project/microsoft-seal/
Open-Source
Identity, Privacy and Security
HE
Mighty Trust
https://www.themightytrust.com
Identity, Privacy and Security
GDPR Compliance
PRIVACYPLUS is an enterprise product including 17 modules covering all data protection requirements for managing enterprise supply chains. Three dashboards provide insight into projects and high-risk items. The centralized document management function securely stores policies and backup data. The organizational hierarchy function controls user access rights and permissions for the platform. The unique sharing function allows for secure data sharing with counterparties. Step by Step data input pr
Mimecast
https://www.mimecast.com/
Identity, Privacy and Security
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure.
Mine
https://saymine.com
ML
Identity, Privacy and Security
We believe now is the time to drive a major market shift by providing people worldwide with a real choice about who gets to keep their data and how it's used. Welcome to the future of data ownership
Miner Eye
https://minereye.com
Identity, Privacy and Security
MinerEye’s VisionGrid platform is self-learning software that automatically identifies, classifies, and tracks data on premise, remote storages, and in the cloud. It enables scalable, automated analysis and governance of unstructured data across the enterprise. This enables companies to efficiently discover, analyze, and act on data for data privacy and security. Its AI technology identifies similar data between data centers and across the cloud by learning patterns, enabling the user to be aler
MIT Tech Review - ethics 7.17
https://www.technologyreview.com/2020/07/17/1005396/predictive-policing-algorithms-racist-dismantled-machine-learning-bias-criminal-justice/
Ethics
Lack of transparency and biased training data mean these tools are not fit for purpose. If we can’t fix them, we should ditch them.
MLex
https://mlexmarketinsight.com
Identity, Privacy and Security
MLex is a global newswire service reporting on regulatory risk in various sectors across the globe, including data privacy and security. MLex news and analysis covers the whole process, from the germ of a new rule or law, through to its adoption, implementation and enforcement. MLex subscribers can login to search and review news articles, analysis pieces and case files, or sign up for alerts on topics of interest.
Mostly AI
https://mostly.ai/
Identity, Privacy and Security
Synthetic Data
De-Identification
MOSTLY GENERATE is a Synthetic Data Platform that enables you to generate as-good-as-real and highly representative, yet fully anonymous synthetic data. This AI-generated data is impossible to re-identify and exempt from GDPR and other data protection regulations. At the same time, it is unprecedently accurate and thereby eliminates the need to touch actual, sensitive customer data in a multitude of AI and Big Data use cases.
MPC Alliance
www.mpcalliance.org
Identity, Privacy and Security
SMPC
Cryptography
Differential Privacy
The MPC Alliance is an industry association comprised of dozens of companies which develop and/or deploy improved data security and privacy solutions using secure multiparty computation (MPC). Visit www.mpcalliance.org to learn more about MPC, its application is enabling privacy preserving computations and security applications, and the companies developing and deploying MPC in large scale applications.
Africa
Australia/Oceania
North America
South America
Europe
International
Munich Re
https://www.munichre.com/en.html
Identity, Privacy and Security
Munich Re’s Compliance Web is a user- friendly tool based on an intuitive dialogue and workflow system to guide staff with respect to data protection and data security. The tool classifies the data, compares the data processing with the legal requirements, documents the processes and explains step by step what needs to be done. For every step, it automatically generates all legally required documents, including records of processing activities, documentation of the data protection impact assessm
Munvo
https://munvo.com/
Identity, Privacy and Security
GDPR Compliance
CampaignQA automates and simplifies the complexities in dealing with new customer privacy regulations, such as the EU General Data Protection Regulation and Canada’s Anti-Spam Law. CampaignQA creates a global dashboard of quality assurance activities, while maintaining a comprehensive audit trail of past validations and issues. This helps to achieve and document organizational compliance with GDPR’s and CASL’s regulations. CampaignQA even comes standard with some GDPR & CASL rules pre-built and
MyLife Digital
https://mylifedigital.co.uk
Identity, Privacy and Security
GDPR Compliance
Consentric allows organizations to create and manage bespoke consent and preferences at a granular level. Consentric provides a transparent view for internal teams and advanced self-serve features to allow customers to control updates to their consents and preferences. Unique engagement modules allow for progressive consent and preference capture, optimising customer engagement. Consentric is a scalable, cloud based solution, offering SME and Enterprise features along with CRM integrations throu
Mymity (TrustArc)
https://trustarc.com
Identity, Privacy and Security
GDPR Compliance
Nymity provides business-friendly privacy compliance software solutions that minimize time to compliance with the world’s privacy laws, including the California Consumer Privacy Act, the EU General Data Protection Regulation, and Brazil’s LGPD. Nymity solutions reduce complexity and improve responsiveness to the business as they are based on four levels of research maintained by a dedicated research team. Nymity offers privacy compliance software solutions in three categories: Knowledge Solution
Nextlabs Inc
https://www.nextlabs.com
Identity, Privacy and Security
NextLabs provides data-centric security software to protect business-critical data and applications. Its dynamic authorization technology and attribute-based policy platform help enterprises identify, monitor and control access to sensitive data, and help prevent security and regulatory violations—whether on the cloud or on premise. The software audits and automates enforcement of security controls and compliance policies to secure information sharing across the extended enterprise. NextLabs has
Nortal
https://nortal.com
Medical
ML
Nortal offers its DeepScan solution to help companies comply with the EU General Data Protection Regulation. DeepScan analyzes all of the data sources within an enterprise to map out where all of the information is located, including locations such as databases, emails, and scanned documents. After scanning all of the information, DeepScan will classify the information into different categories, determining whether it is personal information or business data. All of the information is placed ont
Nuix
https://www.nuix.com
ML
Nuix is a global enterprise class indexing, classification, and monitoring platform used for data discovery, classification, remediation and protection. Nuix can reach into a wide variety of corporate and social media systems and content repositories, and over 1,200 file types to look for and act upon sensitive and valuable information. Nuix can extract PII, PHI and PCI from photos, image files, audio files and video files. Once identified and remediated, Nuix monitors user activities on endpoi
Oblivious
Oblivious.ai
Identity, Privacy and Security
Cryptography
SMPC
PSI
PPML
Oblivious builds cross-platform SMPC server technologies for efficient and flexible privacy-preserving applications.
Europe
Obsequio Software
http://www.obsequiosoftware.com
Identity, Privacy and Security
Obsequio is a consent management application, designed to support organisations managing customer consent throughout the relationship lifecycle. Obsequio provides comprehensive consent management that includes suppression list management and referencing, consent validation across the data processing chain. For their customers, Obsequio facilitates subject access, data portability and withdrawal requests. Underpinning Obsequio is granular and comprehensive audit that records every human and appli
OccamzRazor, founter MIT top 35 innovators
https://www.occamzrazor.com/work
ML
Medical
Together, with world leading experts from Stanford University, we developed a data labeling system to vastly accelerate  the generation of Natural Language Processing (NLP) specific datasets used to train AI for Parkinson’s specific tasks. Building on this technology, we developed a proprietary platform that utilizes AI to learn from all available data and transforms this into machine-readable graphs; The Human Parkinsome comprises scientific literature, patents, medical trials, electronic medic
Odaseva
https://www.odaseva.com
Identity, Privacy and Security
GDPR Compliance
De-Identification
Odaseva offers its Data Management Cloud platform that allows users to automate its data processes and configure its data management apps. The platform allows organizations to fully automate a range of data procedures. Its data management apps can help with EU General Data Protection Regulation compliance, as well as backup and restore information. Users that have access to Odaseva’s Data Management App builder will have the ability to package their own solutions. Odaseva’s platform gives users
Ohalo
https://www.ohalo.co
Identity, Privacy and Security
Ohalo provides automated software solutions for our clients’ data discovery, mapping and subject access request needs. Ohalo’s Data X-Ray lets users scan their data sources for regulatory-responsive personal data, mapping the results out for the user through an easy-to-use interface at both a high level and a more detailed column-by-column, file-by-file view. Users can then search across those scanned data sources at scale for individual personal data elements in response to data subject request
Omninet Technologies
http://otpl.co.in
Identity, Privacy and Security
OMNIPRIVACY is a cloud-based application to assist data protection officer and privacy professionals. It supports the definition and maintenance of the record of processing activities and processing agreements. For assessment purposes and monitoring of the progress of compliance, a dashboard is available. Processes for privacy requests, data breaches and privacy impact assessments, including risk management and follow-up of related controls, are available within the application. Organizations ca
oneDPO
https://www.onedpo.com
Identity, Privacy and Security
ML
oneDPO’s Purpose Graph carries a unique approach to reducing privacy and compliance risks by enforcing privacy principles when employees use and share data with partners. Instead of tackling symptoms, Purpose Graph employs a deep intelligence examination on data usage and its purpose to identify real privacy risks. Purpose Graph’s technology automates risk assessments and monitors for emerging privacy risks.
