Best Data Privacy Management Software for Linux of 2025

Find and compare the best Data Privacy Management software for Linux in 2025

Use the comparison tool below to compare the top Data Privacy Management software for Linux on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Windocks Reviews

    Windocks

    Windocks

    $799/month
    6 Ratings
    See Software
    Learn More
    Windocks provides on-demand Oracle, SQL Server, as well as other databases that can be customized for Dev, Test, Reporting, ML, DevOps, and DevOps. Windocks database orchestration allows for code-free end to end automated delivery. This includes masking, synthetic data, Git operations and access controls, as well as secrets management. Databases can be delivered to conventional instances, Kubernetes or Docker containers. Windocks can be installed on standard Linux or Windows servers in minutes. It can also run on any public cloud infrastructure or on-premise infrastructure. One VM can host up 50 concurrent database environments. When combined with Docker containers, enterprises often see a 5:1 reduction of lower-level database VMs.
  • 2
    MyChat Reviews

    MyChat

    Network Software Solutions

    $6/per user/one-time
    3 Ratings
    Secure instant messaging system that works over local networks and the Internet. Collaboration tools for employee engagement.
  • 3
    Captain Compliance Reviews
    Top Pick

    Captain Compliance

    Captain Compliance

    $40 per month
    11 Ratings
    Captain Compliance is a privacy management platform that simplifies compliance with global data protection legislation and new AI regulatory requirements. Our Consent Management Platform allows businesses to easily manage user consent, and create customized cookie banners. Our advanced Cookie Scanner automatically detects and categorizes all cookies on your site, ensuring compliance with a dynamic policy. Our DSAR Portal streamlines requests from data subjects, while our AI Compliance Tool monitors and adapts to evolving regulations. We even offer a virtual DPO or CPO if data privacy guidance is needed. Our Hosted Privacy Policy Generator automatically updates your privacy policies in real-time to ensure that they are always up-to date with the latest legal requirements. Captain Compliance offers you the tools to maintain regulatory compliance and protect user data at an affordable price.
  • 4
    consentmanager Reviews

    consentmanager

    consentmanager AB

    €19 per month
    2 Ratings
    consentmanager customers often have higher acceptance rates and lower bounce rates. This is important for your business: A high cookie acceptance rate allows you to realise the full potential of your website, and consentmanager offers a solution that gives you a complete overview of what is happening on your website and how visitors are interacting with your cookie consent layer. Our cookie consent platform allows you to test multiple consent layers simultaneously and optimise the one that delivers the best results using intelligent A/B testing, machine learning and staging. With over 10 years of adtech experience and support for over 30 languages, compatible with 2500 tools, you can find the perfect package for your business from the different options we offer.
  • 5
    RiskWatch Reviews

    RiskWatch

    RiskWatch

    $99/month/user
    1 Rating
    RiskWatch compliance management solutions and risk assessment use a survey-based process. A series of questions about an asset are asked and a score calculated based on the responses. You can combine the survey score with additional metrics to value the asset, rate its likelihood, and assess its impact. Based on survey results, assign tasks and manage remediation. Identify the risk factors for each asset you evaluate. Receive notifications for non-compliance to your custom requirements and any relevant standards/regulations.
  • 6
    OvalEdge Reviews

    OvalEdge

    OvalEdge

    $1,300/month
    1 Rating
    OvalEdge, a cost-effective data catalogue, is designed to provide end-to-end data governance and privacy compliance. It also provides fast, reliable analytics. OvalEdge crawls the databases, BI platforms and data lakes of your organization to create an easy-to use, smart inventory. Analysts can quickly discover data and provide powerful insights using OvalEdge. OvalEdge's extensive functionality allows users to improve data access, data literacy and data quality.
  • 7
    Statice Reviews

    Statice

    Statice

    Licence starting at 3,990€ / m
    Statice is a data anonymization tool that draws on the most recent data privacy research. It processes sensitive data to create anonymous synthetic datasets that retain all the statistical properties of the original data. Statice's solution was designed for enterprise environments that are flexible and secure. It incorporates features that guarantee privacy and utility of data while maintaining usability.
  • 8
    Databunker Reviews
    Databunker is a lightning-fast, open-source vault developed in Go for secure storage of sensitive personal records. Protect user records from SQL and GraphQL injections with a simple API. Streamline GDPR, HIPAA, ISO 27001, and SOC2 compliance. Databunker is a special secure storage system designed to protect: - Personally Identifiable Information (PII) - Protected Health Information (PHI) - Payment Card Industry (PCI) data - Know Your Customer (KYC) records Databunker introduces a new approach to customer data protection: - Secure Indexing: Utilizes hash-based indexing for all search indexes - No Clear Text Storage: Ensures all information is encrypted, enhancing overall security - Restricted Bulk Retrieval: Bulk retrieval is disabled by default, adding an extra layer of defense - API-Based Communication: Backend interacts with Databunker through API calls, similar to NoSQL solutions - Record Token: Databunker creates a secured version of your data object - an object UUID token that is safe to use in your database
  • 9
    MANTA Reviews
    Manta is a unified data lineage platform that serves as the central hub of all enterprise data flows. Manta can construct lineage from report definitions, custom SQL code, and ETL workflows. Lineage is analyzed based on actual code, and both direct and indirect flows can be visualized on the map. Data paths between files, report fields, database tables, and individual columns are displayed to users in an intuitive user interface, enabling teams to understand data flows in context.
  • 10
    Data Rover Reviews
    Data Rover is an Advanced User Data and Security Management for any Data-Driven Organisation. A single solution for Infrastructure and Security managers that allows data users to explore, manage, process, and protect their data effectively and efficiently, by simultaneously addressing the two primary needs related to the use of data: Cyber Security and Data Management. Data Rover plays a key role in business asset protection and corporate data management policy definition. The software is designed for companies that need to ensure compliance with personal data protection regulations and provides detailed analysis of data access permissions. User Access Rights & Auditing Provides invaluable information about access privileges to files and folders. It allows you to analyse the effective permissions of the users, i.e. the real ones. It identifies not only who can access data, but also who did exactly what, when, and from where. Data Housekeeping Helps you identify and distinguish valuable assets from junk information that becomes unnecessary ballast and an unjustified cost to the company. Data Exchange Provides the company with an advanced data exchange and tracking system exclusively designed for the business.
  • 11
    MinerEye DataTracker Reviews

