Best Software for 2025 is now live!
Save to My Lists
Paid
Claimed
Optimized for quick response

Ketch Features

What are the features of Ketch?

Functionality

  • Identity Verification
  • Consent management
  • Identity Verification
  • Workflow
  • DSAR Portal
  • Reporting and logs
  • Dashboard
  • Reporting
  • Integrations
  • End-user management
  • Audit trails
  • APIs
  • Mobile SDK
  • Customizable design
  • Server-side storage

Filter for Features

Functionality

Data Subject Access Requests

Data Subject Access Request (DSAR) functionality helps companies comply with user access and deletion requests. This feature was mentioned in 13 Ketch reviews.
86%
(Based on 13 reviews)

Identity Verification

As reported in 28 Ketch reviews. Identity verification functionality validates a person's identity prior to a company complying with a data subject access request.
83%
(Based on 28 reviews)

Privacy Impact Assessments

As reported in 14 Ketch reviews. Privacy Impact Assessment (PIA) features help companies evalute, assess, track and report on the privacy implications of their data.
76%
(Based on 14 reviews)

Data Mapping - survey-based

As reported in 13 Ketch reviews. Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through manual surveys sent to company employees.
72%
(Based on 13 reviews)

Data Mapping - automated

Based on 14 Ketch reviews. Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through automated machine learning.
74%
(Based on 14 reviews)

Data Discovery

As reported in 14 Ketch reviews. Data discovery features collect and aggregate data from a variety of sources and prepares it in formats that both people and software can easily use it to then run analytics.
77%
(Based on 14 reviews)

Data Classification

As reported in 13 Ketch reviews. Data classification features tag the discovered data to make it easy to search, find, retrieve, and track.
69%
(Based on 13 reviews)

De-identification/pseudonymization

As reported in 13 Ketch reviews. De-identification or pseudonymization features replace personally identifiable information with artificial identifiers, or pseudonyms to comply with privacy regulations.
79%
(Based on 13 reviews)

Consent management

As reported in 15 Ketch reviews. Consent management features help companies obtain and manage user consent when collecting, sharing, buying, or selling a user's data.
86%
(Based on 15 reviews)

Website tracking scanning

Website tracking scanning features help companies understand what cookies, beacons, and other trackers are on their websites. 14 reviewers of Ketch have provided feedback on this feature.
76%
(Based on 14 reviews)

Data access governance

As reported in 13 Ketch reviews. Data Access Governance functionality helps limit the number of people who have access to data unless they are permissioned to do so.
82%
(Based on 13 reviews)

Identity Verification

Based on 28 Ketch reviews. Identity verification functionality validates a person's identity prior to a company complying with a data subject access request.
83%
(Based on 28 reviews)

Workflow

Offers workflows to process Data Subject Access Requests to enable multiple departments to assist when complying with user access and deletion requests. 21 reviewers of Ketch have provided feedback on this feature.
91%
(Based on 21 reviews)

DSAR Portal

Offers a user-facing portal for data subjects to request access to their data. 21 reviewers of Ketch have provided feedback on this feature.
91%
(Based on 21 reviews)

Reporting and logs

Has reporting and log functionality to prove that companies are in compliance with mandated response time, per privacy laws such as GDPR, CCPA, and others. 21 reviewers of Ketch have provided feedback on this feature.
88%
(Based on 21 reviews)

Centralized platform

Has a centralized view of PIA software functions, such as tracking, templates, and reporting

Not enough data

Tracking

Offers tracking functionality to manage privacy impact assessments during its lifecycle

Not enough data

Templates

Offers assessment templates which can be customized to meet business needs

Not enough data

Workflow

Offers workflows to enable multiple departments to collaborate on privacy impact assessments.

Not enough data

Reporting and analytics

Has reporting and analytics functionality to highlight risks and compare analyses.

Not enough data

Dashboard

Offers a dashboard to capture, store, and manage granular user consents 48 reviewers of Ketch have provided feedback on this feature.
83%
(Based on 48 reviews)

Reporting

Provide reporting functions showing granular data to demonstrate compliance to regulators 45 reviewers of Ketch have provided feedback on this feature.
81%
(Based on 45 reviews)

Integrations

Integrates with marketing software and other analytical tools 46 reviewers of Ketch have provided feedback on this feature.
78%
(Based on 46 reviews)

End-user management

Allows end-users to manage their preferences online 47 reviewers of Ketch have provided feedback on this feature.
85%
(Based on 47 reviews)

Audit trails

Shows audit trails of how user consent preferences have changed 43 reviewers of Ketch have provided feedback on this feature.
82%
(Based on 43 reviews)

APIs

Offers APIs to link to your data 42 reviewers of Ketch have provided feedback on this feature.
79%
(Based on 42 reviews)

Mobile SDK

Offers a mobile SDK to use consent management tools on mobile apps This feature was mentioned in 33 Ketch reviews.
72%
(Based on 33 reviews)

Customizable design

Based on 42 Ketch reviews. Offers customizeable designs to match corporate branding
84%
(Based on 42 reviews)

Server-side storage

Based on 35 Ketch reviews. Offers server-side storage of consent, not client-side, for compliance reporting purposes
78%
(Based on 35 reviews)

Auto scans

Automatically scan websites to identify web trackers, such as cookies

Not enough data

Auto privacy policy update

Automatically updates privacy policies based on scans

Not enough data

Cookie notice report

Generates a Cookie Notice report

Not enough data

Easy installation

Easy to install on existing websites with simple code

Not enough data

Reporting

Regularly sends scan reports to stakeholders

Not enough data

Structure type

Searches structured, semi-structured, and unstructured data for sensitive data.

Not enough data

Contextual search

Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata.

Not enough data

Template algorithms

Has template rules and pattern matching algorithms (PII, PCI, PHI and more)

Not enough data

Custom algorithms

Offers the option to create custom templates and rules based on department, user type and data type.

Not enough data

False-positive management

Offers false-positive management functions

Not enough data

Multiple file and location types

Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.)

Not enough data

Real-time monitoring

Monitors data stores in real-time searching for newly created sensitive data.

Not enough data

Dashboard

Offers a dashboard showing specific location of sensitive data.

Not enough data

Compliance

Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others.

Not enough data

Reporting

Offers reporting functionality.

Not enough data