Software > Search

Search result

  • Windows based
  • macOS
  • Unix based
  • Mainframe based
  • Mobile
show price
  • with demo version
  • multi-client compatible
  • with customizing
  • On-premises (local installation)
  • SaaS, web based, cloud
Deletion classes
or
show 1 to 12 (of 12 software programs)
abylon SHREDDER
Delete files and Internet traces irrevocably and securely
Delete files and Internet traces irrevocably and securely When deleting files, only the references to the files are removed without actually deleting them. With the appropriate APPs, this data can be reconstructed even without special knowledge. Even formatting the hard disk leaves recoverable data, which is not desirable when selling the computer. Remedy is provided by the software abylon SHREDDER. By using recognized deletion methods, files are irrevocably deleted and completely removed. In addition to deleting files and hard disks, Internet traces, temporary files or forensic traces can also be safely removed ...
QSEC - GRC/ISMS, ISO 27001/BSI standard- IT protection, B3S and data protection
GRC, ISMS, risk management, IMS, IKS, and data protection - "All-in-one"!
GRC, ISMS, risk management, IMS, IKS, and data protection - All-in-one! QSEC is an integrated management system that provides the management with decisions based on transparency and facts and supplies the corporate risk management with important decision basics from the operative risk management. The implementation of. the Compliance, of Information Security Management according to the requirements of ISO 27001, BSI standard (IT-Grundschutz), B3S Risk Management anddata protection according to GDPR Data Protection according to GDPR In addition, a wide range of other requirements ...
audatis MANAGER - Data protection management software
Data protection management software and e-learning from experts: simply use it online!
Data protection management software and e-learning from experts: simply use it online! Data processing agreements, records of processing activities, TOMs, employee training with certificates - the EU General Data Protection Regulation has many requirements - audatis® Manager supports you in dealing with them and ensures that you are on the safe side. The web-based software solution for data protection is multilingual and multi-client capable and is optionally available with industry-specific templates for the register of processing activities.
CRISAM® GRC | Data Protection Management System
Data protection management EU GDPR-compliant
Data protection management EU GDPR-compliant Thanks to the intuitive user interface, data protection management with CRISAM® is easy to handle for both data controllers and processors. CRISAM® supports the legally compliant recording of company content in the area of data protection. The efficient solution grows with your requirements and can be flexibly adapted to your needs. CRISAM® meets the requirements of the European General Data Protection Regulation and is audit-proof.
FieldShield
Powerful and cost-effective software for data recognition and masking .
Powerful and cost-effective software for data recognition and masking . IRI FieldShield® is powerful and cost-effective software for data discovery and data masking of PII in structured and semi-structured sources, onsite or in the cloud, static or streaming. The FieldShield utilities in Eclipse are used to profile and de-identify data at rest (static data masking) and the FieldShield SDK is used to secure data in motion (dynamic data masking).
CellShield
Reporting & masking of PII in Microsoft Excel® spreadsheets
Reporting & masking of PII in Microsoft Excel® spreadsheets IRI CellShield to find and protect sensitive data (PII) in multiple Excel® spreadsheets: CellShield is the only full-featured, professional data discovery, masking and auditing package for Excel 2010, 2013, 2016 and 2019 (plus Office 365) workbooks on your LAN. CellShield exceeds the security and scope of a single password by combining and automating additional features.
DarkShield
Recognize, deploy and delete PII in Dark Data
Recognize, deploy and delete PII in Dark Data With IRI DarkShield, you can classify, find and delete or otherwise mask sensitive information in various structured, semi-structured and unstructured sources, including: text, PDF and MS Office documents, Parquet and image files, relational and NoSQL collections, and even faces. Whether the PII is on your desktop or anywhere on your network, DarkShield protects it!...
caralegal
Privacy solution Platform - Stay ahead of the data protection curve
Privacy solution Platform - Stay ahead of the  data protection curve The smartest way for companies to achieve GDPR compliance - data protection management software caralegal Data privacy responsibility means adhering to complex regulations like the GDPR, communicating effectively between departments, and meticulously documenting processes. This is where caralegal comes in: our platform serves as a central hub for all your data privacy needs. It brings order to the data organisation and is designed to be so intuitive that even non-lawyers can use it effortlessly ...
GRASP
Manage information security, business continuity and data protection in one solution
Manage information security, business continuity and data protection in one solution Digitize management systems (e.g. ISMS according to ISO 27001) easily and efficiently. GRASP facilitates the development and operation of management systems for information security, data protection and business continuity management with preconfigured modules. GRASP can be individually adapted to the specific circumstances of a company without any programming effort.
CDMS
Customer Data Deletion Management System
Customer Data Deletion Management System With CDMS, companies can fulfill their obligations under the EU GDPR (rights of the data subject) in a legally compliant manner and with manageable effort. You receive documentation of the IT system landscape with all dependencies in graphical form and information on which personal data can be found in which systems. Among other things, CDMS maps the automated creation of a deletion concept in accordance with DIN 66398 and creates deletion requests in a timely manner.
Compliance Aspekte
Is a practical GRC tool for implementing ISMS and DSMS
With governance, risk and compliance management in one system, Compliance Aspekte is a modular tool that enables you to manage regulatory or company-specific standards, policies and best practices. Compliance Aspekte includes numerous, extremely useful features. The tool is intuitive to use, has a modern user interface and allows for convenient management of policies. Quarterly feature updates and multilingual support are available.
audatis MANAGER - Whistleblower system
Set up your own confidential (and anonymous) whistleblowing system.
Set up your own confidential (and anonymous) whistleblowing system. To meet the requirements of the EU Whistleblowing Directive and the German Whistleblower Protection Act (HinSchG), we offer an optional module in audatis MANAGER as a whistleblower system. With the whistleblower system, you can receive (anonymous) reports as the person responsible and communicate with the whistleblower (anonymously) via an encrypted channel.
show 1 to 12 (of 12 software programs)
1