OneTrust
https://www.onetrust.com
Identity, Privacy and Security
ML
OneTrust is a privacy, security and trust platform used by more than 5,000 companies, including nearly half of the Fortune 500, to help companies to comply with the California Consumer Privacy Act, the EU General Data Protection Regulation, ISO 27001 and hundreds of the world’s privacy and security laws. Our primary offerings include OneTrust Privacy Management Software, OneTrust PreferenceChoice consent and preference management software, OneTrust Vendorpedia third-party risk management softwar
OpenAI
https://openai.com/
OpenAI is an AI research and deployment company based in San Francisco, California. Our mission is to ensure that artificial general intelligence benefits all of humanity. The OpenAI Charter describes the principles that guide us as we execute on our mission.
OpenMined
https://www.openmined.org/
Open-Source
ML
Mobile
Identity, Privacy and Security
Differential Privacy
SMPC
PPML
HE
DL
Encrypted HW
Cryptography
Federated Learning
SSI
OpenMined is an open-source community whose goal is to make the world more privacy-preserving by lowering the barrier-to-entry to private AI technologies.
International
OptInsight
https://www.opt-insight.com
Identity, Privacy and Security
GDPR Compliance
OptInsight’s consent management solution is omni-channel, enabling organizations to manage consent through web, app, call center and in meetings. OptInsight gives companies full control over: Gaining explicit consent of business relations on personal preferences with the consent functionality; sharing relevant content for gaining and retaining explicit consent on personal preferences with the content functionality; proving the evidence of consent on personal level and the other 5 lawful grounds
Opus
https://opus.com
Identity, Privacy and Security
GDPR Compliance
Opus’s Third Party GDPR Compliance solution allows organizations to identify the third parties they share customer information with, and identifying the proper controls for each relationship based on the shared data and regulatory compliance. The solution helps organizations document the data they hold and where the data comes from. Following the conclusion of a GDPR assessment, the solution will automatically document the effectiveness of the controls, and complete continual compliance reviews.
Osano
https://www.osano.com
Identity, Privacy and Security
De-Identification
Osano is a complete data privacy platform including universal preference/consent management, CCPA do-not-sell, subject rights, a GDPR representative service, and in-depth analysis of 10,000-plus vendor privacy practices, compliance document tracking, and vendor litigation watch.
OWKIN
https://owkin.com
ML
Medical
Federated Learning
We are fully engaged in this new frontier with the goal of improving drug development and patient outcomes. Founded in 2016, Owkin has quickly emerged as a leader in bringing Artificial Intelligence (AI) and Machine Learning (ML) technologies to the healthcare industry. Our solutions improve the traditional medical research paradigm by turning a previously siloed, disjointed system into an innovative and collaborative one that, above all, puts the privacy of patients first.
PactSafe
https://www.pactsafe.com
Identity, Privacy and Security
PactSafe offers users a tool to help organizations monitor signatures for contracts, as well as several other features. The tool allows companies to manage and track all of their privacy policies, online legal terms, and opt-ins and opt-outs. PactSafe has a legal center organizations can use to manage their legal website. The tool gives users the ability to track all activity conducted by both the company’s internal team and by their customers. Companies are also given the ability to determine
Palqee Technologies
https://www.palqee.com/index.html
Identity, Privacy and Security
ML
De-Identification
The Palqee Enterprise Suite enables businesses to navigate safely through global data privacy regulations without the jargon. The platform offers a range of tools to ensure an evergreen data inventory, with automated compliance reports and delegation of tasks with internal communication that streamlines interactions within the organization.
PHEMI Systems
https://www.phemi.com
Identity, Privacy and Security
Medical
ML
PHEMI Systems provides an NSA- grade privacy, security, governance, and data management system for Microsoft Azure. Health care organizations use PHEMI Data Privacy Manager to address their urgent need to secure, govern, curate, and control access to privacy- sensitive information. The software enables data sharing and provides a governance framework to facilitate compliance with privacy regulations.
Pixevety
https://pixevety.com
Identity, Privacy and Security
Pixevety is an online, consent- driven, media management company that champions a privacy-by-design approach in building and running its platform. Each client receives its own gallery to access and facilitate image management and safely share images with its entire community. A unique online consent module is also made available in each gallery to ensure auto consent-checks are applied against each file stored in real-time.
PlanetVerify
https://www.planetverify.com
Identity, Privacy and Security
PlanetVerify is a document collection platform designed to collect customer data by gaining explicit consent to ensure the company is compliant with the General Data Protection Regulation. The platform offers real-time tracking of data requests, and gives organizations a data trail of the ways it manages customer consent. PlanetVerify’s services are fully encrypted, and allows organizations to respond to consumer and employees requests to access, move, or erase their data.
POPIA
https://popia.io/3/index.php
Identity, Privacy and Security
The Personal Information Management System is a secure, roles based system for DPOs. It is used to implement and monitor privacy related practices in accordance with the EU General Data Protection Regulation, ISO 27701 and NIST. Tasks to record information, practices, policies and agreements and to complete documentation, perform assessments and verify processor compliance can be planned, assigned, performed and tracked. Reports and dashboards display risks, controls, compliance, documentation a
Poslovna Inteligencija
http://inteligencija.com
Identity, Privacy and Security
DPM is a state-of-the-art software platform designed to help companies perform efficient management of personal data and processes for the EU General Data Protection Regulation. It is available as a SaaS in EU cloud or on- premise applications. The platform monitors all personal data flows and provides DPOs with necessary tools for monitoring GDPR compliance and collaboration with other stakeholders. Personal data can either be pseudonymized or centrally managed using Informatica MDM platform fo
PossibleNOW
https://www.possiblenow.com
Identity, Privacy and Security
MyPreferences is a data management platform that connects any system or interface used to communicate with customers across the entire company. It collects express consent, cookie consent and preferences that customers share about themselves, stores them securely in a central repository and integrates them with any system the company uses to interact with those customers in the future. MyPreferences enhances customer experience by collecting their communication preferences such as topic of inter
Preclusio
https://preclus.io
Identity, Privacy and Security
Preclusio offers automated, on-premises privacy management software designed to help companies comply with regulations such as the GDPR and CCPA. The software can automate data inventory, classify data through its machine-learning driven process and simplify data subject requests. It never lets personal information leave your system boundary and is designed to grow with your company.
Predesto
Identity, Privacy and Security
GDPR Compliance
Predesto provides software for online employee privacy training, automatic scanning & classification of PII, an open framework to setup and manage deletion workflows for GDPR, and an immutable audit log with reporting for compliance. Our scanner supports all the standard databases/warehouses, and has dozens of pre-built PII classifiers. It is designed to support real-time communication and collaboration between teams across an organization and is available both in the cloud or on-premise.
Pridatex
https://www.pridatex.com/
PPML
Automatically Anonymizing Data for Privacy-Compliant Analytics
Prince Group NL
https://www.princegroup.nl/about/
Identity, Privacy and Security
MyPrivacySolutions is a compliance solution and is deployed as Software-as-a-Service, available through a network of consultancy partners. Our tools create awareness and prioritization by taking snapshots of the organization regarding privacy, data protection and information security. It provides information on gaps and potential actions/ controls and is applicable for small organizations. As for large organizations, our solutions can be used to benchmark between business units and measure their
Privacera
https://privacera.com
Identity, Privacy and Security
Privacera helps enterprises discover, manage, and monitor sensitive information within their systems. It continuously ingests the enriched audit data and evaluates using machine learning and analytical models, which can generate alerts and perform mitigating actions. It can track how users are using sensitive data and correlates use in one dashboard. In addition to discovering and mapping data, it can monitor where data is flowing.
Privacy Analytics
https://privacy-analytics.com
Identity, Privacy and Security
De-Identification
Privacy Analytics helps companies maximize the value of their sensitive healthcare data. By measuring re-identification risk across datasets and disclosure contexts, Privacy Analytics allows organizations to deidentify data in a manner compliant with the EU General Data Protection Regulation, the Health Insurance Portability and Accountability Act, and the California Consumer Privacy Act. In addition to unlocking business value from data, Privacy Analytics’ solutions can be integrated into exis
Privacy Cheq
https://www.privacycheq.com
Identity, Privacy and Security
PrivacyUX for CCPA offers operational handling of the California Consumer Privacy Act’s just-in-time notices, “Do Not Sell” opt-out, parent/child, and DSRs optimized for mobile devices. PrivacyCheq operationally supports all modes of enterprise data ingestion, such as native mobile apps, email, telemarketing, text messaging, internet of things devices and physical locations such as retail stores, hospitality, and public venues where video surveillance and/or recognition are in use. PrivacyUX’s A
Privacy Company
https://www.privacycompany.eu
Identity, Privacy and Security
GDPR Compliance
Privacy Company offers a wide variety of privacy services, including consultancy, training and software. Our privacy management software is called Privacy Nexus. It offers a complete customer journey for the privacy management of your organization in a single, user-friendly software platform. Designed in accordance with the GDPR. With Privacy Nexus you can make a complete data inventory, conduct DPIAs and manage third-party privacy compliance. The dashboard gives an organization a clear overview
Privacy Dynamics
https://www.privacydynamics.io
Identity, Privacy and Security
De-Identification
Privacy Dynamics’ comprehensive discovery and deidentification tools provide customers with a complete view of identifiable and semi-identifiable information in their data warehouse. Our tools allow privacy and compliance owners to enforce rigorous, consistent privacy policy across their organization, preventing the unintentional disclosure of personal information.
