Software > IT Security > Data Privacy

Data Privacy Software

Data protection defines information security or the confidentiality, availability and integrity of data in software systems. Data protection software secures or supports the protection of sensitive operational or personal data. This refers to software that directly encrypts data, monitors encryption, or provides assistance in handling data protection.

Software solutions such as data privacy management, authentication, password management, electronic guides, IT baseline protection or data analysis are described here. Within the framework of the EU-GDPR, which finally came into force on 25.5.2018, numerous requirements must be met. Solutions for these requirements are also available in this section.

Are you looking for a suitable data protection software?
show 1 to 14 (of 14 software programs)
FieldShield
IRI FieldShieldŽ for data masking of sensitive data
IRI FieldShieldŽ for data masking of sensitive data IRI FieldShieldŽ is a proven and cost-effective software for data discovery and data masking of PII in structured and semi-structured sources, onsite or in the cloud, static or streaming. The FieldShield tools within the Eclipse platform enable accurate profiling and de-identification of data at rest (static data masking), while the FieldShield SDK is used to secure data in transit (dynamic data masking) to ensure data privacy.
caralegal
Experience the privacy workflow of your dreams
Experience the privacy workflow of your dreams With the data protection management software caralegal, start-ups and large corporations alike master the bureaucratic duties and save one month of working time per year. The intelligent data protection management software offers companies the essential functionalities for achieving efficient GDPR compliance, answers data protection-related questions, supports documentation and - through the further development of an AI - takes over ever greater parts of the data protection-related audit effort.
abylon APP-BLOCKER
Process monitoring: permanently blocks unwanted applications, services and drivers
Process monitoring: permanently blocks unwanted applications, services and drivers When Windows is started, many processes, services and drivers are started. The user notices very little of most of the processes on the PC. In addition, he can hardly judge the necessity of many processes. These background processes, for example, monitor the computer, search for updates or take over periodic tasks. These processes are not always desired, but cannot usually be deactivated individually. In addition, each started application requires a part of the computer power and slows down the computer a bit ...
CRYPTO-BOX SERIAL
Software and data protection for the serial interface
Software and data protection for the serial interface The Crypto-Box Serial is a dongle for the RS-232 port. The protection system for the serial interfaces can be used for a wide range of software and data protection applications in Windows and UNIX environments on any platform. It is designed for use in industry as well as for customer-specific solutions.
otris privacy
otris privacy supports the data protection officer in his daily work
otris privacy supports the data protection officer in his daily work The data protection solution offers you targeted analysis and control of operational data protection and IT security standards. With the software, you can optimize security gaps and comprehensively document all data protection measures taken. otris privacy supports company and external data protection officers in their daily work. The software can be used across all industries and maps any company structure. With its comprehensive range of services, otris privacy sets the course for a successful long-term ...
CellShield
IRI CellShield for data protection of sensitive data in multiple ExcelŽ spreadsheets
IRI CellShield for data protection of sensitive data in multiple ExcelŽ spreadsheets Your data protection solution for Microsoft Office: IRI CellShield EE goes beyond password protection to provide a professional solution for identifying and securing PII in ExcelŽ spreadsheets. Protect your data and prevent data breaches.
DarkShield
IRI DarkShield to protect sensitive data in semi/unstructured dark data sources
IRI DarkShield to protect sensitive data in semi/unstructured dark data sources DarkShield - your data protection partner: Meet GDPR requirements effortlessly with DarkShield. Discover how DarkShield helps you detect, remove and remediate PII to comply with data protection regulations.
QSEC - GRC/ISMS, ISO 27001/BSI standard- IT protection, B3S and data protection
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
GRC, ISMS, risk management, IMS, IKS, and data protection - All-in-one! QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
Self Service Password Reset Manager (SSRPM)
Increase security with Self Service Password Reset
Increase security with Self Service Password Reset An often underestimated risk for user passwords within a company are automatically generated "forgotten password" requests from outside, especially if the reset of passwords for Active Directory, SAP and other applications is still handled manually via an email to IT. The solution is Self Service Password Reset. Learn now how SSRPM can support your data protection through password management.
CRYPTO-BOX USB
Software and data backup solution for the USB interface
Software and data backup solution for the USB interface The Crypto-Box is a USB device that securely encrypts your data. It is easy to use and offers high security thanks to AES/Rijndael encryption.
abylon ENTERPRISE
Comprehensive security suite for computers, data, privacy and more
Comprehensive security suite for computers, data, privacy and more abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
abylon SHREDDER
Delete files and Internet traces irrevocably and securely
Delete files and Internet traces irrevocably and securely When deleting files, only the references to the files are removed without actually deleting them. With the appropriate APPs, this data can be reconstructed even without special knowledge. Even formatting the hard disk leaves recoverable data, which is not desirable when selling the computer. Remedy is provided by the software abylon SHREDDER. By using recognized deletion methods, files are irrevocably deleted and completely removed. In addition to deleting files and hard disks, Internet traces, temporary files or forensic traces can also be safely removed ...
Compliance Aspekte
Is a practical GRC tool for implementing ISMS and DSMS
With the Compliance Aspekte solution, you easily implement the general data protection regulations. Benefit from the ready-to-use software for implementing data protection compliance and EU-DSGVO in your company. Among other things, a list of processing activities to meet the requirements of the General Data Protection Regulation as well as catalogs of risks and measures for data protection are available.
show 1 to 14 (of 14 software programs)
1
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search in similar categories:

Show all 357 Software categories