Best Software for 2025 is now live!
|| products.size

Best Data De-Identification Tools

Brandon Summers-Miller
BS
Researched and written by Brandon Summers-Miller

Data de-identification tools help companies derive value from their datasets without the risks of using personally identifiable information. Data de-identification software remove sensitive or personally identifying data—names, dates of birth, and other identifiers—in datasets in a way that is not re-identifiable. Data de-identification solutions help companies derive value from datasets without compromising the privacy of the data subjects in a given dataset. Data de-identification is essential for companies working with sensitive and highly-regulated data. Companies choose to de-identify their data to reduce their risk of holding personally identifiable information and comply with privacy and data protection laws such as HIPAA, CCPA, and GDPR.

Data de-identification solutions has some overlap with data masking software, or data obfuscation software. However, with data de-identification solutions, the risk of the data being reidentified is low. With data masking, sensitive data retains its actual identifying features like age range and zip code but masks (or redacts blanks or hashes) identifying information such as names, addresses, phone numbers, and other sensitive data. It is possible to remove the data mask and re-identify the data. Data masking is often used as a way for companies to maintain sensitive data while preventing misuse of that data by employees or insider threats.

To qualify for inclusion in the Data De-identification category, a product must:

Remove sensitive or identifying information from data
Prevent re-identification of data
Meet de-identification requirements under data privacy or data protection laws

Best Data De-Identification Tools At A Glance

Best for Small Businesses:
Highest User Satisfaction:
Best Free Software:
Show LessShow More
Highest User Satisfaction:
Best Free Software:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
77 Listings in Data De-Identification Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM InfoSphere Optim Data Privacy protects privacy and support compliance using extensive capabilities to de-identify sensitive information across applications, databases and operating systems

    Users
    No information available
    Industries
    • Information Technology and Services
    • Education Management
    Market Segment
    • 50% Mid-Market
    • 29% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM InfoSphere Optim Data Privacy features and usability ratings that predict user satisfaction
    8.9
    Ease of Use
    Average: 8.8
    9.8
    GDPR compliant
    Average: 9.2
    9.4
    Static pseudonymization
    Average: 8.9
    9.6
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    711,154 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    317,108 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM InfoSphere Optim Data Privacy protects privacy and support compliance using extensive capabilities to de-identify sensitive information across applications, databases and operating systems

Users
No information available
Industries
  • Information Technology and Services
  • Education Management
Market Segment
  • 50% Mid-Market
  • 29% Small-Business
IBM InfoSphere Optim Data Privacy features and usability ratings that predict user satisfaction
8.9
Ease of Use
Average: 8.8
9.8
GDPR compliant
Average: 9.2
9.4
Static pseudonymization
Average: 8.9
9.6
CCPA compliant
Average: 9.1
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
711,154 Twitter followers
LinkedIn® Page
www.linkedin.com
317,108 employees on LinkedIn®
Ownership
SWX:IBM
(14)5.0 out of 5
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AI-Driven Data Anonymization For Knowledge Management -> Nymiz detects sensitive data in unstructured files (doc, docx, xls, xlsx, jpg, tlf, png, pdf) and also in structured data (databases), and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Small-Business
    • 21% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nymiz features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.8
    10.0
    GDPR compliant
    Average: 9.2
    10.0
    Static pseudonymization
    Average: 8.9
    10.0
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Nymiz
    Year Founded
    2019
    HQ Location
    Bilbao, ES
    Twitter
    @nymizglobal
    192 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    25 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AI-Driven Data Anonymization For Knowledge Management -> Nymiz detects sensitive data in unstructured files (doc, docx, xls, xlsx, jpg, tlf, png, pdf) and also in structured data (databases), and

Users
No information available
Industries
No information available
Market Segment
  • 57% Small-Business
  • 21% Mid-Market
Nymiz features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.8
10.0
GDPR compliant
Average: 9.2
10.0
Static pseudonymization
Average: 8.9
10.0
CCPA compliant
Average: 9.1
Seller Details
Seller
Nymiz
Year Founded
2019
HQ Location
Bilbao, ES
Twitter
@nymizglobal
192 Twitter followers
LinkedIn® Page
www.linkedin.com
25 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tumult Analytics is an open-source Python library making it easy and safe to use differential privacy; enabling organizations to safely release statistical summaries of sensitive data. Tumult Analyti