Privacy Insights
https://privacyinsights.nl
Identity, Privacy and Security
“Privacy Insights is based in The Netherlands, and we’ve designed an online tool for registering processing activities. The decentralized solution is designed to help organizations comply with Article 30 of the EU General Data Protection Regulation. The tool generates reports and exports, keeps track of data breaches and assists with request from data subjects. The tool also has the options for pre-defined (standard) content, an API to show the processes that apply to a data subject on a website
Privacy Lab
http://www.privacylab.it
Identity, Privacy and Security
Privacylab is a web solution to manage privacy compliance for GDPR and demonstrate accountability. Privacylab uses wizard procedures to save time and avoid errors. It provides the user with: information reports for each category of data subject; consent management, automatically created when provided by law; appointment of processors and other personnel, customized with tasks for each employee; organizational chart of tasks and competences of privacy; appointment of sytem administrator; and reco
Privacy Map
www.privacy-map.com
Identity, Privacy and Security
Privacy Map automates the NIST Privacy Management Framework to make it easy for enterprises and privacy consultancies to create and manage holistic privacy programs.
International
Privacy Tools
https://www.privacytools.io
Identity, Privacy and Security
Cryptography
Privacy Tools has developed a platform for consultancies and other organizations to assist in their compliance with LGPD, the Brazilian Privacy Law, the EU General Data Protection Regulation and the California Consumer Privacy Act. The website scanning delivers technical and management reports to let organizations know what kind of feature need to be improved first. Privacy Tools also offer a Cookie Management platform, hosted in Brazilian territory, to help companies to better control the cooki
Privacy Virtuoso Global
https://www.privacyvirtuoso.com
Identity, Privacy and Security
Privacy Virtuoso Global helps clients design, establish and implement an end-to-end privacy program. PV offers a variety of managed privacy services and an industry-specific PIA tool, which helps to assess an organization’s privacy maturity score and also perform a detailed gap assessment.
PrivacyAnt Ltd
https://privacyant.com/en/
Identity, Privacy and Security
PrivacyAnt Software is a privacy- compliance platform that integrates data mapping and compliance assessments. Employees collaborate across an organization to produce and maintain documentation that is visualized in data-flow maps, and processing activities. The software triggers assessment questions at IT-systems, vendors, processing activities, and other entities based on conditions that can be configured. This enables privacy teams to plan and implement privacy policies across business units.
PrivacyPerfect
https://www.privacyperfect.com/home
Identity, Privacy and Security
PrivacyPerfect offers a SaaS solution to help organizations comply with the EU General Data Protection Regulation. The functionality of the software allows for legal counsels and data protection officers to tackle data protection whilst having their efforts visible and transparent to everyone within the organization. The software allows organizations to manage assessments, processing activities and data breaches, and providing privacy professionals full control and overview of everything that is
PrivacyRaven (Trail of Bits)
https://github.com/trailofbits/PrivacyRaven
ML
Identity, Privacy and Security
Open-Source
Differential Privacy
PPML
DL
Synthetic Data
PrivacyRaven is a privacy testing library for deep learning systems from Trail of Bits. You can use it to determine the susceptibility of a model to different privacy attacks; evaluate privacy preserving machine learning techniques; develop novel privacy metrics and attacks; and repurpose attacks for data provenance and other use cases. PrivacyRaven has been featured at the OpenMined Privacy Conference, Empire Hacking, and Trail of Bits blog.
International
Privally
https://privally.global
Identity, Privacy and Security
Privally develops solutions that support consultancies and other organizations in their compliance with LGPD, the Brazilian Privacy Law, and the EU General Data Protection Regulation. Privally’s first product, the CCM Cookie Consent Manager, deals with the web presence of the company, such managing cookies, tags, inputs and privacy policies. Privally’s other tools are available to coincide with the phases of implementing a Data Protection and Privacy Management System, starting with an Assessmen
Privaon
https://privaon.com
Identity, Privacy and Security
GDPR Compliance
Privaon provides solutions and services in the areas of privacy risk management, privacy awareness, privacy engineering and compliance with the EU General Data Protection Regulation. Privaon’s cloud-based Privacy Assessment Tool allows for scoping of current privacy risk- and compliance levels. Privaon’s e-Learning training provides an interactive way for organizations’ to train their entire staff. The e-Learning solutions include advanced GDPR training, and focused trainings for HR specialists
PriVapp
https://privapp.com
Open-Source
Circle is an encrypted, secure and multi-faceted collaboration tool built for private and highly sensitive business communications. Its system provides a secure, easy-to-use and on-demand platform that installs in minutes, and uses AES encryption with keys stored on the endpoint devices. Data is not stored on intermediary servers and priVapp never has access to customer data. The interface allows real-time commenting and editing on Word documents and launching of shared PowerPoint, Excel and oth
Privitar
https://www.privitar.com
ML
PPML
Federated Learning
Privitar is dedicated to helping organizations realize the promise of their most valuable asset – safe, usable data – to empower them to create better products, services and customer experiences. As part of a modern data architecture, the Privitar Data Privacy Platform protects user data so that enterprises can minimize privacy risk – preserving customers’ hard-won trust and achieving regulatory compliance.
Privsee
https://www.privsee.com
Identity, Privacy and Security
De-Identification
Privsee takes advantage of the EU General Data Protection Regulation and U.S. privacy laws that allow consumers to request their data from companies. Privsee allows anyone to request their personal information and privacy data from every company they’ve ever done business with.
Privus
https://www.privus.global
Identity, Privacy and Security
Encrypted HW
Cryptography
SecurLine is a smartphone application designed to allow you to speak on the phone, exchange messages, have video and conference calls, all completely secure and private. Privus developed SecurLine to be a secure and transparent encryption app for smartphones, offering high quality voice and video calls, conference calls, text and image messaging. We employ the secure AES cypher with robust 256 bit key sizes and the ZRTP protocol, which has been classified internally as “catastrophic” by the NSA,
Proliance GmbH
https://www.datenschutzexperte.de/datenschutz-software/
Identity, Privacy and Security
proliance360 is a comprehensive SaaS solution designed to support SME’s in their efforts to comply with the EU General Data Protection Regulation. Besides standard functionalities, such as GDPR-required documentation, it also automatically identifies compliance gaps by assessing inputs made by the user and directly generating detailed tasks outlining what needs to be done. Basics such as real-time record of processing activities, technical and organisational measures, privacy statements and emp
Proofpoint
https://www.proofpoint.com/uk
Identity, Privacy and Security
Proofpoint offers automated content analysis to help companies discover sensitive information and track data across the network. The analysis helps a company discover where sensitive data is located and the data that is most at risk for exposure. The Data Discover tool also provides organizations with data visualization and heat maps locating where the data is most at risk. Companies can fix compliance breaches in real time and revoke access to any unwanted users. Proofpoint also offers a Threat
Protegrity
https://www.protegrity.com
Identity, Privacy and Security
De-Identification
Protegrity offers an enterprise data security software platform that leverages scalable, data-centric encryption, vaultless tokenization and masking to help businesses secure sensitive information while maintaining data usability. Built for complex, heterogeneous business environments, the Protegrity Data Security Platform provides data security certified across applications, data warehouses, mainframes, big data, and cloud environments. Protegrity helps manage risk, achieve compliance, enable b
Protenus
https://www.protenus.com
Identity, Privacy and Security
Medical
Protenus’ patient monitoring platform consists of two main parts: The first is the analytics and proactive detection piece, which takes big data, machine learning, AI, and combines it with user workflow, HR data, and other elements to create a second-by-second account of all the activity occurring within an electronic health record. The combination can help determine a user’s normal behavior and help detect any abnormalities. The “forensics and investigation” part of the platform lets electronic
Proteus-Cyber Ltd
https://proteuscyber.com
Identity, Privacy and Security
GDPR Compliance
Proteus NextGen Data Privacy software is an enterprise-grade application designed to handle existing and upcoming data privacy regulations across the world. Core functionality includes data mapping with online surveys, building and reporting of the data register. The software also includes breach notification, subject access request management, consent management, risk assessment and project management to help the Data Protection Officer deliver and demonstrate compliance with applicable privacy
PSI
https://github.com/OpenMined/PSI
Open-Source
Private Dataset
SMPC
HE
Cryptography
PSI
PSI is a library for doing Private Set Intersection developed by OpenMined in collaboration with Apheris AI
International
PyVertical
https://github.com/OpenMined/PyVertical
Private Dataset
Open-Source
PSI
PPML
Federated Learning
Cryptography
PyVertical is a library for doing vertically distributed federated learning developed by Apheris AI in collaboration with OpenMined
International
Qixium
https://www.qixium.com
Identity, Privacy and Security
De-Identification
Qixium is Scope4Mation’s next generation platform designed to help organisations protect and manage sensitive data to help support GDPR compliance. Its extended features for the discovery and classification of sensitive data offer an ideal platform to provide the DPO with a comprehensive inventory of the enterprise’s data privacy landscape. Qixium’s data anonymization technology significantly reduces the risk of data being compromised while in non-production environments for activities such as t
Qnister
https://www.qnister.com/en/home/
Identity, Privacy and Security
Qnister GDPR is a platform that guides an organisation into compliance with the EU General Data Protection Regulation and provides storage for all the necessary documentation. By letting the user answer questions about the content of the personal data in process and security measurements, the platform generates a list of specific action steps by locating risk gaps in the process. The platform provides checklists, policy templates, agreements and a knowledge bank to help guide users. In the event
RadarFirst
https://www.radarfirst.com
Identity, Privacy and Security
Radar’s automated incident response management platform profiles and scores privacy and security incidents, providing an objective risk of harm analysis. Organizations receive clear guidance as to regulatory and contractual notification obligations based on U.S. state, federal and global data breach notification regulations, helping to ensure notification deadlines are met. The Radar platform includes real-time reporting, dashboards, and benchmarking metrics, allowing organizations to compare i
Raptor Compliance
https://www.raptorcompliance.com
Identity, Privacy and Security
Raptor Compliance’s solution helps organizations comply with Article 15 of the General Data Protection Regulation. The platform gives companies the ability to answer data requests from stakeholders, while ensuring compliance through audits and management reporting. Raptor’s platform can connect with any digital data source, and has additional modules allowing users to ensure they are compliant with Article 20 of the GDPR.The platform also has an interactive interface allowing management to obser
Replica Analytics
https://www.replica-analytics.com/home
Identity, Privacy and Security
De-Identification
Replica Analytics offers software solutions for the generation of synthetic data and for the privacy assurance of synthetic data. Synthetic data is created from models of real data and retain the statistical properties of the real data with high fidelity, but they do not retain mappings to individual data subjects. This data can be used for secondary analytics with few limitations, such as building and testing artificial intelligence and machine learning models, realistic software testing and op
Resilient (IBM Company)
https://www.ibm.com/uk-en/security/intelligent-orchestration/resilient
Identity, Privacy and Security
The Resilient Incident Response Platform integrates with an organization’s existing security and IT system to make sure alerts are instantly actionable, offers intelligence and the context of an incident, and enables adaptive response to complex threats. Teams can collaborate on their response within the platform. It offers analysis, customizable dashboards, and reporting to ensure senior leadership can access information on an incident at any time. Included in the platform is a privacy module p
Retrospect
https://www.retrospect.com/uk
ePrivacy
Retrospect has released its latest version of its software, assisting companies with their EU General Data Protection Regulation compliance efforts. Retrospect 15.1 allows companies to tackle the “right to be forgotten” provision of the GDPR and allows companies to protect and delete any data they have on their users. The tool uses rule-based filtering to allow companies to remove specific data from any backups they possess.
