Securiti Features
What are the features of Securiti?
Functionality
- Data Subject Access Requests
- Privacy Impact Assessments
- Data Mapping - survey-based
- Data Mapping - automated
- Data Discovery
- Data Classification
- Data access governance
- DSAR Portal
- Structure type
- Contextual search
- False-positive management
- Multiple file and location types
- Dashboard
- Compliance
- Reporting
Top Rated Securiti Alternatives
Filter for Features
Administration
Data Modelling | Tools to (re)structure data in a manner that allows extracting insights quickly and accurately | Not enough data | |
Recommendations | Analyzes data to find and recommend the highest value customer segmentations. | Not enough data | |
Workflow Management | Tools to create and adjust workflows to ensure consistency. | Not enough data | |
Dashboards and Visualizations | Presents information and analytics in a digestible, intuitive, and visually appealing way. | Not enough data | |
Policy Enforcement | Allows administrators to set policies for security and data governance. | Not enough data |
Compliance
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Training and Guidelines | Provides guidelines or training related to sensitive data compliance requirements, | Not enough data | |
Policy Enforcement | Allows administrators to set policies for security and data governance | Not enough data | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse | Not enough data | |
Governance | Allows users to create, edit, and relinquish user access privileges. | Not enough data | |
Data Governance | Ensures user access management, data lineage, and data encryption. | Not enough data | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
At-Risk Analysis | Uses machine learning to identify at-risk data. | Not enough data | |
DLP Configuration | Offers data loss prevention tools to protect data from leaving the environments it is allowed to. | Not enough data |
Data Quality
Data Preparation | Curates collected data for big data analytics solutions to analyze, manipulate, and model | Not enough data | |
Data Distribution | Facilitates the disseminating of collected big data throughout parallel computing clusters | Not enough data | |
Data Unification | Compile data from across all systems so that users can view relevant information easily. | Not enough data |
Security
Compliance Monitoring | Monitors data quality and sends alerts based on violations or misuse. | Not enough data | |
Data Loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | Not enough data | |
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data | |
Access Control | Authenticates and authorizes individuals to access the data they are allowed to see and use. | Not enough data | |
Roles Management | Helps identify and manage the roles of owners and stewards of data. | Not enough data | |
Compliance Management | Helps adhere to data privacy regulations and norms. | Not enough data |
Data Protection
Sensitive Data Discovery | Includes funcationality to automatically discover and classify sensitive and other defined data. | Not enough data | |
Structured and Unstructured Data | Can protect both structured and unstructured data using automated discovery tools. | Not enough data | |
Encryption | Includes encryption methods to protect data. | Not enough data | |
Persistent Protection | Protects data at rest, in transit, and in use. | Not enough data | |
Data Masking | Provides data masking functionality that hides specific data within a dataset based on the data's specific use policies. | Not enough data | |
Data Governance and Access Management | Provides policies and access controls to ensure the data is only handled by permisssioned users and processes. | Not enough data | |
Audit and Reporting | Includes audit and reporting functions to know exactly what actions have been taken on data, such as who has accessed it and when. | Not enough data |
Usability
Visualization | Offers tools to help administrators visualize the flow of data, whether that be processes or data flows. | Not enough data | |
AI Algorithyms | Offers machine learning to locate data security risks and make recommendations on how to mitigate those risks. | Not enough data | |
Cross-Platforms | Allows data to move across multiple platform types and remain protected. | Not enough data |
Functionality
Data Subject Access Requests | As reported in 13 Securiti reviews. Data Subject Access Request (DSAR) functionality helps companies comply with user access and deletion requests. | 97% (Based on 13 reviews) | |
Identity Verification | Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. 11 reviewers of Securiti have provided feedback on this feature. | 95% (Based on 11 reviews) | |
Privacy Impact Assessments | Based on 14 Securiti reviews. Privacy Impact Assessment (PIA) features help companies evalute, assess, track and report on the privacy implications of their data. | 95% (Based on 14 reviews) | |
Data Mapping - survey-based | Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through manual surveys sent to company employees. This feature was mentioned in 12 Securiti reviews. | 94% (Based on 12 reviews) | |
Data Mapping - automated | Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through automated machine learning. 14 reviewers of Securiti have provided feedback on this feature. | 95% (Based on 14 reviews) | |