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 51% Small-Business
    • 32% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tumult Analytics features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.8
    8.8
    GDPR compliant
    Average: 9.2
    8.8
    Static pseudonymization
    Average: 8.9
    8.5
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Durham
    Twitter
    @TumultLabs
    437 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    19 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tumult Analytics is an open-source Python library making it easy and safe to use differential privacy; enabling organizations to safely release statistical summaries of sensitive data. Tumult Analyti

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 51% Small-Business
  • 32% Mid-Market
Tumult Analytics features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.8
8.8
GDPR compliant
Average: 9.2
8.8
Static pseudonymization
Average: 8.9
8.5
CCPA compliant
Average: 9.1
Seller Details
Year Founded
2019
HQ Location
Durham
Twitter
@TumultLabs
437 Twitter followers
LinkedIn® Page
www.linkedin.com
19 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Private AI is at the forefront of privacy solutions, providing an advanced machine learning (ML) system that identifies, redacts, and replaces personally identifiable information (PII) across a wide s

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Mid-Market
    • 36% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Private AI features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 8.8
    9.2
    GDPR compliant
    Average: 9.2
    8.9
    Static pseudonymization
    Average: 8.9
    8.6
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Toronto, CA
    Twitter
    @PrivateAI
    LinkedIn® Page
    www.linkedin.com
    147 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Private AI is at the forefront of privacy solutions, providing an advanced machine learning (ML) system that identifies, redacts, and replaces personally identifiable information (PII) across a wide s

Users
No information available
Industries
No information available
Market Segment
  • 36% Mid-Market
  • 36% Small-Business
Private AI features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 8.8
9.2
GDPR compliant
Average: 9.2
8.9
Static pseudonymization
Average: 8.9
8.6
CCPA compliant
Average: 9.1
Seller Details
Year Founded
2019
HQ Location
Toronto, CA
Twitter
@PrivateAI
LinkedIn® Page
www.linkedin.com
147 employees on LinkedIn®
(35)4.2 out of 5
Optimized for quick response
1st Easiest To Use in Data De-Identification software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Tonic.ai offers a developer platform for data de-identification, synthesis, subsetting, and provisioning to keep test data secure, accessible, and in sync across testing and development environments.

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 43% Mid-Market
    • 34% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Tonic.ai features and usability ratings that predict user satisfaction
    8.0
    Ease of Use
    Average: 8.8
    9.3
    GDPR compliant
    Average: 9.2
    8.8
    Static pseudonymization
    Average: 8.9
    9.3
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Tonic.ai
    Company Website
    Year Founded
    2018
    HQ Location
    San Francisco, California
    Twitter
    @tonicfakedata
    682 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    94 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Tonic.ai offers a developer platform for data de-identification, synthesis, subsetting, and provisioning to keep test data secure, accessible, and in sync across testing and development environments.

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 43% Mid-Market
  • 34% Small-Business
Tonic.ai features and usability ratings that predict user satisfaction
8.0
Ease of Use
Average: 8.8
9.3
GDPR compliant
Average: 9.2
8.8
Static pseudonymization
Average: 8.9
9.3
CCPA compliant
Average: 9.1
Seller Details
Seller
Tonic.ai
Company Website
Year Founded
2018
HQ Location
San Francisco, California
Twitter
@tonicfakedata
682 Twitter followers
LinkedIn® Page
www.linkedin.com
94 employees on LinkedIn®
(82)4.5 out of 5
View top Consulting Services for Salesforce Shield
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Ease of Use
    15
    Privacy Management
    15
    Data Security
    11
    Access Control
    7
    Cons
    Learning Curve
    6
    Performance Issues
    5
    Access Control Issues
    4
    Complexity
    4
    Complexity Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Shield features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.8
    7.8
    GDPR compliant
    Average: 9.2
    8.3
    Static pseudonymization
    Average: 8.9
    8.9
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    584,242 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    78,543 employees on LinkedIn®
    Ownership
    NYSE:CRM
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 32% Enterprise
Salesforce Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Ease of Use
15
Privacy Management
15
Data Security
11
Access Control
7
Cons
Learning Curve
6
Performance Issues
5
Access Control Issues
4
Complexity
4
Complexity Issues
4
Salesforce Shield features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.8
7.8
GDPR compliant
Average: 9.2
8.3
Static pseudonymization
Average: 8.9
8.9
CCPA compliant
Average: 9.1
Seller Details
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
584,242 Twitter followers
LinkedIn® Page
www.linkedin.com
78,543 employees on LinkedIn®
Ownership
NYSE:CRM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Data security and privacy for data in use by both mission-critical and line-of-business applications.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 27% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Informatica Dynamic Data Masking features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.8
    8.3
    GDPR compliant
    Average: 9.2
    7.9
    Static pseudonymization
    Average: 8.9
    8.6
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    Redwood City, CA
    Twitter
    @Informatica
    102,081 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,576 employees on LinkedIn®
    Ownership
    NYSE: INFA
Product Description
How are these determined?Information
This description is provided by the seller.

