Software > IT Security > Data Privacy

Data Privacy Software

Data protection defines information security or the confidentiality, availability and integrity of data in software systems. Data protection software secures or supports the protection of sensitive operational or personal data. This refers to software that directly encrypts data, monitors encryption, or provides assistance in handling data protection.

Software solutions such as data privacy management, authentication, password management, electronic guides, IT baseline protection or data analysis are described here. Within the framework of the EU-GDPR, which finally came into force on 25.5.2018, numerous requirements must be met. Solutions for these requirements are also available in this section.

Are you looking for a suitable data protection software?
show 1 to 20 (of 27 software programs)
audatis MANAGER - Data protection management software
Data protection management software and e-learning from experts: simply use it online!
Data protection management software and e-learning from experts: simply use it online! Contracts for order processing, the list of processing activities, technical and organizational measures or descriptions, training, etc. must be observed when processing personal data in order to meet the requirements of the EU GDPR. The audatis® Manager provides support with workflow, task management, templates, text modules and much more. The solution also offers employee training via e-learning. There is already standardized learning content, but also an editor for individual adaptations to company specifics.
DarkShield
IRI DarkShield to protect sensitive data in semi/unstructured dark data sources
IRI DarkShield to protect sensitive data in semi/unstructured dark data sources DarkShield - your data protection partner: Meet GDPR requirements effortlessly with DarkShield. Discover how DarkShield helps you detect, remove and remediate PII to comply with data protection regulations.
CDMS
Customer Data Deletion Management System
Customer Data Deletion Management System With CDMS, companies can fulfill their obligations under the EU GDPR (rights of the data subject) in a legally compliant manner and with manageable effort. You receive documentation of the IT system landscape with all dependencies in graphical form and information on which personal data can be found in which systems. Among other things, CDMS maps the automated creation of a deletion concept in accordance with DIN 66398 and creates deletion requests in a timely manner.
FieldShield
IRI FieldShield® for data masking of sensitive data
IRI FieldShield® for data masking of sensitive data IRI FieldShield® is a proven and cost-effective software for data discovery and data masking of PII in structured and semi-structured sources, onsite or in the cloud, static or streaming. The FieldShield tools within the Eclipse platform enable accurate profiling and de-identification of data at rest (static data masking), while the FieldShield SDK is used to secure data in transit (dynamic data masking) to ensure data privacy.
caralegal
Experience the privacy workflow of your dreams
Experience the privacy workflow of your dreams With the data protection management software caralegal, start-ups and large corporations alike master the bureaucratic duties and save one month of working time per year. The intelligent data protection management software offers companies the essential functionalities for achieving efficient GDPR compliance, answers data protection-related questions, supports documentation and - through the further development of an AI - takes over ever greater parts of the data protection-related audit effort.
abylon APP-BLOCKER
Process monitoring: permanently blocks unwanted applications, services and drivers
Process monitoring: permanently blocks unwanted applications, services and drivers When Windows is started, many processes, services and drivers are started. The user notices very little of most of the processes on the PC. In addition, he can hardly judge the necessity of many processes. These background processes, for example, monitor the computer, search for updates or take over periodic tasks. These processes are not always desired, but cannot usually be deactivated individually. In addition, each started application requires a part of the computer power and slows down the computer a bit ...
TTS trax - ISMS Tool
The smart tool for efficient ISMS operation
The smart tool for efficient ISMS operation TTS trax - ISMS Tool offers, among other things, a data protection management module. This module can be used to integrate data protection in your company into the processes of the information security management system. Trax enables you to carry out data protection impact assessments and create a record of processing activities.
CRYPTO-BOX SERIAL
Software and data protection for the serial interface
Software and data protection for the serial interface The Crypto-Box Serial is a dongle for the RS-232 port. The protection system for the serial interfaces can be used for a wide range of software and data protection applications in Windows and UNIX environments on any platform. It is designed for use in industry as well as for customer-specific solutions.
otris privacy
otris privacy supports the data protection officer in his daily work
otris privacy supports the data protection officer in his daily work The data protection solution offers you targeted analysis and control of operational data protection and IT security standards. With the software, you can optimize security gaps and comprehensively document all data protection measures taken. otris privacy supports company and external data protection officers in their daily work. The software can be used across all industries and maps any company structure. With its comprehensive range of services, otris privacy sets the course for a successful long-term ...
