Transcend Features
What are the features of Transcend?
Functionality
- Data Subject Access Requests
- Identity Verification
- Data Mapping - automated
- Data Discovery
- Consent management
- Identity Verification
- Workflow
- DSAR Portal
- Reporting and logs
- Dashboard
- Reporting
- Integrations
- End-user management
- APIs
- Customizable design
Top Rated Transcend Alternatives
Transcend Categories on G2
Filter for Features
Administration
Data Modelling | Tools to (re)structure data in a manner that allows extracting insights quickly and accurately | Not enough data | |
Recommendations | Analyzes data to find and recommend the highest value customer segmentations. | Not enough data | |
Workflow Management | Tools to create and adjust workflows to ensure consistency. | Not enough data | |
Dashboards and Visualizations | Presents information and analytics in a digestible, intuitive, and visually appealing way. | Not enough data |
Compliance
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Training and Guidelines | Provides guidelines or training related to sensitive data compliance requirements, | Not enough data | |
Policy Enforcement | Allows administrators to set policies for security and data governance | Not enough data | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse This feature was mentioned in 10 Transcend reviews. | 97% (Based on 10 reviews) |
Data Quality
Data Preparation | Curates collected data for big data analytics solutions to analyze, manipulate, and model | Not enough data | |
Data Distribution | Facilitates the disseminating of collected big data throughout parallel computing clusters | Not enough data | |
Data Unification | Compile data from across all systems so that users can view relevant information easily. | Not enough data |
Functionality
Data Subject Access Requests | As reported in 38 Transcend reviews. Data Subject Access Request (DSAR) functionality helps companies comply with user access and deletion requests. | 91% (Based on 38 reviews) | |
Identity Verification | As reported in 23 Transcend reviews. Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. | 92% (Based on 23 reviews) | |
Privacy Impact Assessments | Privacy Impact Assessment (PIA) features help companies evalute, assess, track and report on the privacy implications of their data. 14 reviewers of Transcend have provided feedback on this feature. | 86% (Based on 14 reviews) | |
Data Mapping - automated | Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through automated machine learning. 18 reviewers of Transcend have provided feedback on this feature. | 88% (Based on 18 reviews) | |
Data Discovery | Based on 17 Transcend reviews. Data discovery features collect and aggregate data from a variety of sources and prepares it in formats that both people and software can easily use it to then run analytics. | 91% (Based on 17 reviews) | |
Data Classification | Data classification features tag the discovered data to make it easy to search, find, retrieve, and track. This feature was mentioned in 13 Transcend reviews. | 87% (Based on 13 reviews) | |
De-identification/pseudonymization | De-identification or pseudonymization features replace personally identifiable information with artificial identifiers, or pseudonyms to comply with privacy regulations. 12 reviewers of Transcend have provided feedback on this feature. | 89% (Based on 12 reviews) | |
Consent management | Based on 23 Transcend reviews. Consent management features help companies obtain and manage user consent when collecting, sharing, buying, or selling a user's data. | 92% (Based on 23 reviews) | |
Website tracking scanning | Website tracking scanning features help companies understand what cookies, beacons, and other trackers are on their websites. This feature was mentioned in 16 Transcend reviews. | 95% (Based on 16 reviews) | |
Data access governance | Data Access Governance functionality helps limit the number of people who have access to data unless they are permissioned to do so. This feature was mentioned in 10 Transcend reviews. | 92% (Based on 10 reviews) | |
Identity Verification | As reported in 23 Transcend reviews. Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. | 92% (Based on 23 reviews) | |
Workflow | Based on 18 Transcend reviews. Offers workflows to process Data Subject Access Requests to enable multiple departments to assist when complying with user access and deletion requests. | 92% (Based on 18 reviews) | |
DSAR Portal | Offers a user-facing portal for data subjects to request access to their data. 18 reviewers of Transcend have provided feedback on this feature. | 94% (Based on 18 reviews) | |
Reporting and logs | Has reporting and log functionality to prove that companies are in compliance with mandated response time, per privacy laws such as GDPR, CCPA, and others. This feature was mentioned in 20 Transcend reviews. | 92% (Based on 20 reviews) | |
Dashboard | As reported in 20 Transcend reviews. Offers a dashboard to capture, store, and manage granular user consents | 86% (Based on 20 reviews) | |
