Software > IT Security > Data Privacy

Data Privacy Software

Data protection defines information security or the confidentiality, availability and integrity of data in software systems. Data protection software secures or supports the protection of sensitive operational or personal data. This refers to software that directly encrypts data, monitors encryption, or provides assistance in handling data protection.

Software solutions such as data privacy management, authentication, password management, electronic guides, IT baseline protection or data analysis are described here. Within the framework of the EU-GDPR, which finally came into force on 25.5.2018, numerous requirements must be met. Solutions for these requirements are also available in this section.

Are you looking for a suitable data protection software?
show 1 to 20 (of 27 software programs)
Guardileo
User-friendly software solution for implementing the GDPR in your company
User-friendly software solution for implementing the GDPR in your company Guardileo - data protection management software is a scalable solution for making companies of all sizes data protection compliant. In Guardileo, the relevant processing activities and data protection impact assessments can be created in a standardized manner. Guardileo forms the central platform in the company for this. You gain a better overview and reduce the workload.
CellShield
IRI CellShield for data protection of sensitive data in multiple Excel® spreadsheets
IRI CellShield for data protection of sensitive data in multiple Excel® spreadsheets Your data protection solution for Microsoft Office: IRI CellShield EE goes beyond password protection to provide a professional solution for identifying and securing PII in Excel® spreadsheets. Protect your data and prevent data breaches.
DataCare
Legally compliant and secure data protection
Legally compliant and secure data protection DataCare is an easy and intuitive to use web-based data protection management system with which GDPR-compliant data protection can be implemented quickly and easily in your company.
audatis MANAGER - Data protection management software
Data protection management software and e-learning from experts: simply use it online!
Data protection management software and e-learning from experts: simply use it online! Contracts for order processing, the list of processing activities, technical and organizational measures or descriptions, training, etc. must be observed when processing personal data in order to meet the requirements of the EU GDPR. The audatis® Manager provides support with workflow, task management, templates, text modules and much more. The solution also offers employee training via e-learning. There is already standardized learning content, but also an editor for individual adaptations to company specifics.
DarkShield
IRI DarkShield to protect sensitive data in semi/unstructured dark data sources
IRI DarkShield to protect sensitive data in semi/unstructured dark data sources DarkShield - your data protection partner: Meet GDPR requirements effortlessly with DarkShield. Discover how DarkShield helps you detect, remove and remediate PII to comply with data protection regulations.
CDMS
Customer Data Deletion Management System
Customer Data Deletion Management System With CDMS, companies can fulfill their obligations under the EU GDPR (rights of the data subject) in a legally compliant manner and with manageable effort. You receive documentation of the IT system landscape with all dependencies in graphical form and information on which personal data can be found in which systems. Among other things, CDMS maps the automated creation of a deletion concept in accordance with DIN 66398 and creates deletion requests in a timely manner.
FieldShield
IRI FieldShield® for data masking of sensitive data
IRI FieldShield® for data masking of sensitive data IRI FieldShield® is a proven and cost-effective software for data discovery and data masking of PII in structured and semi-structured sources, onsite or in the cloud, static or streaming. The FieldShield tools within the Eclipse platform enable accurate profiling and de-identification of data at rest (static data masking), while the FieldShield SDK is used to secure data in transit (dynamic data masking) to ensure data privacy.
caralegal
Experience the privacy workflow of your dreams
Experience the privacy workflow of your dreams With the data protection management software caralegal, start-ups and large corporations alike master the bureaucratic duties and save one month of working time per year. The intelligent data protection management software offers companies the essential functionalities for achieving efficient GDPR compliance, answers data protection-related questions, supports documentation and - through the further development of an AI - takes over ever greater parts of the data protection-related audit effort.
abylon APP-BLOCKER
Process monitoring: permanently blocks unwanted applications, services and drivers
Process monitoring: permanently blocks unwanted applications, services and drivers When Windows is started, many processes, services and drivers are started. The user notices very little of most of the processes on the PC. In addition, he can hardly judge the necessity of many processes. These background processes, for example, monitor the computer, search for updates or take over periodic tasks. These processes are not always desired, but cannot usually be deactivated individually. In addition, each started application requires a part of the computer power and slows down the computer a bit ...
TTS trax - ISMS Tool
