Best Software for 2025 is now live!
Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated Data Secure Alternatives

Data Secure Reviews & Product Details

IV
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Data Secure?

It is mainly used for data loss prevention and also for security information and event management. It helps companies monitor, manage and secure the mobile devices, tablets and laptops. Review collected by and hosted on G2.com.

What do you dislike about Data Secure?

Sometimes it may lose our high-level confidential data..sometimes it may leak a considerable amount of data. Review collected by and hosted on G2.com.

What problems is Data Secure solving and how is that benefiting you?

For my self, Availability plays a significant role in data secure. It ensures that security controls.\, computer systems and software all work correctly to ensure service and information. My financial database must be available for accountants to send or pay. Review collected by and hosted on G2.com.

Data Secure Overview

What is Data Secure?

Data Secure is a comprehensive protection solution that comes with pre-defined masking rules. With these rules you can scramble any non-key field in any client-dependent SAP table in a number of different ways (such as mapping table look-up, constant value, clear a field). You can also extend these rules to cover your own particular security needs.

Data Secure Details
Show LessShow More
Product Description

Data Secure is a comprehensive protection solution that comes with pre-defined masking rules. With these rules you can scramble any non-key field in any client-dependent SAP table in a number of different ways (such as mapping table look-up, constant value, clear a field). You can also extend these rules to cover your own particular security needs.


Seller Details
Seller
EPI-USE
Year Founded
1984
HQ Location
Singapore, SG
Twitter
@EPIUSELabs
1,033 Twitter followers
LinkedIn® Page
www.linkedin.com
1,472 employees on LinkedIn®

Amore P.
AP
Overview Provided by:
I make your Online Presence shine.

Recent Data Secure Reviews

IV
Iswarya v.Enterprise (> 1000 emp.)
5.0 out of 5
"Shape your knowledge"
It is mainly used for data loss prevention and also for security information and event management. It helps companies monitor, manage and secure th...
SM
Saranya M.Mid-Market (51-1000 emp.)
4.5 out of 5
"Privacy services"
In Data secure, all the data in your account or your record is always safe and secure. It is very safe for your required data. Without your knowled...
MN
Mohideen N.Mid-Market (51-1000 emp.)
4.5 out of 5
"Privacy Automation Service"
* It's best to secure the Digital Information from Unauthorised access. *It is the process of safeguarding Digital information through its life cy...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Data Secure Media

Answer a few questions to help the Data Secure community
Have you used Data Secure before?
Yes

3 out of 4 Total Reviews for Data Secure

4.6 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
3 out of 4 Total Reviews for Data Secure
4.6 out of 5
3 out of 4 Total Reviews for Data Secure
4.6 out of 5
G2 reviews are authentic and verified.
SM
Trainee programmer
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Data Secure?

In Data secure, all the data in your account or your record is always safe and secure. It is very safe for your required data. Without your knowledge, the data will not be accessed. We can able secure your data from deletion. Review collected by and hosted on G2.com.

What do you dislike about Data Secure?

The main dislike is poor data protection and unauthorized process of data. The main thing is that the data quickly gets slow when the connection is incorrect. This is the main dislike of data security. Review collected by and hosted on G2.com.

What problems is Data Secure solving and how is that benefiting you?

In data secure solving, the main problem is the corruption of data. The benefit of data security is used for better business management and helps secure the data from hackers. Review collected by and hosted on G2.com.

MN
Software Trainee
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Data Secure?

* It's best to secure the Digital Information from Unauthorised access.

*It is the process of safeguarding Digital information through its life cycle. Review collected by and hosted on G2.com.

What do you dislike about Data Secure?

*The security functions do not understand the development. Review collected by and hosted on G2.com.

What problems is Data Secure solving and how is that benefiting you?

The first 32 bytes date of the file is not from the bank account; it is not a socially secured number either. In that case, it is helpful to over come the problem. Review collected by and hosted on G2.com.

EI
Paving advisor
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about Data Secure?

The ebook they provided allows for easy follow along instructions and being able to teach content after to fellow coworkers Review collected by and hosted on G2.com.

What do you dislike about Data Secure?

I am still getting into it so nothing at this point Review collected by and hosted on G2.com.

What problems is Data Secure solving and how is that benefiting you?

Innovation in problem solving with data security. There is always the possiblity of data being unsecure. Review collected by and hosted on G2.com.

There are not enough reviews of Data Secure for G2 to provide buying insight. Below are some alternatives with more reviews:

1
LiveRamp Logo
LiveRamp
4.2
(108)
Data Onboarding connects customer data to digital marketing applications and media platforms.
2
Salesforce Shield Logo
Salesforce Shield
4.5
(82)
Salesforce Security and Privacy offers a powerful set of tools for any customer who needs an extra level of control to meet internal or regulatory compliance requirements.
3
Satori Data Security Platform Logo
Satori Data Security Platform
4.8
(74)
The Satori Data Security Platform is a highly-available and transparent proxy service that sits in front of your data stores (databases, data warehouses and data lakes).
4
Oracle Data Safe Logo
Oracle Data Safe
4.3
(63)
Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database or Oracle Database Cloud Service (Exadata, Virtual Machine, or Bare Metal), Data Safe delivers essential data security capabilities as a service on Oracle Cloud Infrastructure.
5
Clonetab Logo
Clonetab
4.4
(47)
Clonetab provides cloning and refresh of Oracle E-Business Suite and Oracle Database.
6
Informatica Data Security Cloud Logo
Informatica Data Security Cloud
4.0
(47)
7
VGS Platform Logo
VGS Platform
4.7
(47)
VGS is the modern approach to data security. Its SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it.
8
Tonic.ai Logo
Tonic.ai
4.2
(35)
Tonic.ai is a synthetic data generator with one goal in mind: allowing you to make full use of your data, in full respect of your customers, collaborators, and the law. Our platform's data generation, de-identification, and subsetting tools help you streamline your workflows, decrease outages, and iterate faster without putting any real data at risk. Using pre-trained models and feature extraction, Tonic preserves the constraints, statistical correlations, distributions, and interdependencies that make your data unique. Accelerate your development cycle while advancing data security with synthetic data that looks, acts, and feels as real as its source.
9
Accelario Logo
Accelario
4.8
(26)
At Accelario we focus on one thing: streamlining the way data is moved and managed across platforms and environments.
10
CA Test Data Manager Logo
CA Test Data Manager
4.0
(21)
CA Test Data Manager uniquely combines elements of data subsetting, masking, synthetic, cloning and on-demand data generation to enable testing teams to meet the agile testing needs of their organization. This solution automates one of the most time-consuming and resource-intensive problems in Continuous Delivery: the creating, maintaining and provisioning of the test data needed to rigorously test evolving applications.
Show More