Ketch Features
What are the features of Ketch?
Functionality
- Identity Verification
- Consent management
- Identity Verification
- Workflow
- DSAR Portal
- Reporting and logs
- Dashboard
- Reporting
- Integrations
- End-user management
- Audit trails
- APIs
- Mobile SDK
- Customizable design
- Server-side storage
Ketch Categories on G2
Filter for Features
Functionality
Data Subject Access Requests | Data Subject Access Request (DSAR) functionality helps companies comply with user access and deletion requests. This feature was mentioned in 13 Ketch reviews. | 86% (Based on 13 reviews) | |
Identity Verification | As reported in 28 Ketch reviews. Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. | 83% (Based on 28 reviews) | |
Privacy Impact Assessments | As reported in 14 Ketch reviews. Privacy Impact Assessment (PIA) features help companies evalute, assess, track and report on the privacy implications of their data. | 76% (Based on 14 reviews) | |
Data Mapping - survey-based | As reported in 13 Ketch reviews. Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through manual surveys sent to company employees. | 72% (Based on 13 reviews) | |
Data Mapping - automated | Based on 14 Ketch reviews. Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through automated machine learning. | 74% (Based on 14 reviews) | |
Data Discovery | As reported in 14 Ketch reviews. Data discovery features collect and aggregate data from a variety of sources and prepares it in formats that both people and software can easily use it to then run analytics. | 77% (Based on 14 reviews) | |
Data Classification | As reported in 13 Ketch reviews. Data classification features tag the discovered data to make it easy to search, find, retrieve, and track. | 69% (Based on 13 reviews) | |
De-identification/pseudonymization | As reported in 13 Ketch reviews. De-identification or pseudonymization features replace personally identifiable information with artificial identifiers, or pseudonyms to comply with privacy regulations. | 79% (Based on 13 reviews) | |
Consent management | As reported in 15 Ketch reviews. Consent management features help companies obtain and manage user consent when collecting, sharing, buying, or selling a user's data. | 86% (Based on 15 reviews) | |
Website tracking scanning | Website tracking scanning features help companies understand what cookies, beacons, and other trackers are on their websites. 14 reviewers of Ketch have provided feedback on this feature. | 76% (Based on 14 reviews) | |
Data access governance | As reported in 13 Ketch reviews. Data Access Governance functionality helps limit the number of people who have access to data unless they are permissioned to do so. | 82% (Based on 13 reviews) | |
Identity Verification | Based on 28 Ketch reviews. Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. | 83% (Based on 28 reviews) | |
Workflow | Offers workflows to process Data Subject Access Requests to enable multiple departments to assist when complying with user access and deletion requests. 21 reviewers of Ketch have provided feedback on this feature. | 91% (Based on 21 reviews) | |
DSAR Portal | Offers a user-facing portal for data subjects to request access to their data. 21 reviewers of Ketch have provided feedback on this feature. | 91% (Based on 21 reviews) | |
Reporting and logs | Has reporting and log functionality to prove that companies are in compliance with mandated response time, per privacy laws such as GDPR, CCPA, and others. 21 reviewers of Ketch have provided feedback on this feature. | 88% (Based on 21 reviews) | |
Centralized platform | Has a centralized view of PIA software functions, such as tracking, templates, and reporting | Not enough data | |
Tracking | Offers tracking functionality to manage privacy impact assessments during its lifecycle | Not enough data | |
Templates | Offers assessment templates which can be customized to meet business needs | Not enough data | |
Workflow | Offers workflows to enable multiple departments to collaborate on privacy impact assessments. | Not enough data | |
Reporting and analytics | Has reporting and analytics functionality to highlight risks and compare analyses. | Not enough data | |
Dashboard | Offers a dashboard to capture, store, and manage granular user consents 48 reviewers of Ketch have provided feedback on this feature. | 83% (Based on 48 reviews) | |
Reporting | Provide reporting functions showing granular data to demonstrate compliance to regulators 45 reviewers of Ketch have provided feedback on this feature. | 81% (Based on 45 reviews) | |
Integrations | Integrates with marketing software and other analytical tools 46 reviewers of Ketch have provided feedback on this feature. | 78% (Based on 46 reviews) | |
End-user management | Allows end-users to manage their preferences online 47 reviewers of Ketch have provided feedback on this feature. | 85% (Based on 47 reviews) | |
Audit trails | Shows audit trails of how user consent preferences have changed 43 reviewers of Ketch have provided feedback on this feature. | 82% (Based on 43 reviews) | |
APIs | Offers APIs to link to your data 42 reviewers of Ketch have provided feedback on this feature. | 79% (Based on 42 reviews) | |
Mobile SDK | Offers a mobile SDK to use consent management tools on mobile apps This feature was mentioned in 33 Ketch reviews. | 72% (Based on 33 reviews) | |
Customizable design | Based on 42 Ketch reviews. Offers customizeable designs to match corporate branding | 84% (Based on 42 reviews) | |
Server-side storage | Based on 35 Ketch reviews. Offers server-side storage of consent, not client-side, for compliance reporting purposes | 78% (Based on 35 reviews) | |
Auto scans | Automatically scan websites to identify web trackers, such as cookies | Not enough data | |
Auto privacy policy update | Automatically updates privacy policies based on scans | Not enough data | |
Cookie notice report | Generates a Cookie Notice report | Not enough data | |
Easy installation | Easy to install on existing websites with simple code | Not enough data | |
Reporting | Regularly sends scan reports to stakeholders | Not enough data | |
Structure type | Searches structured, semi-structured, and unstructured data for sensitive data. | Not enough data | |
Contextual search | Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. | Not enough data | |
Template algorithms | Has template rules and pattern matching algorithms (PII, PCI, PHI and more) | Not enough data | |
Custom algorithms | Offers the option to create custom templates and rules based on department, user type and data type. | Not enough data | |
False-positive management | Offers false-positive management functions | Not enough data | |
Multiple file and location types | Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) | Not enough data | |
Real-time monitoring | Monitors data stores in real-time searching for newly created sensitive data. | Not enough data | |
Dashboard | Offers a dashboard showing specific location of sensitive data. | Not enough data | |
Compliance | Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. | Not enough data | |
Reporting | Offers reporting functionality. | Not enough data |