Data security and privacy for data in use by both mission-critical and line-of-business applications.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 27% Small-Business
Informatica Dynamic Data Masking features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.8
8.3
GDPR compliant
Average: 9.2
7.9
Static pseudonymization
Average: 8.9
8.6
CCPA compliant
Average: 9.1
Seller Details
Year Founded
1993
HQ Location
Redwood City, CA
Twitter
@Informatica
102,081 Twitter followers
LinkedIn® Page
www.linkedin.com
5,576 employees on LinkedIn®
Ownership
NYSE: INFA
(47)4.7 out of 5
2nd Easiest To Use in Data De-Identification software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Very Good Security (“VGS”) makes it easy for customers to collect, protect and share sensitive financial data in a way that accelerates revenue, eliminates risk, ensures compliance, and drives profita

    Users
    • Software Engineer
    Industries
    • Financial Services
    • Banking
    Market Segment
    • 51% Mid-Market
    • 45% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • VGS Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance
    2
    Compliance Management
    2
    Ease of Use
    2
    Audit Management
    1
    Customer Support
    1
    Cons
    Audit Issues
    1
    Evidence Collection
    1
    Expensive
    1
    Limited Functionality
    1
    Manual Intervention Required
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VGS Platform features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 8.8
    10.0
    GDPR compliant
    Average: 9.2
    8.3
    Static pseudonymization
    Average: 8.9
    10.0
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    San Francisco, California
    Twitter
    @getvgs
    1,369 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    266 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Very Good Security (“VGS”) makes it easy for customers to collect, protect and share sensitive financial data in a way that accelerates revenue, eliminates risk, ensures compliance, and drives profita

Users
  • Software Engineer
Industries
  • Financial Services
  • Banking
Market Segment
  • 51% Mid-Market
  • 45% Small-Business
VGS Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance
2
Compliance Management
2
Ease of Use
2
Audit Management
1
Customer Support
1
Cons
Audit Issues
1
Evidence Collection
1
Expensive
1
Limited Functionality
1
Manual Intervention Required
1
VGS Platform features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 8.8
10.0
GDPR compliant
Average: 9.2
8.3
Static pseudonymization
Average: 8.9
10.0
CCPA compliant
Average: 9.1
Seller Details
Year Founded
2015
HQ Location
San Francisco, California
Twitter
@getvgs
1,369 Twitter followers
LinkedIn® Page
www.linkedin.com
266 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    KIProtect makes it easy to ensure compliance and security when working with sensitive or personal data.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 43% Small-Business
    • 39% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kiprotect features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.8
    9.2
    GDPR compliant
    Average: 9.2
    8.8
    Static pseudonymization
    Average: 8.9
    9.0
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kiprotect
    Year Founded
    2018
    HQ Location
    Berlin, DE
    LinkedIn® Page
    www.linkedin.com
    2 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

KIProtect makes it easy to ensure compliance and security when working with sensitive or personal data.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 43% Small-Business
  • 39% Mid-Market
Kiprotect features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.8
9.2
GDPR compliant
Average: 9.2
8.8
Static pseudonymization
Average: 8.9
9.0
CCPA compliant
Average: 9.1
Seller Details
Seller
Kiprotect
Year Founded
2018
HQ Location
Berlin, DE
LinkedIn® Page
www.linkedin.com
2 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Evervault eliminates the security and compliance burden of handling sensitive user data, by equipping developers with easy-to-use tools to encrypt, process, and share that data, without touching it in