Data Discovery | Data discovery features collect and aggregate data from a variety of sources and prepares it in formats that both people and software can easily use it to then run analytics. 13 reviewers of Securiti have provided feedback on this feature. | 97% (Based on 13 reviews) | |
Data Classification | Data classification features tag the discovered data to make it easy to search, find, retrieve, and track. This feature was mentioned in 12 Securiti reviews. | 96% (Based on 12 reviews) | |
De-identification/pseudonymization | De-identification or pseudonymization features replace personally identifiable information with artificial identifiers, or pseudonyms to comply with privacy regulations. | Not enough data | |
Breach notification | Data Breach Notification features help companies automate their breach response to stakeholders. | Not enough data | |
Consent management | Consent management features help companies obtain and manage user consent when collecting, sharing, buying, or selling a user's data. 11 reviewers of Securiti have provided feedback on this feature. | 95% (Based on 11 reviews) | |
Website tracking scanning | Website tracking scanning features help companies understand what cookies, beacons, and other trackers are on their websites. This feature was mentioned in 10 Securiti reviews. | 95% (Based on 10 reviews) | |
Data access governance | Data Access Governance functionality helps limit the number of people who have access to data unless they are permissioned to do so. This feature was mentioned in 12 Securiti reviews. | 99% (Based on 12 reviews) | |
Identity Verification | Based on 11 Securiti reviews. Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. | 95% (Based on 11 reviews) | |
Workflow | Offers workflows to process Data Subject Access Requests to enable multiple departments to assist when complying with user access and deletion requests. | Not enough data | |
DSAR Portal | Offers a user-facing portal for data subjects to request access to their data. This feature was mentioned in 12 Securiti reviews. | 97% (Based on 12 reviews) | |
Reporting and logs | Has reporting and log functionality to prove that companies are in compliance with mandated response time, per privacy laws such as GDPR, CCPA, and others. This feature was mentioned in 10 Securiti reviews. | 88% (Based on 10 reviews) | |
Centralized platform | Has a centralized view of PIA software functions, such as tracking, templates, and reporting | Not enough data | |
Tracking | Offers tracking functionality to manage privacy impact assessments during its lifecycle | Not enough data | |
Templates | Offers assessment templates which can be customized to meet business needs | Not enough data | |
Workflow | Offers workflows to enable multiple departments to collaborate on privacy impact assessments. | Not enough data | |
Reporting and analytics | Has reporting and analytics functionality to highlight risks and compare analyses. | Not enough data | |
Centralized platform | Has a centralized view of data breach notification functions including any tasks that are at risk of falling behind mandated reporting timelines. | Not enough data | |
Automated response | Provides tools such as auto-discovery to assist companies in automating their breach notification response. | Not enough data | |
Breach notification law compliance | Provides functionality to help companies comply data breach notification timelines, as determined by various regulatory laws. | Not enough data | |
Workflow | Offers workflows to enable multiple departments to collaborate on data breach notification tasks | Not enough data | |
Reporting | Has reporting and analytics functionality to show compliance with data breach notification laws. | Not enough data | |
Dashboard | Offers a dashboard to capture, store, and manage granular user consents | Not enough data | |
Reporting | Provide reporting functions showing granular data to demonstrate compliance to regulators | Not enough data | |
Integrations | Integrates with marketing software and other analytical tools | Not enough data | |
End-user management | Allows end-users to manage their preferences online | Not enough data | |
Audit trails | Shows audit trails of how user consent preferences have changed | Not enough data | |
APIs | Offers APIs to link to your data | Not enough data | |
Mobile SDK | Offers a mobile SDK to use consent management tools on mobile apps | Not enough data | |
Customizable design | Offers customizeable designs to match corporate branding | Not enough data | |
Server-side storage | Offers server-side storage of consent, not client-side, for compliance reporting purposes | Not enough data | |
Auto scans | Automatically scan websites to identify web trackers, such as cookies | Not enough data | |
Auto privacy policy update | Automatically updates privacy policies based on scans | Not enough data | |
Cookie notice report | Generates a Cookie Notice report | Not enough data | |
Easy installation | Easy to install on existing websites with simple code | Not enough data | |
Reporting | Regularly sends scan reports to stakeholders | Not enough data | |
Structure type | Based on 12 Securiti reviews. Searches structured, semi-structured, and unstructured data for sensitive data. | 97% (Based on 12 reviews) | |
Contextual search | Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. This feature was mentioned in 12 Securiti reviews. | 94% (Based on 12 reviews) | |
Template algorithms | Has template rules and pattern matching algorithms (PII, PCI, PHI and more) 11 reviewers of Securiti have provided feedback on this feature. | 97% (Based on 11 reviews) | |