Rever
https://www.rever.eu
ML
Rever offers several products designed to allow an organization to identify all of the data within the enterprise. Among the products the company offers is the Rever Enterprise Foundation, which creates a data- usage map, and is the place where physicial, logical, and conceptual data models would be stored. The Enterprise Foundation lets a company build a data dictionary, carry out data management products, and ensures an organization is ready for big data applications. Another product, Rever Pr
RISMA systems
https://www.rismasystems.com
Identity, Privacy and Security
GDPR Compliance
RISMAgdpr is a GDPR software platform designed to help organisations comply with data privacy regulations whether you are a small, medium-sized or global. Developed by RISMA and the Danish law firm, Plesner, the software guides you through the jurisdictions and provides a platform with structure, data mapping, tasks and GAP- analysis. It offers dashboards, metrics and reports for companies to track their progress, and management will have a full overview of every process.
RIVN
https://www.rivn.com
Identity, Privacy and Security
ePrivacy
RIVN helps companies meet compliance standards for regulations, like GDPR and CCPA, with respect to consumer deletion functionality. RIVN has developed an API marketplace to deliver automated, real-time deletion requests to downstream vendors. In addition, RIVN offers dynamic reporting for each vendor to allow customers to develop best practices for vendors.
Rocket.chat
https://rocket.chat
ePrivacy
Rocket.Chat is an open-source communications platform with more than 10 million users and 350,000 servers deployed. The platform bridges the silos created by individual communication tools by offering a way to connect them into a single platform. Advanced audit and authentication options are suited for compliance- driven enterprise deployments, whereas confidential conversations can leverage end-to-end encrypted messaging. Rocket.Chat’s public source code has more than a thousand contributors an
s20.ai
https://www.s20.ai
Federated Learning
Every company should be an AI company, ethically and effectively utilizing its AI resources using privacy friendly approaches.
Safeguard Privacy
https://www.safeguardprivacy.com
ePrivacy
SafeGuard Privacy is a privacy compliance assessment platform that offers an accountability, management and governance solution help organizations minimize risk, save money, and demonstrate accountability and compliance with privacy laws worldwide. SafeGuard Privacy’s platform is compatible with existing digital privacy tools and has seven integrated modules: Assessment, Project Management for Remediation, Internal and External Reporting, Customizable Policy Templates, Employee Training, Secure
Safeharbour BV
https://safeharbour.nl/producten/
ePrivacy
SafeHarbour BV’s products allow organizations to scan and monitor their websites for potential trouble spots. Its “BIG” scan allows a business to scan its entire digital environment to monitor for any malicious activity. SafeHarbour offers a dashboard designed to let organizations see where they do not meet the company’s BIG standard. It also provides a number of tools to support the work of data protection officers and chief information security officers.
SAP SE
https://www.sap.com/corporate/en.html
ePrivacy
SAP has released two new solutions designed to help companies comply with privacy regulations, including the EU General Data Protection regulation, the California Consumer Privacy Act and Brazil’s General Data Protection Law. SAP Privacy Governance helps collect and document data inventories, including reviews of process risks and related mitigation. The detection of compliance breaches and data subject rights fulfillment are completely automated. SAP Privacy Management by BigID, a solution exte
SAS global data management
https://www.sas.com/en_gb/home.html?gclid=Cj0KCQjw1qL6BRCmARIsADV9JtYB2iutozd5XdIqP6pSexcabDzLlNogeiDnDG9I15EJou4l-Nrh_T8aAscAEALw_wcB
Identity, Privacy and Security
De-Identification
SAS offers a platform designed to allow organizations to access, identify, govern and protect all of its data to ensure compliance with the General Data Protection Regulation. SAS gives organizations a single interface they can use to access and manage the different types of data within their enterprise. Organizations can identify data sources, evaluate the need for deidentification, and assess the risk of exposing personally identifiable information. SAS allows companies to implement pseudonymi
SecuPi
https://www.secupi.com
Identity, Privacy and Security
ePrivacy
De-Identification
SecuPi applies client consent processing, pseudonymization, real-time monitoring, data access, and cross-border controls on your sensitive and regulated data flows. Our software platform also maps sensitive and regulated data-flows keeping a full audit of all user activity that can be easily assessed by regulators and auditors.
Secure Digital Solutions
https://trustsds.com
ePrivacy
We are Secure Digital Solutions, a Minneapolis-based consultancy focused on providing strategic security and data privacy guidance to organizations across business sectors. With our cloud-based platform, TrustMAPP, our firm uses process maturity as the foundation for an effective program strategy. This approach is quickly becoming the industry standard for measuring and communicating the business value of information security and privacy management.
SecureB2B
https://www.blackstratus.com
Identity, Privacy and Security
SecureB2B’s main service is CYBERShark, a cloud-based security and compliance monitoring platform designed to help organizations avoid suffering data breaches and falling out of compliance with the General Data Protection Regulation. The service collects and analyzes log data generated from an organization’s IT infrastructure. The data is then labeled based on various categories. CYBERShark allows organizations to view specific datasets, and reports on data, incident management, and compliance.
Securiti.ai
https://securiti.ai
Identity, Privacy and Security
ePrivacy
PRIVACI.ai is a PrivacyOps platform that helps automate all major functions needed for privacy compliance in one place. It enables enterprises to give rights to people on their data, be responsible custodians of people’s data, comply with global privacy regulations and bolster their brands. The AI-Powered PrivacyOps platform is a full- stack solution that operationalizes and simplifies privacy compliance using robotic automation and a natural language interface. These include the Personal Data F
Security Scoreboard
https://securityscorecard.com
ePrivacy
The Security Scorecard platform is a risk assessment manager allowing an organization to get risk ratings on all of their vendors. The platform allows the organization to monitor those vendors to see if there are any changes in their risk standing. Companies can sort their vendors by their level of risk and find critical vulnerabilities across their entire portfolio. The platform allows companies to receive a breakdown of the categories where their vendors struggle and has a questionnaire to ens
Segment
https://segment.com/?utm_campaign=branded&utm_source=adwords&utm_medium=paid-search&utm_content=456257062683&utm_term=segment&adgroupid=59120817072&gclid=Cj0KCQjw1qL6BRCmARIsADV9JtZt6dRCXgejrU9xg3lIbSMY_LSdZXx4PI1kK8887zEtYeA3Dd9YlzsaAodGEALw_wcB
Identity, Privacy and Security
Private Dataset
As the single point of collection for first-party customer data, Segment provides companies automated discovery of what personal information they are collecting, where they are collecting it from and where they are sending it. As the data is audited, Segment applies a risk-based classification to help customers asses their privacy risk. This data is then added to the company’s data inventory, which can be used to understand where data is being collected from and where it is being sent. Segment a
Semele
https://semeledata.com
Identity, Privacy and Security
De-Identification
The Semele platform delivers automated solutions for test data subsetting, obfuscation and sensitive data auditing. Semele utilizes built-in and customizable transformations to anonymize production data in a way that cannot be reserved engineered. Data can be deidentified “in- flight” as part of a test data extraction workflow or updated in place. Semele’s obfuscation application maintains referential integrity across databases without storing any PII. Semele’s automated audit application finds
Senetas
https://www.senetas.com/
Covid
HE
From certified high-assurance hardware and virtualised encryption for data networks, to the most secure file-sharing and collaboration application with data sovereignty control; all are based on the same crypto-agile, quantum-ready platform.