Reporting | As reported in 17 Transcend reviews. Provide reporting functions showing granular data to demonstrate compliance to regulators | 85% (Based on 17 reviews) | |
Integrations | As reported in 19 Transcend reviews. Integrates with marketing software and other analytical tools | 89% (Based on 19 reviews) | |
End-user management | Allows end-users to manage their preferences online 18 reviewers of Transcend have provided feedback on this feature. | 90% (Based on 18 reviews) | |
Audit trails | Shows audit trails of how user consent preferences have changed This feature was mentioned in 13 Transcend reviews. | 92% (Based on 13 reviews) | |
APIs | Offers APIs to link to your data This feature was mentioned in 17 Transcend reviews. | 89% (Based on 17 reviews) | |
Mobile SDK | Offers a mobile SDK to use consent management tools on mobile apps | Not enough data | |
Customizable design | Offers customizeable designs to match corporate branding 16 reviewers of Transcend have provided feedback on this feature. | 85% (Based on 16 reviews) | |
Server-side storage | Offers server-side storage of consent, not client-side, for compliance reporting purposes 10 reviewers of Transcend have provided feedback on this feature. | 85% (Based on 10 reviews) | |
Auto scans | Based on 10 Transcend reviews. Automatically scan websites to identify web trackers, such as cookies | 95% (Based on 10 reviews) | |
Auto privacy policy update | Automatically updates privacy policies based on scans | Not enough data | |
Cookie notice report | As reported in 10 Transcend reviews. Generates a Cookie Notice report | 95% (Based on 10 reviews) | |
Easy installation | As reported in 12 Transcend reviews. Easy to install on existing websites with simple code | 88% (Based on 12 reviews) | |
Reporting | Regularly sends scan reports to stakeholders This feature was mentioned in 11 Transcend reviews. | 92% (Based on 11 reviews) | |
Data visualisation | Creates a visual map of the data from the source to the target database for the user to see. | Not enough data | |
Process various formats | The software can process numerous type of data and formats. | Not enough data | |
No-code functionality | The software can create the data map with no use of code. This is typically done via drag-and-drop. | Not enough data | |
Data manipulation | Allows the data to be merged or executed before being mapped and transformed. | Not enough data | |
Analytics | Offers built-in analytics functionality. | Not enough data | |
Reporting | Offers reporting functionality. This feature was mentioned in 10 Transcend reviews. | 85% (Based on 10 reviews) | |
Structure type | Searches structured, semi-structured, and unstructured data for sensitive data. | Not enough data | |
Contextual search | Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. | Not enough data | |
Template algorithms | Has template rules and pattern matching algorithms (PII, PCI, PHI and more) | Not enough data | |
Custom algorithms | Offers the option to create custom templates and rules based on department, user type and data type. | Not enough data | |
False-positive management | Offers false-positive management functions | Not enough data | |
Multiple file and location types | Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) | Not enough data | |
Real-time monitoring | Monitors data stores in real-time searching for newly created sensitive data. | Not enough data | |
Dashboard | Offers a dashboard showing specific location of sensitive data. | Not enough data | |
Compliance | Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. | Not enough data | |
Reporting | Offers reporting functionality. | Not enough data |
Management
Business Glossary | Lets users build a glossary of business terms, vocabulary and definitions across multiple tools. | Not enough data | |
Data Discovery | Provides a built-in integrated data catalog that allows users to easily locate data across multiple sources. | Not enough data | |
Data Profililng | Monitors and cleanses data with the help of business rules and analytical algorithms. | Not enough data | |
Reporting and Visualization | Visualize data flows and lineage that demonstrates compliance with reports and dashboards through a single console. | Not enough data | |
Data Lineage | Provides an automated data lineage functionality which provides visibility over the entire data movement journey from data origination to destination. | Not enough data |
Security
Access Control | Authenticates and authorizes individuals to access the data they are allowed to see and use. This feature was mentioned in 11 Transcend reviews. | 95% (Based on 11 reviews) | |
Roles Management | Helps identify and manage the roles of owners and stewards of data. | Not enough data | |
Compliance Management | Helps adhere to data privacy regulations and norms. 10 reviewers of Transcend have provided feedback on this feature. | 93% (Based on 10 reviews) |
Maintainence
Data Quality Management | Defines, validates, and monitors business rules to safeguard master data readiness. | Not enough data | |
Policy Management | Allows users to create and review data policies to make them consistent across the organization. | Not enough data |