The smart tool for efficient ISMS operation
The smart tool for efficient ISMS operation TTS trax - ISMS Tool offers, among other things, a data protection management module. This module can be used to integrate data protection in your company into the processes of the information security management system. Trax enables you to carry out data protection impact assessments and create a record of processing activities.
CRYPTO-BOX SERIAL
Software and data protection for the serial interface
Software and data protection for the serial interface The Crypto-Box Serial is a dongle for the RS-232 port. The protection system for the serial interfaces can be used for a wide range of software and data protection applications in Windows and UNIX environments on any platform. It is designed for use in industry as well as for customer-specific solutions.
otris privacy
otris privacy supports the data protection officer in his daily work
otris privacy supports the data protection officer in his daily work The data protection solution offers you targeted analysis and control of operational data protection and IT security standards. With the software, you can optimize security gaps and comprehensively document all data protection measures taken. otris privacy supports company and external data protection officers in their daily work. The software can be used across all industries and maps any company structure. With its comprehensive range of services, otris privacy sets the course for a successful long-term ...
CRISAM® GRC | Data Protection Management System
Data protection management EU GDPR-compliant
Data protection management EU GDPR-compliant Thanks to the intuitive user interface, data protection management with CRISAM® is easy to handle for both data controllers and processors. CRISAM® supports the legally compliant recording of company content in the area of data protection. The efficient solution grows with your requirements and can be flexibly adapted to your needs. CRISAM® meets the requirements of the European General Data Protection Regulation and is audit-proof.
abylon SHREDDER
Delete files and Internet traces irrevocably and securely
Delete files and Internet traces irrevocably and securely When deleting files, only the references to the files are removed without actually deleting them. With the appropriate APPs, this data can be reconstructed even without special knowledge. Even formatting the hard disk leaves recoverable data, which is not desirable when selling the computer. Remedy is provided by the software abylon SHREDDER. By using recognized deletion methods, files are irrevocably deleted and completely removed. In addition to deleting files and hard disks, Internet traces, temporary files or forensic traces can also be safely removed ...
Compliance Aspekte
Is a practical GRC tool for implementing ISMS and DSMS
With the Compliance Aspekte solution, you easily implement the general data protection regulations. Benefit from the ready-to-use software for implementing data protection compliance and EU-DSGVO in your company. Among other things, a list of processing activities to meet the requirements of the General Data Protection Regulation as well as catalogs of risks and measures for data protection are available.
audatis MANAGER - Whistleblower system
Set up your own confidential (and anonymous) whistleblowing system.
Set up your own confidential (and anonymous) whistleblowing system. In order to comply with the provisions of the EU Whistleblowing Directive and the German Whistleblower Protection Act (HinSchG), we have developed an optional whistleblower system module in audatis MANAGER. This whistleblower system module enables you to receive (anonymous) reports in your function as the person responsible and to communicate with the whistleblower (who can remain anonymous) via a secure, encrypted channel.
QSEC - GRC/ISMS, ISO 27001/BSI standard- IT protection, B3S and data protection
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
GRC, ISMS, risk management, IMS, IKS, and data protection - All-in-one! QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
Self Service Password Reset Manager (SSRPM)
Increase security with Self Service Password Reset
Increase security with Self Service Password Reset An often underestimated risk for user passwords within a company are automatically generated "forgotten password" requests from outside, especially if the reset of passwords for Active Directory, SAP and other applications is still handled manually via an email to IT. The solution is Self Service Password Reset. Learn now how SSRPM can support your data protection through password management.
Z1 SecureHub
Exchange large files spontaneously, easily and securely in compliance with the GDPR
Exchange large files spontaneously, easily and securely in compliance with the GDPR With Z1 SecureHub, you can transfer large files securely and in compliance with the EU General Data Protection Regulation. Whether videos, presentations or databases, files can be easily sent and received via your own Z1 SecureHub. All data is stored in your own infrastructure.
CRYPTO-BOX USB
Software and data backup solution for the USB interface
Software and data backup solution for the USB interface The Crypto-Box is a USB device that securely encrypts your data. It is easy to use and offers high security thanks to AES/Rijndael encryption.
show 1 to 20 (of 27 software programs)
12
  •  

Looking for the right software? Trust SoftGuide!

Our experts will find the perfect solution for you - independently and at the cutting edge of software trends.

Search similar categories like Data Privacy:

Show all 364 Software categories