Sensor Pro
https://www.sensorpro.net
Identity, Privacy and Security
De-Identification
Sensorpro offers organizations a marketing platform to help comply with the EU General Data Protection Regulation. The platform allows companies to make changes to customer data, while possessing subscriber management tools to help remove dormant or unwanted contacts. Sensorpro’s product allows for survey responses to be anonymized, and reports for organizations to use for proof of opt-ins. Sensorpro also offers a GDPR marketing audit for companies to make sure all of their marketing activities
Senya Ltd
http://www.senya.co.uk
ML
Capiible is an intelligent data discovery and classification template containing base classification structures to identify and understand the personal data store within the organization. The template enables a list of source systems containing structured, semi-structured or un-structured data to be identified; provides an approach to discovering and classifying the source system data elements using a target personal data map; helps organizations quickly understand where personal data resides ac
Senzing Inc
https://senzing.com
ML
Senzing is a real-time entity resolution API for software and data engineers. Senzing software enables organizations of all sizes to gain accurate and valuable insights about who is who, and who is related to whom, in data. The Senzing API allows software and data engineers to quickly and easily integrate entity resolution into their projects, enabling them to deliver better single-subject searches and right to be forgotten requests. Senzing software helps protect data privacy, while providing o
Sepior
www.sepior.com
Identity, Privacy and Security
SMPC
Cryptography
Sepior provides key management and threshold cryptography services, using secure multiparty computation (MPC). We develop and license MPC-based technologies, toolsets, and SDKs to companies seeking to provide more secure, sustainable, and flexible cryptographic services. Our customers use our technology to protect the keys used for securing digital assets and wallets, with multiparty approval schemes which eliminate the existence of a complete private key for the complete lifecycle of the key. O
North America
South America
Europe
International
Sherpa Software
https://sherpasoftware.com
ML
Sherpa’s Altitude platform provides complete visibility into the unstructured data throughout an enterprise’s desktops and laptops, network file shares, SharePoint, PSTs, Google, email, and over 70 types of attachments. Altitude’s customizable workflows can automate policies to move, copy, or delete content as needed to comply with internal/external regulations. Sherpa offers data governance, eDiscovery, and privacy and compliance solutions.
Signatu
https://signatu.com
Identity, Privacy and Security
ePrivacy
Signatu is a SaaS cloud platform that offers software tools for companies to do website scanning, make processing records and request, receive, record and manage users’ consent to use users’ personal data and to use companies’ cookies on users’ devices. Signatu has consent backend for web-scalable traffic, multiple consent vaults per account, backward-compatible API and channel support to send e.g. consent events to other systems using webhook API, Amazon and Microsoft. Signatu’s Data Processing
SixFifty
https://www.sixfifty.com
Identity, Privacy and Security
SixFifty is the software subsidiary of the global technology law firm Wilson Sonsini. Sixfifty’s products enable organizations to comply with CPPA, GDPR and other privacy regulations. Its products are cloud-based and focused on user-simplicity. They include legal document automation, employee training modules, data mapping tools, and data subject request portals with automated and customizable workflows.
SkyHigh
https://www.skyhighnetworks.com
Identity, Privacy and Security
ePrivacy
Skyhigh’s platform allows an organization to enforce policies in both corporate sanctioned and employee introduced cloud services. The platform finds all cloud services in use and assess them a 1-10 score based on enterprise readiness, revealing gaps in cloud policy enforcement. It has real-time coaching and policy enforcement to guide users to corporate- approved services. The platform finds sensitive or regulated data both in motion and at rest, and captures all user activity in the cloud and
Smart Global Privacy
https://www.smartglobalprivacy.com
Identity, Privacy and Security
ePrivacy
Smart Global Privacy helps organizations to comply with existing and new regulations by offering a solution to organize, realize, maintain and demonstrate compliance in real time. SGP helps organizations comply with regulations such as the California Consumer Privacy Act, the EU General Data Protection Regulation, the Turkish Data Protection Law and Brazil’s LGPD by offering e-learning, data mapping, collaborative assessment manager, GDPR PIA, custom dashboards, virtual assistants for DPOs, inci
Smart Privacy
https://www.smartprivacy.co.uk
Identity, Privacy and Security
ePrivacy
Smart Privacy is a software-as-a- service platform which simplifies compliance with data privacy legislation and supports both internal and external data privacy offices. Conduct privacy impact assessments, audits, generate reports and manage risk through one simple user-friendly interface. Maintain a personal data inventory, data subject rights, map data flows, and manage privacy impact assessments and audits in one place. Manage privacy notices, contracts and data processors. Quickly assess a
Smartpipe solutions
https://novatiq.com
Identity, Privacy and Security
De-Identification
Smartpipe works with telcos around the world to help them monetize their customer data across open ecosystems in a safe and compliant way. Initially supporting telco strategies for entering programmatic advertising, the Smartpipe solution is equally fit for the wider market, including IoT, smart cities, and ID verification. Smartpipe’s Header Injection solution is deployed into the secure environments of telcos to appropriately augment or replace persistent unique identifiers with event-level tr
Smartsheet Inc
https://www.smartsheet.com
Identity, Privacy and Security
The Smartsheet Accelerators for the EU General Data Protection Regulation and the California Consumer Privacy Act enable companies to effectively manage, maintain and report on privacy compliance. Each Accelerator includes configurable templates of multi-collaborator sheets, reports, and dashboards, which allow for the management of the following business processes: Privacy Program Management - Coordination of privacy policy, controls and awareness; Data Inventorying - The collection and ongoing
Snowflake
https://www.snowflake.com
Identity, Privacy and Security
Encrypted HW
Snowflake’s mission is to enable every organization to be data-driven. Our cloud-built data platform makes that possible by delivering instant elasticity, secure data sharing and per-second pricing, across multiple clouds. Snowflake combines the power of data warehousing, the flexibility of big data platforms and the elasticity of the cloud at a fraction of the cost of traditional solutions.
Socure
https://www.socure.com
Identity, Privacy and Security
Socure provides digital identity verification for CCPA consumer requests. Its data science solution uses diverse data sources and machine learning predictive analytics to establish unprecedented levels of trust and certainty in identity verification. It’s critical to independently and scientifically verify the entity submitting the CCPA request.
SoftwareAG
https://www.softwareag.com/en_corporate.html
Identity, Privacy and Security
Through Software AG’s business and IT transformation platform, enterprises will have the capabilities needed to manage data privacy, including the ability to achieve data transparency, establish a system for recording processing activities, satisfy the requirements for fulfilling subjects’ rights, and introduce comprehensive data protection management that defines data protection processes. The breadth of Software AG’s product portfolio addresses business process analysis, enterprise architectur
Solidatus
https://www.solidatus.com
ePrivacy
Private Dataset
Solidatus provides a web-based application that rapidly maps, visualises and shares the flow of data (including personal data) through the organisation. The platform allows for delegation of the data models and privacy metadata to key data users to rapidly build a global model including DPIA risk assessments. All changes go through an internal approval process, which incorporates version control to provide comprehensive auditing facilities. The data map can also be shared in a read-only form as
SophiMail
https://www.openhub.net/p/sophimailserver
ePrivacy
SophiMail is a business email, engineered for business continuity and data privacy. SophiMail delivers solutions serving complex challenges, beyond the user experience, such as business continuity, data privacy, firm IT-control, and cost efficiency. SophiMail combines cloud infrastructure and sophisticated engine simplicity. Unique features include daily backup, downloaded server-side on a trusted location you indicate, and a role-based dashboard, for easy management of multiple email domains ac
Sourcepoint Technologies
https://www.sourcepoint.com
Identity, Privacy and Security
GDPR Compliance
Sourcepoint enables compliance with global regulations, including GDPR and CCPA, with opt-in or “do not sell” messages and management tools to control access rights across multiple properties and fulfill data subject requests. Custom flows allow testing of messaging scenarios and compliance strategies. Users can group properties and implement campaigns by language, or at regional, global, property-specific or publisher-family levels of consent. The platform offers A/B testing and a reporting das
Spearline Risk and Compliance
https://beaconai.io
ePrivacy
Spearline Data Protection is a GDPR operational compliance software solution, created in conjunction with data protection and legal experts to ensure the optimum support in your GDPR journey. It is a workflow tool that gives you a central place to record all of your GDPR efforts including your data mapping, privacy-related policies and procedures. Our solution will allow you to identify, investigate and report on any breaches that may occur in your organization. We developed an easy-to-use soft
Spirion
https://www.spirion.com
Identity, Privacy and Security
ePrivacy
Spirion provides data discovery, persistent classification and protection of sensitive data, on-premise and in the cloud. Spirion has helped organizations reduce their sensitive data footprint and proactively minimize the risks, costs and reputational damage of successful cyberattacks and regulatory violations. Spirion provides greater command and control of sensitive data to leading firms across all industries.
