Fortra’s Data Classification Suite Features
What are the features of Fortra’s Data Classification Suite?
Compliance
- Sensitive Data Compliance
- Training and Guidelines
- Policy Enforcement
Management
- Reporting and Visualization
Security
- Compliance Management
Maintainence
- Policy Management
Top Rated Fortra’s Data Classification Suite Alternatives
Fortra’s Data Classification Suite Categories on G2
Filter for Features
Administration
Data Modelling | Tools to (re)structure data in a manner that allows extracting insights quickly and accurately | Not enough data | |
Recommendations | Analyzes data to find and recommend the highest value customer segmentations. | Not enough data | |
Workflow Management | Tools to create and adjust workflows to ensure consistency. | Not enough data | |
Dashboards and Visualizations | Presents information and analytics in a digestible, intuitive, and visually appealing way. | Not enough data | |
Data Discovery | Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. | Not enough data | |
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data |
Compliance
Sensitive Data Compliance | As reported in 10 Fortra’s Data Classification Suite reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 85% (Based on 10 reviews) | |
Training and Guidelines | Provides guidelines or training related to sensitive data compliance requirements, 10 reviewers of Fortra’s Data Classification Suite have provided feedback on this feature. | 80% (Based on 10 reviews) | |
Policy Enforcement | Allows administrators to set policies for security and data governance 10 reviewers of Fortra’s Data Classification Suite have provided feedback on this feature. | 88% (Based on 10 reviews) | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse | Not enough data | |
At-Risk Analysis | Uses machine learning to identify at-risk data. | Not enough data | |
DLP Configuration | Offers data loss prevention tools to protect data from leaving the environments it is allowed to. | Not enough data |
Data Quality
Data Preparation | Curates collected data for big data analytics solutions to analyze, manipulate, and model | Not enough data | |
Data Distribution | Facilitates the disseminating of collected big data throughout parallel computing clusters | Not enough data | |
Data Unification | Compile data from across all systems so that users can view relevant information easily. | Not enough data |
Data Protection
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. | Not enough data | |
Data Encryption/Security | Manages policies for user data access and data encryption. | Not enough data | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Sensitive Data Discovery | Includes funcationality to automatically discover and classify sensitive and other defined data. | Not enough data | |
Structured and Unstructured Data | Can protect both structured and unstructured data using automated discovery tools. | Not enough data | |
Encryption | Includes encryption methods to protect data. | Not enough data | |
Persistent Protection | Protects data at rest, in transit, and in use. | Not enough data | |
Data Masking | Provides data masking functionality that hides specific data within a dataset based on the data's specific use policies. | Not enough data | |
Data Governance and Access Management | Provides policies and access controls to ensure the data is only handled by permisssioned users and processes. | Not enough data | |
Audit and Reporting | Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when. | Not enough data |
Analysis
User Analytics | Allows for reporting and documentation of individual user behavior and privileges. | Not enough data |
Usability
Visualization | Offers tools to help administrators visualize the flow of data, whether that be processes or data flows. | Not enough data | |
AI Algorithyms | Offers machine learning to locate data security risks and make recommendations on how to mitigate those risks. | Not enough data | |
Cross-Platforms | Allows data to move across multiple platform types and remain protected. | Not enough data |
Functionality
Structure type | Searches structured, semi-structured, and unstructured data for sensitive data. | Not enough data | |
Contextual search | Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. | Not enough data | |
Template algorithms | Has template rules and pattern matching algorithms (PII, PCI, PHI and more) | Not enough data | |
Custom algorithms | Offers the option to create custom templates and rules based on department, user type and data type. | Not enough data | |
False-positive management | Offers false-positive management functions | Not enough data | |
Multiple file and location types | Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) | Not enough data | |
Real-time monitoring | Monitors data stores in real-time searching for newly created sensitive data. | Not enough data | |
Dashboard | Offers a dashboard showing specific location of sensitive data. | Not enough data | |
Compliance | Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. | Not enough data | |
Reporting | Offers reporting functionality. | Not enough data |
Management
Business Glossary | Lets users build a glossary of business terms, vocabulary and definitions across multiple tools. | Not enough data | |
Data Discovery | Provides a built-in integrated data catalog that allows users to easily locate data across multiple sources. | Not enough data | |
Data Profililng | Monitors and cleanses data with the help of business rules and analytical algorithms. | Not enough data | |
Reporting and Visualization | Visualize data flows and lineage that demonstrates compliance with reports and dashboards through a single console. This feature was mentioned in 10 Fortra’s Data Classification Suite reviews. | 80% (Based on 10 reviews) | |
Data Lineage | Provides an automated data lineage functionality which provides visibility over the entire data movement journey from data origination to destination. | Not enough data |
Security
Access Control | Authenticates and authorizes individuals to access the data they are allowed to see and use. | Not enough data | |
Roles Management | Helps identify and manage the roles of owners and stewards of data. | Not enough data | |
Compliance Management | Based on 10 Fortra’s Data Classification Suite reviews. Helps adhere to data privacy regulations and norms. | 90% (Based on 10 reviews) |
Maintainence
Data Quality Management | Defines, validates, and monitors business rules to safeguard master data readiness. | Not enough data | |
Policy Management | Allows users to create and review data policies to make them consistent across the organization. This feature was mentioned in 10 Fortra’s Data Classification Suite reviews. | 88% (Based on 10 reviews) |