Data Privacy
3 Review
Privacy leaders simplify and automate their privacy programs with the TrustArc Privacy Management Platform. This single platform experience is delivered through its unique combination of privacy frameworks, insights, intelligence, knowledge and operations. Only TrustArc can deliver the depth of continuous privacy intelligence, coupled with with aβ¦
Read more about this company3 Review
CookieYes is a Cookie consent solution to help you make your website GDPR and CCPA compliant.
3 Review
InCountry provides data residency-as-a-service in more than 90 countries for sensitive and regulated data, ensuring customers comply with local data protection regulations. You can integrate InCountry into your applications through a simple development API, a codeless border proxy solution or via turnkey integrations with leading SaaS platforms likeβ¦
Read more about this company3 Review
eXate streamlines, automates and simplifies the processes of storing, interpreting and extracting value from data assets. It democratises data privacy for organisations by providing a simple, embedded platform that automates the technical enforcement of data policies.
3 Review
Most Advanced Platform for Third-Party Risk, Privacy Management, Modern Slavery Act Compliance, Cyber Security Assessments, Operational Due Diligence, and Bank Network Management. Gain Efficiency. Reduce Risk. Scale Cost-Effectively. CENTRL is the first inter-company network designed to help companies manage their partner-client relationships in aβ¦
Read more about this company3 Review
AuraPortal zero-code Digital Business Platform is the fastest tool to transform enterprise operations.
3 Review
An RFID Privacy Impact Assessment helps companies to assess the privacy risks - and identify the measures to be taken to address them - before a new RFID application is introduced onto the market.
3 Review
InnoSecβs enterprise offering is the most robust cyber risk product on the market. We address all aspects of cyber risk management by quantifying cyber risk and automating all cyber security activities. Our STORM product is available on premise or as SaaS.
3 Review
The PIA software aims to help data controllers build and demonstrate compliance to the GDPR.
3 Review
A global privacy compliance suite. GDPR, HIPPA, DPA 2018 and more. Multi Data Controller, mult Data Processor and Sub-Processor. Integrated risk management, integrated document management. Create comprehensive Record of Processing/ Data Inventory. Fully customisable. Clean, simple, effective
3 Review
Cloud application that provide the means to an organisation to become compliant and keep it. By supporting process, document and information flows and maintaining accountability at all data privacy stakeholders, GDPR is handled in a centralised and structured way. Besides all GDPR processes (Record of Processing Activities, DPIA, DSAR, Data Breach andβ¦
Read more about this company3 Review
MexonInControl for Privacy is an online service (Software-as-a-Service) with which every organization can build the registers required by the GDPR. Registers for processing activities, processors, processing agreements, standards, risks, measures and Data Protection Impact Assessments.
3 Review
Nymity multiplies your privacy office resources, transforming the way you manage privacy within your organization.
3 Review
Data anonymization is a type of information sanitization in order to protect privacy. It is the process of either encrypting or removing personally identifiable information from a data set so that the people whom the data describe remain anonymous.
3 Review
Control.My.ID Enterprise Platform is a tool that will keep you compliant and give you the workflow tools you need to complete and keep track of requests.
3 Review
Signatu is a comprehensive Software-as-a-Service (SaaS) platform for managing privacy on your sites and apps.
3 Review
3 Review
3 Review
Consentric allows to manage customer consent and permissions aligned with GDPR, tailored for business and underpinned by a comprehensive audit trail.
3 Review
When a cyber incident occurs, time is of the essence. Combing through millions of documents to find affected PII/PHI requires a new approach: Canopy. Our purpose-built breach response application reduces the time, cost, risk, and effort associated with the defensible discovery of personally identifiable data.