Statice
https://www.statice.ai
Identity, Privacy and Security
Synthetic Data
PPML
Statice offers a data anonymization solution. We enable businesses to stay innovative with smart synthetic data. Our solution empowers companies to work with complex data in a privacy-compliant manner. Data-driven innovation of tomorrow starts with protecting data today.
StratoKey
https://www.stratokey.com
Identity, Privacy and Security
Encrypted HW
Cryptography
The StratoKey Cloud Data Protection product is a gateway that layers encryption, monitoring, analytics and defensive capabilities into any cloud or SaaS hosted application. Utilizing StratoKey, organizations take complete control over their data privacy, via on- premise encryption key management, in a non-intrusive manner.
Stratrai Ltd
GDPR Compliance
GDPRProgram delivers a comprehensive solution to build, implement, sustain and demonstrate GDPR compliance. GDPRProgram consists of 15 modules: Polices, Notices, Asset Management, Individual Rights & Consent Management, Supplier & Contract Management, Incident Management, Security & Disaster Recovery, Trainings and Audit Management. Each module includes guidance documentation, error-proof forms, and online workflows for fast track implementation and process automation. Individual notifications,
Structure Systems
Identity, Privacy and Security
De-Identification
Our software package, Data Protection Control, gives organizations automated control and insight into their processing of personal data or personally identifiable information. DPC helps organizations to make their digital administrations and documents in better compliance with the ever-stricter privacy laws, such as the GDPR. Furthermore, DPC supports a better involvement of customers in how their personal data is being processed. DPC uses machine-learning technology to recognize and redact (ano
SuitePrivacy
https://www.suiteprivacy.it
Identity, Privacy and Security
ePrivacy
SuitePrivacy offers its Privacy Evo platform designed to help companies comply with the EU General Data Protection Regulation. Privacy Evo allows companies to define the data roles within an enterprise, manage different types of data, forecast data transfers to other companies in comparison to those within the European Union, record the data processing activities of everyone handling information, and evaluating risk. The solution also allows organizations to conduct data protection impact assess
Surecloud
https://www.surecloud.com
Identity, Privacy and Security
ePrivacy
SureCloud provides cloud- based, integrated risk-management software that is customizable. SureCloud has created a suite of applications for enterprise data privacy programs, from discovery to ongoing data privacy management. Built on a highly configurable platform, SureCloud is simple, intuitive and flexible technology that compliments process within an organization
SyferText
https://github.com/OpenMined/SyferText
ML
SyferText is a library for privacy-preserving Natural Language Processing in Python. It leverages PySyft and PyGrid to perform Federated Learning and Encrypted Computations on text data you cannot 'see'.
Sypher Solutions
https://www.sypher.eu
Identity, Privacy and Security
Sypher Suite is a software platform that helps businesses simplify analysis of EU General Data Prptection Regulation compliance and prevents mistakes. The platform acts as a central repository for all GDPR-related information and tasks, providing versioning, tracing, and logs. Sypher Suite provides record inspections, supports data privacy impact assessments, simplifies data sharing and collaboration across a company and offers real-time notifications for relevant processing changes.
Syrenis Limited
https://www.syrenis.com
GDPR Compliance
Identity, Privacy and Security
Cassie is a privacy and data management platform, enabling organizations to comply with global data privacy regulations including the EU General Data Protection Regulation and the California Consumer Privacy Act. Cassie is multilingual and multibrand, allowing for granular consent management and detailed matching rules to be configured. Cassie has a suite of modules covering management and data collection and redistribution Cassie is structured and non-structured data compatible, and has web fo
Systnaps
https://www.systnaps.com
Identity, Privacy and Security
ePrivacy
De-Identification
Systnaps is a smart data discovery platform and a data catalog solution that allows organizations to quickly and automatically scan databases’ structures and recreate a graphical view of the data model. Based on its own algorithm, Systnaps can also identify and record any change made to the databases’ structure, and thus help organizations discover any personal data that resides inside of a database and makes the monitoring effortless. A built-in graphical modeling system enables organizations t
Sytorus Limited
https://www.sytorus.com
Identity, Privacy and Security
ePrivacy
Sytorus is a market leader in data protection and privacy management software and solutions. We help organisations comply with privacy regulations, including EU General Data Protection Regulation, California Consumer Privacy Act and Health Insurance Portability and Accountability Act, with a combination of technology, expertise and experience. Our PrivacyEngine, a SaaS privacy management platform built by technologists and data protection analysts, provides a complete solution for managing all a
T Closeness
ePrivacy
Identity, Privacy and Security
T Closeness scans your IT systems and third-party vendor accounts to provide a clear view of data across your organization. Using the power of AI and machine learning, we programmatically build the actions required for each system to handle subject data requests and include a ticket tracker to clearly show the status of every request.
Tag Inspector
https://taginspector.com
ePrivacy
Tag Inspector is a tag auditing platform that provides both synthetic scanning (website crawler that simulates user session) and real user monitoring (monitoring of live tag behavior) to address data quality, site performance, and data privacy. With Tag Inspector, review a visual representation of your site’s tag hierarchy to catch double-tagged or unauthorized piggybacking, monitor data collection of all tags, and be notified of any unauthorized tag loading behavior based on rules for allowed a
Tanium
https://www.tanium.com
Identity, Privacy and Security
ePrivacy
Tanium, a provider of IT Operations, Security, and Risk Management solutions, gives large enterprises and government organizations the ability to secure, control, and manage millions of endpoints across the enterprise. Tanium provides real-time asset discovery, data compliance management, and incident response capabilities at any scale. Tanium gives security, risk, compliance, and IT operations teams complete and accurate information on the state of endpoints to more effectively protect against
Tata Consultancy Services Limited
https://www.tcs.com
Identity, Privacy and Security
De-Identification
TCS MasterCraft’s DataPlus is an integrated data management software providing data privacy, test data management and data quality management capabilities to help organizations build trust on data. In the area of data privacy, DataPlus provides technologies such as static data masking, dynamic data masking, data pseudonymization, data redaction, quasi-identifier recommendation, synthetic data generation and voluminous data generation. DataPlus enables enterprise-wide data masking in a repeatable
TCRsquare BVBA
https://www.tcrsquare.com
Identity, Privacy and Security
ePrivacy
TCRsquare BVBA offers its GDPRsquare solution, which is designed to help DPOs and GDPR consultants by making their GDPR-administration more cost-effective and their GDPR-processes more efficient. GDPRsquare has an encrypted database and also facilitates operations within the area of contract management, data processing agreements, risk management, advice management, disposal management, project portfolio management, communication with vendors and data protection authorities, document management
Tealium
https://tealium.com
Identity, Privacy and Security
Tealium offers several products designed to help organizations map out all of the data they possess. Products such as TealiumiQ, EventStream, and AudienceStream gives companies the ability to define audience- level data and place it in a central hub. Telium’s DataAccess delivers the information to a company’s data team in real time, giving them the opportunity to take the results and communicate them to marketing and customer service teams. Tealium’s services also help an organization comply wit
Tencent Shield Sandbox
Federated Learning
TenSEAL (An OpenMined open-source project)
https://github.com/OpenMined/TenSEAL
ML
Identity, Privacy and Security
HE
TenSEAL is a library for doing homomorphic encryption operations on tensors, can be used as a backend for secure machine learning evaluation or training.
Termageddon
https://termageddon.com
ePrivacy
Termageddon generates privacy policies, terms of service, disclaimers and end user license agreements by asking questions and generating the policy. Termageddon also updates its clients’ policies automatically whenever laws change to ensure consistent compliance and protection. The software offers compliance with the EU General Data Protection Regulation, California Consumer Privacy Act, California Online Privacy Protection Act, Nevada privacy law, Nevada’s Senate Bill 220 on internet privacy.
TerraTrue
https://terratruehq.com
Identity, Privacy and Security
ePrivacy
TerraTrue is a SaaS platform that provides companies with an infinitely scalable privacy-by-design program. TerraTrue automates privacy workflows, seamlessly integrates privacy and security into the product-development process and empowers teams to visualize the life cycle of the data they process. TerraTrue’s tools use dynamic workflows and smart recommendations to make compliance with the EU General Data Protection Regulation and the California Consumer Privacy Act fast, simple and scalable. T
The Media Trust
https://mediatrust.com
Identity, Privacy and Security
GDPR Compliance
The Media Trust’s GDPR Compliance solution continuously monitors digital assets for unauthorized tracking of consumer data and company-specific privacy and data collection policies. The Media Trust provides real-time insight into user identification and tracking behavior executing through website and mobile app environments. With 12+ years experience in monitoring the digital ecosystem, our unique capabilities facilitate holistic digital risk management for websites to enable companies to demons
The Mindful AI Lab
https://mindfulailab.com
Ethics
ml
De-Identification
EMLaaS
PPML
The Mindful AI Lab is a technical consultancy that leverages deep expertise in AI ethics with substantial experience in prototyping and scaling real world machine learning systems to bridge the gap between ethical AI principles and practice. We offer customized AI ethics advisory services, audit AI systems and data practices, and co-create responsible AI roadmaps for organizations at all stages of data maturity.