CRISAM® GRC | Data Protection Management System
Data protection management EU GDPR-compliant
Data protection management EU GDPR-compliant Thanks to the intuitive user interface, data protection management with CRISAM® is easy to handle for both data controllers and processors. CRISAM® supports the legally compliant recording of company content in the area of data protection. The efficient solution grows with your requirements and can be flexibly adapted to your needs. CRISAM® meets the requirements of the European General Data Protection Regulation and is audit-proof.
Guardileo
User-friendly software solution for implementing the GDPR in your company
User-friendly software solution for implementing the GDPR in your company Guardileo - data protection management software is a scalable solution for making companies of all sizes data protection compliant. In Guardileo, the relevant processing activities and data protection impact assessments can be created in a standardized manner. Guardileo forms the central platform in the company for this. You gain a better overview and reduce the workload.
CellShield
IRI CellShield for data protection of sensitive data in multiple Excel® spreadsheets
IRI CellShield for data protection of sensitive data in multiple Excel® spreadsheets Your data protection solution for Microsoft Office: IRI CellShield EE goes beyond password protection to provide a professional solution for identifying and securing PII in Excel® spreadsheets. Protect your data and prevent data breaches.
DataCare
Legally compliant and secure data protection
Legally compliant and secure data protection DataCare is an easy and intuitive to use web-based data protection management system with which GDPR-compliant data protection can be implemented quickly and easily in your company.
Self Service Password Reset Manager (SSRPM)
Increase security with Self Service Password Reset
Increase security with Self Service Password Reset An often underestimated risk for user passwords within a company are automatically generated "forgotten password" requests from outside, especially if the reset of passwords for Active Directory, SAP and other applications is still handled manually via an email to IT. The solution is Self Service Password Reset. Learn now how SSRPM can support your data protection through password management.
Z1 SecureHub
Exchange large files spontaneously, easily and securely in compliance with the GDPR
Exchange large files spontaneously, easily and securely in compliance with the GDPR With Z1 SecureHub, you can transfer large files securely and in compliance with the EU General Data Protection Regulation. Whether videos, presentations or databases, files can be easily sent and received via your own Z1 SecureHub. All data is stored in your own infrastructure.
CRYPTO-BOX USB
Software and data backup solution for the USB interface
Software and data backup solution for the USB interface The Crypto-Box is a USB device that securely encrypts your data. It is easy to use and offers high security thanks to AES/Rijndael encryption.
Z1 SecureMail Gateway
Encrypt GDPR emails with Z1 SecureMail Gateway
Encrypt GDPR emails with Z1 SecureMail Gateway Z1 SecureMail Gateway encrypts emails in compliance with the EU General Data Protection Regulation. A high level of automation and centralized rules ensure that emails are not sent unencrypted by mistake. Depending on the recipient, encryption is carried out using PKI certificates or password-based encryption. All processes relating to certificate and password management are highly automated.
abylon ENTERPRISE
Comprehensive security suite for computers, data, privacy and more
Comprehensive security suite for computers, data, privacy and more abylon ENTERPRISE installs numerous functions in one setup to optimize and encrypt the PC, the data on it and your privacy. Background services ensure the regular and secure destruction of temporary files, forensic traces and Internet traces with all cookies created. Within the scope of all encryption functions, conventional passwords, software and hardware certificates (X.509) and smart cards as well as USB sticks can be used as security keys (security tokens).
abylon LOGON
Gesicherte Windowsanmeldung und Single Sign-On
Gesicherte Windowsanmeldung und Single Sign-On The abylon LOGON software is offered in three variants and enables secure logon to the Windows computer (credential provider) and other logon screens (SSO). Smart cards, RFID radio chip cards, USB sticks, Bluetooth devices or CDs/DVDs can be used as hardware keys (security tokens) for login. When the hardware key is removed, the computer is automatically locked, logged off or shut down. The software increases security with increased convenience.
antares RiMIS® ISMS
A management system for information security - also according to TISAX®
A management system for information security - also according to TISAX® Thanks to the antares RIMIS ISMS information management system, all requirements in accordance with GDPR can be implemented. All sensitive data in your company remains secure and only accessible to those who are authorized to access it. Unauthorized persons, on the other hand, are detected by the system at an early stage and prevented by appropriate measures.
show 1 to 20 (of 27 software programs)
12
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search similar categories like Data Privacy:

Show all 363 Software categories