    Users
    No information available
    Industries
    • Computer Software
    Market Segment
    • 59% Small-Business
    • 29% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Evervault features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.8
    9.0
    GDPR compliant
    Average: 9.2
    9.2
    Static pseudonymization
    Average: 8.9
    8.9
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Dublin, IE
    Twitter
    @evervault
    2,929 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Evervault eliminates the security and compliance burden of handling sensitive user data, by equipping developers with easy-to-use tools to encrypt, process, and share that data, without touching it in

Users
No information available
Industries
  • Computer Software
Market Segment
  • 59% Small-Business
  • 29% Mid-Market
Evervault features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.8
9.0
GDPR compliant
Average: 9.2
9.2
Static pseudonymization
Average: 8.9
8.9
CCPA compliant
Average: 9.1
Seller Details
Year Founded
2019
HQ Location
Dublin, IE
Twitter
@evervault
2,929 Twitter followers
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    • Information Technology and Services
    • Computer & Network Security
    Market Segment
    • 38% Enterprise
    • 32% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Informatica Data Security Cloud features and usability ratings that predict user satisfaction
    8.1
    Ease of Use
    Average: 8.8
    8.3
    GDPR compliant
    Average: 9.2
    8.7
    Static pseudonymization
    Average: 8.9
    8.0
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1993
    HQ Location
    Redwood City, CA
    Twitter
    @Informatica
    102,081 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,576 employees on LinkedIn®
    Ownership
    NYSE: INFA
Users
No information available
Industries
  • Information Technology and Services
  • Computer & Network Security
Market Segment
  • 38% Enterprise
  • 32% Small-Business
Informatica Data Security Cloud features and usability ratings that predict user satisfaction
8.1
Ease of Use
Average: 8.8
8.3
GDPR compliant
Average: 9.2
8.7
Static pseudonymization
Average: 8.9
8.0
CCPA compliant
Average: 9.1
Seller Details
Year Founded
1993
HQ Location
Redwood City, CA
Twitter
@Informatica
102,081 Twitter followers
LinkedIn® Page
www.linkedin.com
5,576 employees on LinkedIn®
Ownership
NYSE: INFA
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    PRIVACY VAULT is intended to support industries that collect and process personal profiles, high-velocity consumer activity and IoT data, plus unstructured documents, images, voice and video.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 48% Small-Business
    • 38% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privacy Vault features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.8
    8.0
    GDPR compliant
    Average: 9.2
    8.3
    Static pseudonymization
    Average: 8.9
    8.0
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Petach Tikvah, Israel
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

PRIVACY VAULT is intended to support industries that collect and process personal profiles, high-velocity consumer activity and IoT data, plus unstructured documents, images, voice and video.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 48% Small-Business
  • 38% Enterprise
Privacy Vault features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.8
8.0
GDPR compliant
Average: 9.2
8.3
Static pseudonymization
Average: 8.9
8.0
CCPA compliant
Average: 9.1
Seller Details
Year Founded
2015
HQ Location
Petach Tikvah, Israel
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privacy1 is a software company in Stockholm and London that develops technologies for practical management of personal data. Our mission is to be an enabler to make data protection easier and accessib

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 34% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Privacy1 Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Satisfaction
    1
    Data Privacy
    1
    Data Protection
    1
    Features
    1
    Privacy Management
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privacy1 features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.8
    9.8
    GDPR compliant
    Average: 9.2
    8.6
    Static pseudonymization
    Average: 8.9
    9.3
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Privacy1
    Year Founded
    2018
    HQ Location
    Stockholm, SE
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privacy1 is a software company in Stockholm and London that develops technologies for practical management of personal data. Our mission is to be an enabler to make data protection easier and accessib

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 34% Mid-Market
Privacy1 Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Satisfaction
1
Data Privacy
1
Data Protection
1
Features
1
Privacy Management
1
Cons
This product has not yet received any negative sentiments.
Privacy1 features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.8
9.8
GDPR compliant
Average: 9.2
8.6
Static pseudonymization
Average: 8.9
9.3
CCPA compliant
Average: 9.1
Seller Details
Seller
Privacy1
Year Founded
2018
HQ Location
Stockholm, SE
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    brighter AI provides anonymization solutions based on state-of-the-art deep learning technology to protect every identity in public. We develop game-changing image and video anonymization software t