The Morganfield Group
https://morganfieldgroup.com
Identity, Privacy and Security
The Morganfield Group implements scalable frameworks, tools, and processes that protect the personal data of clients’ employees, customers, and vendors. Its approach encompasses different components of a privacy program office, which include privacy program strategy, privacy governance and policy, third party privacy risk management, consent management, process/system gap identification and remediation, privacy by design, metrics monitoring and reporting, training, awareness, and communications,
The Privacy Compliance Hub
https://www.privacycompliancehub.com
Identity, Privacy and Security
The Privacy Compliance Hub aims to help organizations build a continuous culture of privacy compliance through a platform from which compliance is created, maintained, recorded and demonstrated. It features an online privacy training, an integrated map, a suite of records required for compliance, a library of privacy compliance templates, a glossary with all key privacy terms explained, and text of the GDPR in an easy-to-use format. The Hub also features all documentation in one central archive
The Privacy Control Center
https://www.privacycontrolcenter.com/en
Identity, Privacy and Security
GDPR Compliance
Privacy Control Center (PCC) is a SaaS platform which guides organisations in becoming compliant with the EU General Data Protection Regulation. With practical modules, PCC supports those responsible for the management of personal data in all aspects of working with and protecting personal data within the organisation. One of the main elements of PCC is the register of processes which is integrally linked to provide for the whole “plan, do, check, act-cycles.” By using clear reports and overview
Thomson Reuters
https://www.thomsonreuters.com/en.html
ePrivacy
Thomson Reuters has released its Data Privacy Advisor, a solution designed to help privacy professionals answer compliance questions through resources it has compiled and artificial intelligence. Users can enter a question into the platform, and the solution will come up with answers ranked by a confidence rating. The confidence rating is powered by IBM Watson and is created with the intention of getting smarter with each interaction.The solution also allows users to stay up to date with current
TokenEx Inc
https://www.tokenex.com
Identity, Privacy and Security
ePrivacy
De-Identification
TokenEx is a cloud-based data protection platform focused on safeguarding our clients and their partners against the inherent risk of storing and sharing sensitive information. Providing flexible solutions, TokenEx enables clients to pseudonymize and deidentify any dataset across a range of environments and applications. Employing a combination of tokenization, encryption and data vaulting, TokenEx works with customers to manage their risk and meet compliance obligations, while still enabling th
Tonic
http://tonic.ai
Identity, Privacy and Security
De-Identification
Tonic helps organizations protect their customer’s data, meet regulatory requirements, and simplify their development and testing process. Tonic does this by making a version of data that is freely shareable. Using machine learning and the latest data processing techniques, Tonic creates data that looks and feels like sensitive or production data, but is based on an underlying model. Organizations can safely use the synthetic data anywhere, such as in testing, development, marketing, sales demon
Trail of Bits
https://www.trailofbits.com
Identity, Privacy and Security
Open-Source
ML
PPML
Cryptography
Since 2012, Trail of Bits has helped secure some of the world’s most targeted organizations and products. They combine high-end security research with a real-world attacker mentality to reduce risk and fortify code. Trail of Bits has reviewed a wide range of software, including critical open source software. They also conduct research into and release tools for privacy and security, including PrivacyRaven, AlgoVPN, and iVerify.
International
North America
Transcend
https://transcend.io
Identity, Privacy and Security
ePrivacy
Transcend authenticates data subject requests, finds their data across all your data stores and over 450 SaaS tools, and responds to the data subject automatically. Users manage their privacy preferences through Your Privacy Center, hosted by Transcend at privacy.<your- domain>.com. Transcend is backed by Accel Partners and serves brands globally.
Tresorit
https://tresorit.com/business?adgroupid=15550463821&utm_term=tresorit&matchtype=e&utm_content=377852313774&gclid=Cj0KCQjw1qL6BRCmARIsADV9Jtb98fcsOVoiAneTc0zUnVmEdK5cJNVWLykhNZcepU5z6rUgIIYIYvcaAvdCEALw_wcB
Identity, Privacy and Security
Encrypted HW
Cryptography
Tresorit is a secure file synchronization software that uses the cloud to store encrypted data to make it shareable and accessible from everywhere. Tresorit is specifically designed to share confidential data of business users. Encryptionis performed before the data gets uploaded to the cloud, therefore, users of Tresorit do not require to trust the cloud provider or the communication links. Encrypted content handled by Tresorit is shareable without re-encryption and sharing is reversible by per
Truata
https://www.truata.com
Identity, Privacy and Security
De-Identification
Founded by Mastercard and IBM, Trūata delivers privacy-enhanced data management and analytics solutions to help clients unlock business growth without compromising customer privacy. Based on the principle of privacy by design, the Trūata solution independently anonymizes and analyzes customer data to generate insights. By applying these insights, companies can both unlock the full power of their data and protect customer privacy.
Trunomi
https://www.trunomi.com
Identity, Privacy and Security
ePrivacy
Trunomi unlocks customer data using consent and data rights. Trunomi provides customer consent and data rights management technology which enables businesses to request, receive and capture customer consent to the use of their personal data. For the business we create consent receipts and convert them to customer data rights accessible across all data systems. We enable businesses to comply with EU GDPR, data privacy laws, and replace inefficient and costly legacy approaches. For the customer we
Trust over IP
https://trustoverip.org/
The Trust over IP Foundation is defining a complete architecture for Internet-scale digital trust that combines both cryptographic trust at the machine layer and human trust at the business, legal, and social layers.
Trust-hub limited
https://www.trust-hub.com
Identity, Privacy and Security
ePrivacy
Effective data governance requires a coordinated team effort spanning multiple disciplines. trust-hub’s Privacy Lens platform enables teams to efficiently synchronize their activities around a single trusted view of the personal data ecosystem. Instead of just incurring an unproductive compliance cost, organisations can now optimize the business benefits from using personal data while dynamically managing their regulatory obligations and associated risk profile. Privacy Lens will take you beyond
TrustArc
https://trustarc.com
ePrivacy
Identity, Privacy and Security
TrustArc offers a comprehensive privacy platform that provides contextual privacy insights and automates all phases of privacy program management. Built on a foundation of embedded privacy expertise and integrated frameworks, the platform includes knowledge modules for identifying and prioritizing evolving regulatory requirements, including privacy research and alerts, law comparisons, legal summaries, operational templates; operations modules including building data inventories, mapping data fl
Truyo
https://truyo.com
ePrivacy
Identity, Privacy and Security
Truyo is an automated individual rights solution co-developed by Intel and IntraEdge. Truyo was created for enterprise companies seeking to automate data subject requests, consent and other data privacy rights for CCPA, GDPR, and emerging data privacy laws. Truyo features a consumer portal with end-to- end automation that allows users to exercise their data privacy rights, including the right to know, delete, and opt-out.
Tumult Labs
https://www.tmlt.io/
Private Dataset
Differential Privacy
Tumult Labs builds state-of-the-art privacy technology to enable the effective use of data while respecting the privacy of contributing individuals. Our technology enables the safe release of de-identified data, statistics and machine learning models. All of our solutions satisfy differential privacy, an ironclad, mathematically-proven privacy guarantee.
North America
United AI
https://www.unite.ai/what-is-federated-learning/
Federated Learning
Unite.ai was designed to offer detailed analysis and news on the latest advancements in machine learning and AI technology. We also want to be a platform to highlight new and upcoming AI companies who are unfortunately not getting the recognition that they deserve from the mainstream media.
Usercentrics GmbH
https://usercentrics.com
ePrivacy
Identity, Privacy and Security
Usercentrics is a Consent Management Platform. The Software-as- a-Service solution enables advertisers, publishers, agencies and technology providers to obtain, manage and document the consent of their website visitors to process the data of different web technologies. The Usercentrics software is fully customizable and allows websites to be fully compliant with the EU General Data Protection Regulation and ePrivacy policy regulations. The IAB-certified CMP offers an intuitive user interface, re
USoft
https://www.usoft.com
Identity, Privacy and Security
ePrivacy
USoft helps organizations with its product, Solvinx, to easily and responsibly implement the privacy legislation and other regulations. Solvinx is a platform of solid tooling, services and training. USoft offers several modules. The SMART PIA module is designed to facilitate an organization’s data register, data breach notifications, data subject rights, quickly assess high-risk areas and run DPIA in one database. The SMART Studio helps to record policies and regulations and to describe and draw
Varonis
https://www.varonis.com/products/datadvantage/
DatAdvantage is the heart of our Data Security Platform, giving you complete visibility and control over your critical data and hybrid IT infrastructure.