Custom algorithms | Offers the option to create custom templates and rules based on department, user type and data type. 11 reviewers of Securiti have provided feedback on this feature. | 94% (Based on 11 reviews) | |
False-positive management | Based on 12 Securiti reviews. Offers false-positive management functions | 92% (Based on 12 reviews) | |
Multiple file and location types | As reported in 12 Securiti reviews. Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) | 93% (Based on 12 reviews) | |
Real-time monitoring | Monitors data stores in real-time searching for newly created sensitive data. This feature was mentioned in 11 Securiti reviews. | 88% (Based on 11 reviews) | |
Dashboard | As reported in 13 Securiti reviews. Offers a dashboard showing specific location of sensitive data. | 95% (Based on 13 reviews) | |
Compliance | Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. 13 reviewers of Securiti have provided feedback on this feature. | 94% (Based on 13 reviews) | |
Reporting | Offers reporting functionality. 13 reviewers of Securiti have provided feedback on this feature. | 88% (Based on 13 reviews) | |
File Identification | Identify all files within a target business system(s). | Not enough data | |
File Indexing | Index identified files for organized, more efficient file recall. | Not enough data | |
Metadata Analysis | Analyze file metadata to identify ROT data or potential compliance violations. | Not enough data | |
File Content Analysis | Analyze file contents to identify ROT data or potential compliance violations. | Not enough data | |
Customized Vendor Pages | Allows vendors to own and update their vendor page with security and compliance documentation to share with customers | Not enough data | |
Centralized Vendor Catalog | Allows companies to assess vendors profiles in a centralized catalog | Not enough data | |
Questionnaire Templates | Offers standardized security and privacy framework questionnaire templates This feature was mentioned in 10 Securiti reviews. | 90% (Based on 10 reviews) | |
User Access Control | Offers role based access controls to allow only permissioned users to utilize various parts of the software. | Not enough data |
Management
File System Selection | Designate which file system(s) are to be analyzed. | Not enough data | |
File System Integration | Integrate with a variety of file systems, data stores, etc. | Not enough data | |
Rule Generation | Offer pre-built or custom rules for handling files identified as problematic during file analysis. | Not enough data | |
Reporting | Generate reports and/or dashboards presenting results and key findings post-analysis. | Not enough data | |
Data Classification | Classify analyzed files and/or metadata by type, sensitivity, potential concerns, etc. | Not enough data | |
Business Glossary | Lets users build a glossary of business terms, vocabulary and definitions across multiple tools. | Not enough data | |
Data Discovery | Provides a built-in integrated data catalog that allows users to easily locate data across multiple sources. | Not enough data | |
Data Profililng | Monitors and cleanses data with the help of business rules and analytical algorithms. | Not enough data | |
Reporting and Visualization | Visualize data flows and lineage that demonstrates compliance with reports and dashboards through a single console. | Not enough data | |
Data Lineage | Provides an automated data lineage functionality which provides visibility over the entire data movement journey from data origination to destination. | Not enough data |
Risk assessment
Risk Scoring | Offers built-in or automated vendor risk scoring | Not enough data | |
4th Party Assessments | Offers tools to assess fourth parties -- your vendor's vendors | Not enough data | |
Monitoring And Alerts | Monitors changes in risk and sends notifications, alerts, and reminders for specific actions including: upcoming assessments, profile access requests, etc | Not enough data |
Maintainence
Data Quality Management | Defines, validates, and monitors business rules to safeguard master data readiness. | Not enough data | |
Policy Management | Allows users to create and review data policies to make them consistent across the organization. | Not enough data |
Data management
Metadata Management | Indexes metadata descriptions for enhanced insights. | Not enough data | |
Automation Features | Ensures automation of metadata across the organization. Dynamically improves data management processes. | Not enough data | |
Collaboration | Embedded collaboration using APIs and in-app integrations. | Not enough data | |
Data Lineage | Provides insights into original data sources and transformations made to data sets from source to consumption of data. | Not enough data | |
Data Discovery | Provides an interface to collect and evaluate data to identfy patterns and outliers. | Not enough data |
Reporting
Intelligent Insights | Constantly processes metadata to provide intelligent insights. | Not enough data | |
Actionable Insights | Provides actionable insights, and generates notifications and alerts to help teams make informed decisions. | Not enough data | |
Dashboards | Supports 360 degree data visibility via a single dashboard. | Not enough data |
Generative AI
AI Text Generation | Allows users to generate text based on a text prompt. | Not enough data | |
AI Text Summarization | Condenses long documents or text into a brief summary. | Not enough data |