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Small-Business
    • 27% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • brighter AI features and usability ratings that predict user satisfaction
    8.9
    Ease of Use
    Average: 8.8
    9.3
    GDPR compliant
    Average: 9.2
    0.0
    No information available
    9.7
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2017
    HQ Location
    Berlin, Germany
    Twitter
    @brighterAI
    643 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    31 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

brighter AI provides anonymization solutions based on state-of-the-art deep learning technology to protect every identity in public. We develop game-changing image and video anonymization software t

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Small-Business
  • 27% Mid-Market
brighter AI features and usability ratings that predict user satisfaction
8.9
Ease of Use
Average: 8.8
9.3
GDPR compliant
Average: 9.2
0.0
No information available
9.7
CCPA compliant
Average: 9.1
Seller Details
Year Founded
2017
HQ Location
Berlin, Germany
Twitter
@brighterAI
643 Twitter followers
LinkedIn® Page
www.linkedin.com
31 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Aircloak enables organisations to gain flexible and secure insights into sensitive data sets through a smart, automatic, on-demand anonymization engine. It ensures compliance for both internal analyst

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Mid-Market
    • 27% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aircloak Insights features and usability ratings that predict user satisfaction
    8.0
    Ease of Use
    Average: 8.8
    8.3
    GDPR compliant
    Average: 9.2
    7.0
    Static pseudonymization
    Average: 8.9
    8.3
    CCPA compliant
    Average: 9.1
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Aircloak
    Year Founded
    2012
    HQ Location
    Berlin, Germany
    Twitter
    @aircloak
    481 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Aircloak enables organisations to gain flexible and secure insights into sensitive data sets through a smart, automatic, on-demand anonymization engine. It ensures compliance for both internal analyst

Users
No information available
Industries
No information available
Market Segment
  • 45% Mid-Market
  • 27% Enterprise
Aircloak Insights features and usability ratings that predict user satisfaction
8.0
Ease of Use
Average: 8.8
8.3
GDPR compliant
Average: 9.2
7.0
Static pseudonymization
Average: 8.9
8.3
CCPA compliant
Average: 9.1
Seller Details
Seller
Aircloak
Year Founded
2012
HQ Location
Berlin, Germany
Twitter
@aircloak
481 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®

Learn More About Data De-Identification Tools

What are Data De-Identification Tools?

Data de-identification tools remove direct and indirect sensitive data and personally-identifying information from datasets to reduce the reidentification of that data. Data de-identification is particularly important for companies working with sensitive and highly-regulated data, such as those in healthcare working with protected health information (PHI) in medical records or financial data. 

Companies may be prohibited from analyzing datasets that include sensitive and personally identifiable information (PII) in order to comply with internal policies and meet data privacy and data protection regulations. However, if the sensitive data is removed from a dataset in a non-identifiable manner, that dataset may become usable. For example, using data de-identification software tools, information such as peoples’ names, addresses, protected health information, tax identifying number, social security number, account numbers, and other personally identifying or sensitive data can be removed from datasets enabling companies to extract analytical value from the remaining de-identified data. 

When considering using de-identified datasets, companies should understand the risks of that sensitive data becoming re-identified. Reidentification risks can include differencing attacks, such as where bad actors use their knowledge about people to see if specific individuals’ personal data is included in a dataset, or reconstruction attacks, where someone combines data from other data sources to reconstruct the original de-identified dataset. When evaluating data de-identification methods, understanding the degree of anonymity using k-anonymity is important. 

What are the Common Features of Data De-identification Tools?

The following are some core features within data de-identification tools:

Anonymization: Some data de-identification solutions offer statistical data anonymization methods, including k-anonymity, low-count suppression, and noise insertion. When working with sensitive data, particularly regulated data, anonymization weights and techniques to achieve that must be considered. The more anonymized the data is, the lesser the risk of re-identification. However, the more anonymous a dataset is made, the less its utility and accuracy. 

Tokenization or pseudonymization: Tokenization or pseudonymization replaces sensitive data with a token value stored outside the production dataset; it effectively de-identifies the dataset in use but can be reconstructed when needed.

What are the Benefits of Data De-identification Tools?

The biggest benefit of using data de-identification tools is enabling analyses of data that would otherwise be prohibited from use. This allows companies to extract insights from their data while following data privacy and protection regulations by protecting sensitive information.

Data usability for data analysis: Enables companies to analyze datasets and extract value from datasets that would otherwise be unable to be processed due to the sensitivity of data contained within them. 