VCA Technology UK
https://vcatechnology.com/
Our analytics are versatile in their potential applications, from high-security perimeter protection to traffic counting and retail intelligence, we have the capability to provide you with a solution.
Venture Radar (Top 10 SD)
https://www.ventureradar.com/keyword/synthetic%20data
Venture Radar summary of top synthetic data companies
Veritas
https://www.veritas.com/en/uk/?om_camp_id=uk_sem_ggl_web_TL_Engage_VRTS-b&cid=7014T000000MqEr&gclid=Cj0KCQjw1qL6BRCmARIsADV9JtZlaTTRasxAwUeTsZh7-XrzcFfxC6gqV041tk1EGm5Uw18LpUDctvUaAik7EALw_wcB
ePrivacy
Identity, Privacy and Security
Veritas markets its solutions as tools that enable organizations to harness the power of their information to drive business success. Their “regulatory readiness” portfolio delivers intelligent capabilities that allow organizations to gain visibility into their data estate, decide on what data to retain or delete and assume control over their data to successfully manage the information explosion. Veritas streamlines the collection of custodian data from multiple sources with advanced file and us
Very Good Security
https://www.verygoodsecurity.com
ePrivacy
Identity, Privacy and Security
VGS enables startups and enterprises to store, process and transmit sensitive data securely without stifling innovation. If an organization needs to send sensitive data to a third party, VGS goes beyond encryption by transforming the data into identical safe substitutes for transmission and processing. If an organization’s employees need access to some sensitive data, but not all of it, VGS masks unneeded sensitive data fields, so employees can only see the data needed to do the job. Organizatio
Viacryp
https://www.viacryp.eu
Identity, Privacy and Security
De-Identification
Viacryp offers Privacy Enhancing Technologies for the purpose of the safe and monitored pseudonymisation of personal data. As a third-party, Viacryp helps clients analyze behavior and create consumer profiles while maintaining respect for privacy. Our externally-validated technology and process assure that individual customer data cannot be derived from the processed data.
Vigilant Software
https://www.vigilantsoftware.co.uk
Identity, Privacy and Security
GDPR Compliance
Vigilant Software develops industry- leading tools for intelligent, simplified compliance, including ISO27001-risk management and for the EU General Data Protection Regulation. Drawing on years of experience in developing and deploying risk management tools and services, Vigilant’s product range provides businesses with regulatory software tools that save users both time and money. Its flagship solution, vsRisk Cloud, is the industry-leading ISO27001-compliant risk assessment tool, simplifying a
Virtru
https://www.virtru.com
Identity, Privacy and Security
Encrypted HW
Cryptography
The Virtru Data Protection Platform helps organizations protect and share data wherever it travels. From real-time streaming data to large files and images, Virtru enables object-level data protection that is customizable, revocable, platform-agnostic and includes audit logs to track all access and access attempts. Privacy-preserving data protection becomes streamlined and impactful through turn-key SDKs, APIs, and key management. Built-in integrations into GSuite, Office365, and many SaaS appli
Vysk
https://www.vysk.com
Identity, Privacy and Security
Cryptography
The Vysk QS1 smartphone case delivers true end-to-end encrypted secure voice calls by jamming the smartphone’s microphones and using a physically separate audio system and encryption processor to create a secure pathway for voice data. Encryption takes place at the source, not in software, and is made even more secure with the Vysk Privacy Network. QS1 users are able to talk securely and to protect their in-person meetings from eavesdropping, all while using their own smartphones and without cha
We Do Privacy
https://www.wedoprivacy.com
Identity, Privacy and Security
ePrivacy
We Do Privacy offers software that allows users to record its processing activities to ensure compliance with the EU General Data Protection Regulation. Its Register tool can be accessed by from any internet location, and allows organizations to see all of its registrations, privacy impact assessments and other activities. We Do Privacy offers templates for processers such as human resources, ICT, facilities or customer relationship management, as well as industry specific templates such as gove
Webxray
https://webxray.eu
Identity, Privacy and Security
ePrivacy
WebXray is a privacy forensics consultancy with solutions for forensic auditing and policy capture. Our forensic toolkit sheds light on privacy infringement, cookie engineering, hashing and large scale data collection. WebXray reports on unlimited sites in different sectors, collecting all available online data for a full historical snapshot, with nodes operating from all countries, capturing all network traffic and resource requests, timing, headers and post data, with classification and identi
WEKA Media GmbH & Co. KG
https://www.weka.de
ePrivacy
We offer practical solutions for data protection officers who want to implement the full range of corporate data protection tasks efficiently and to the highest professional standards. Whether an initial data protection inventory or a complex IT audit, from the documentation of the TOMs to the creation and maintenance of procedural directories, from data protection impact assessments to creating inputs to compliance management. In this way, data protection officers are able to reliably implement
Whistic
https://www.whistic.com
ePrivacy
Whistic, in addition to its general vendor management solution, offers an online tool allowing companies to conduct risk assessments both internally and with third parties in relation to the Privacy Shield. The Privacy Shield assessment tool includes a self-assessment tool and provides a team collaboration solution to help manage and hold employees accountable for accurate data entry. Whistic then provides a gap analysis report for Privacy Shield and offers an annual registration tool to maintai
Wickr
https://wickr.com
ePrivacy
Cryptography
Wickr offers a secure messaging service designed for both business and personal use. Wickr offers ephemeral communications, meaning all messages only last for a short amount of time before they are permanently deleted. Users can determine how long the messages will exist before they are eliminated. All messages are encrypted, and no third party, or Wickr themselves, can access them. Wickr offers the same services for group messages as well.
Wired Relations
https://wiredrelations.com/en/
Identity, Privacy and Security
GDPR Compliance
Wired Relations automates data inventory mapping, system and vendor management, risk assessments, privacy and information security controls, documents, reporting and more in a user-friendly privacy management tool. The web- based software can be accessed on any device and provides a single place for privacy professionals to collaborate with IT, legal and vendors managing privacy risks. The result is the ability to demonstrate continuous compliance with your policies and various privacy framework
WireWheel
https://wirewheel.io
Identity, Privacy and Security
The WireWheel Privacy Software Platform includes a full suite of solutions to automate fulfillment of data subject rights requests, California Consumer Privacy Act “Do Not Sell” requests, privacy impact assessments and data protection impact assessments, records of processing, data flow mapping, data discovery classification and more. WireWheel’s Platform also includes connections to thousands of other platforms and the capability to completely automate or “orchestrate” DSAR fulfillment, privacy
Wizuda
https://wizuda.com
Identity, Privacy and Security
GDPR Compliance
De-Identification
“Wizuda Managed File Transfer provides a centralised platform for managing the movement of data within an organisation and with external parties. Designed with security, compliance and efficiency at its core, Wizuda provides full end-to-end accountability of all data transfer operations and real-time mapping of data flows. Wizuda Secure email and file sharing provides people in an organisation and clients with a secure and compliant way to share sensitive data. Benefits include no file size limi
XAIN
https://www.xain.io/federated-learning-platform
Federated Learning
XayNet is Xayn’s federated learning backend. We open-sourced our framework so that developers, companies and organisations can also train AI models directly on device and browser level. Build mobile machine learning applications, all from one codebase – lightweight and privacy-preserving.
XcooBee Privacy Network
https://www.xcoobee.com
Identity, Privacy and Security
ePrivacy
Cryptography
XcooBee creates components for use in building modern Privacy-By-Design processes. These range from secure document workflows to exchanges of specific data-items. For example, XcooBee’s building blocks for consent use blockchain technology to register, update, extend or revoke consent transparently to all parties. In addition, XcooBee offers pre-built privacy products for specific verticals such as health care, financial services, online marketing and nonprofit fundraising. XcooBee’s supplementa
Zartech
https://zartech.net
Identity, Privacy and Security
ePrivacy
De-Identification
Zartech is a U.S.-based cybersecurity products and advisory services company. Zartech’s GRC solution Cyberator can take a 360-degree view of an organization’s cybersecurity program in areas such as process, people and technology and accurately identify all the security gaps. It uses industry expertise, data-driven analysis and industry best practices to transform the security program management. It’s Privacy Modeling tool can be used to design privacy into products and services, find laws applic
ZIVVER
https://www.zivver.eu/en/
ePrivacy
GDPR Compliance
Cryptography
ZIVVER is an easy-to-use outbound email security solution. It prevents data leaks caused by human errors, protects organizations against unwanted access to sensitive information with encryption and authentication, and enables compliance with legislation, including the EU’s GDPR. ZIVVER integrates seamlessly with popular clients like Outlook and alerts users about sensitive information, inappropriate security measures or unusual recipients while typing.
ZLTech
https://www.zlti.com
Identity, Privacy and Security
GDPR Compliance
ZL Technologies Unified Archive is a centralized information governance platform that enables organizations to govern structured and unstructured data within a singular environment, comprising eDiscovery, compliance, records management, storage management, file analysis and analytics. Using its metadata and content analysis functions along with built-in visualization capabilities, organizations can classify and remediate sensitive information throughout the enterprise for the EU General Data Pro
360 records

Alert

Lorem ipsum
Okay