Header banner
Revain logoHome Page
ghost pii logo

Ghost PII Review

3

·

Very good

Revainrating 4.5 out of 5  
Rating 
4.7
Security, Confidentiality

View on AmazonView on ЯM

Description of Ghost PII

Capnion’s unique protocol is called Ghost PII and it focuses on personally identifiable information (or PII) like name, address, etc. Replace the PII in your pipelines now with encrypted data that, like a ghost, contains some of its unique essence but lacks that tangibility to cause harm. More concretely, your data is securely encrypted yet you can still use it to link records and thus perform important backend IT tasks like ETL and entity resolution. These tasks can be performed using common tools with Capnion’s software seamlessly handling the heavy lifting behind the scenes.

Reviews

Global ratings 3
  • 5
    2
  • 4
    1
  • 3
    0
  • 2
    0
  • 1
    0

Type of review

Revainrating 5 out of 5

Excellent tool that saved one of us countless hours

I love the integration with other tools like Apache Kafka. The way it handles keys is also very good in my opinion. It's easy to understand how to configure so you don't have to spend time learning about all those concepts when you first start working with it. Easy to integrate into any environment. Pricing could be better, but we have a budget for this project and the cost was justified since we are able to deliver our product faster than without it. I have been working very closely with this…

Pros
  • Easily integrates different tech stacks (eCommerce apps) using REST APIs.
Cons
  • Will fit

Revainrating 5 out of 5

Fantastic tool with tons potential: Ghost PII

The most useful thing I've found about this product was how easy it made my life as an analytics manager at work! It's been incredibly helpful for our team since we're able to track all aspects of sales funnel from lead generation through engagement and conversion into purchase or trial via multiple channels across many different platforms without having to rely solely on manual processes. We have also used their API integration which has allowed us to integrate other third-party systems such…

Pros
  • User friendly interface intuitive design with clear explanations throughout along side great documentation available directly online in PDF format (with instructions) making everything very accessible even by people who haven’t had prior experience working within Big Data environments.
  • Great customer service response time &
Cons
  • Some little things

Revainrating 4 out of 5

Easy option when dealing w/sensitive information

I really liked how easy it was to implement. The documentation was very clear about what each function did. It also had an open-source version which allowed me to check out the code before implementing it. There wasn't much to dislike. However, if you are looking for something more extensive than just encrypted email addresses, this may not be suitable. We were looking for something relatively simple that could encrypt individual emails. I have used this product for over 2 years now and have…

Pros
  • This has helped our staff learn the product quickly and efficiently
Cons
  • The product is very basic and doesn't have any advanced features available