Regulatory compliance: Global data privacy and protection regulations require companies to treat sensitive data differently than non-sensitive data. If a dataset can be made non-sensitive using data de-identification software techniques, it may no longer be in the scope of data privacy or data protection regulations.

Who Uses Data De-identification Tools?

Data de-identification solutions are used by people analyzing production data or those creating algorithms. De-identified data can also be used for safe data sharing.

Data Managers, administrators, and data scientists: These professionals who interact with datasets regularly will likely work with data de-identification software tools.

Qualified experts: These include qualified experts under HIPAA and can provide expert determination to attest that a dataset is deemed de-identified and the risks of re-identification are small based on generally accepted statistical methods.  

What are the Alternatives to Data De-identification Tools?

Depending on the type of data protection a company is looking for, alternatives to data de-identification tools may be considered. For example, when determining when the data de-identification process is best, data masking may be a better option for companies that want to limit people from viewing sensitive data within applications. If the data merely needs to be protected during transit or at rest, encryption software may be a choice. If privacy-safe testing data is needed, synthetic data may be an alternative.

Data masking software: Data masking software obfuscates the data while retaining the original data. The mask can be lifted to reveal the original dataset. 

Encryption software: Encryption software protects data by converting plaintext into scrambled letters, known as ciphertext, which can only be decrypted using the appropriate encryption key. 

Synthetic data software: Synthetic data software helps companies create artificial datasets, including images, text, and other data from scratch using computer-generated imagery (CGI), generative neural networks (GANs), and heuristics. Synthetic data is most commonly used for testing and training machine learning models.

Challenges with Data De-identification Tools

Software solutions can come with their own set of challenges. 

Minimizing re-identification risks: Simply removing personal information from a dataset may not be enough to consider the dataset de-identified. Indirect personal identifiers— contextual personal information within the data—may be used to re-identify a person in the data. Reidentification can happen from cross-referencing one dataset with another, singling out specific factors that relate to a known individual, or through general inferences of data that tend to correlate. De-identifying both direct and indirect identifiers, introducing noise (random data), and generalizing the data by reducing the granularity and analyzing it in aggregate can help prevent re-identification. 

Meeting regulatory requirements: Many data privacy and data protection laws do not specify technical requirements for what is considered de-identified or anonymous data, so it is up to companies to understand the technical capabilities of their software solutions and how that relates to adhering to data protection regulations.

How to Buy Data De-identification Tools

Requirements Gathering (RFI/RFP) for Data De-identification Tools

Users must determine their specific needs for data de-identification tools. They can answer the questions below to get a better understanding:

  • What is the business purpose of seeking data de-identification software? 
  • What kind of data is the user trying to de-identify? 
  • Would data masking, data encryption, or synthetic data be an alternative for their use cases? 
  • What degree of anonymity is needed?
  • Is it financial information, classified information, proprietary business information, personally identifiable information, or other sensitive data?
  • Have they identified where those sensitive data stores are--on-premises or in the cloud?
  • What specific software applications is that data used in? 
  • What software integrations may be needed?
  • Who within the company should be authorized to view sensitive data, and who should be served with the de-identified data? 

Compare Data De-identification Software Products

Create a long list

Buyers can visit G2’s Data De-identification Software category, read reviews about data de-identification products, and determine which products fit their businesses’ specific needs. They can then create a list of products that match those needs.

Create a short list

After creating a long list, buyers can review their choices and eliminate some products to create a shorter, more precise list.

Conduct demos

Once buyers have narrowed down their software search, they can connect with the vendor to view demonstrations of the software product and how it relates to their company’s specific use cases. They can ask about the de-identification methods. Buyers can also ask about integrations with their existing tech stack, licensing methods, and pricing—whether fees are based on the number of projects, databases, executions, etc.

Selection of Data De-identification Tools

Choose a selection team

Buyers must determine which team is responsible for implementing and managing this software. Often, that may be someone from the data team. It is important to have a representative from the financial team on the selection committee to ensure the license is within budget. 

Negotiation

Buyers should get specific answers to the license cost, how it is priced, and if the data de-identification software is based on the dataset size, features, or execution. They must keep in mind the company’s data de-identification needs for today and the future.

Final decision

The final decision will come down to whether the software solution meets the technical requirements, the usability, the implementation, other support, the expected return on investment, and more. Ideally, the data team will make the final decision, alongside input from other stakeholders like software development teams.