    MinerEye DataTracker

    MinerEye

    $2000/1TB/month
    MinerEye's DataTracker helps organizations overcome the information governance/protection challenge. It automatically scans, indexes and analyzes all unstructured and dark data in an organization's data repository. The solution uses proprietary Interpretive AI™, computer vision, and machine learning to locate relevant files from the billions of stored data. It automatically sends out alerts with the next best action recommendations in case of conflicts, duplicates, or potential violations. This allows data protection to be greatly enhanced and operational costs reduced.
  • 12
    JANUSEC Privacy Reviews
    JANUSEC Privacy offers a comprehensive accountability framework along with on-premise IT solutions designed for governance in privacy compliance, which encompasses various aspects such as records of processing activities, privacy impact assessments, asset security evaluations, and control measures, all aimed at supporting organizations in proving their adherence to privacy regulations like GDPR and CCPA. This includes the essential Records of Processing Activities as outlined in GDPR Article 30 and the requirement for Privacy Impact Assessments or Data Protection Impact Assessments as stated in GDPR Article 35. Additionally, the framework facilitates effective data classification, further enabling organizations to showcase their commitment to privacy compliance and accountability as mandated by GDPR Article 5, thereby ensuring robust governance in the realm of data protection. By implementing these solutions, enterprises can better navigate the complexities of privacy regulations and enhance their operational transparency in handling personal data.
  • 13
    Pryv.io Reviews
    Software for Privacy and Personal Data Management - A ready-to use solution for consent management and personal data. Pryv.io provides a solid foundation upon which to build your digital health solution. It allows you to collect, store and share personal data, as well as rightfully use it. - Maintained, developed and maintained by Pryv. Features - Pryv.io core system is available for production - User registration and authentication Granular consent-based access control rights - Data model for privacy, aggregation, and sharing - Complete data life-cycle: Collect - Store - Change - Delete - REST & Socket.io API Software integration and configuration made easy - Interoperability and seamless connectivity
  • 14
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 15
    BigID Reviews
    Data visibility and control for security, compliance, privacy, and governance. BigID's platform includes a foundational data discovery platform combining data classification and cataloging for finding personal, sensitive and high value data - plus a modular array of add on apps for solving discrete problems in privacy, security and governance. Automate scans, discovery, classification, workflows, and more on the data you need - and find all PI, PII, sensitive, and critical data across unstructured and structured data, on-prem and in the cloud. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores.
  • 16
    PrivacyCenter.cloud Reviews
    PrivacyCenter.cloud offers a comprehensive platform designed to allow users to establish a complete privacy center swiftly, thereby automating essential privacy operations. Additionally, this tool assists in overseeing various aspects such as privacy notices, third-party cookie consents, user preferences, requests related to individual rights, as well as managing settings for Do Not Sell and Do Not Track signals. By streamlining these processes, it empowers organizations to enhance their compliance and transparency regarding user privacy.
  • 17
    Redact Reviews

    Redact

    Redact.dev

    $34.99
    Redact enables both individuals and organizations to efficiently and securely automate the elimination of their user-generated content from almost all prominent platforms. Enhance your privacy and security through intelligent deletion, keyword scanning, and thorough content removal. Download Redact now to gain command over your digital presence. Committed to prioritizing privacy, Redact operates with a focus on safeguarding your information. In a world where digital footprints can linger, taking proactive steps to protect your personal data is more important than ever.
  • 18
    Delphix Reviews
    Delphix is the industry leader for DataOps. It provides an intelligent data platform that accelerates digital change for leading companies around world. The Delphix DataOps Platform supports many systems, including mainframes, Oracle databases, ERP apps, and Kubernetes container. Delphix supports a wide range of data operations that enable modern CI/CD workflows. It also automates data compliance with privacy regulations such as GDPR, CCPA and the New York Privacy Act. Delphix also helps companies to sync data between private and public clouds, accelerating cloud migrations and customer experience transformations, as well as the adoption of disruptive AI technologies.
  • 19
    Auditrunner Reviews

    Auditrunner

    Auditrunner

    $850/month
    Secure Audit, Risk, Compliance, Quality Software. Available in both Cloud-based and On-Premise deployment options. Auditrunner provides granular encryption and role-based access controls for audit files and documents-at-rest. All data is protected. Our platform has automated over 3000 business processes for companies around the globe. These are just a few examples of the GRC platform modules. Cloud-based and On-Premise. Just deploy and begin using. The platform's seamless integration allows you to start enjoying the benefits within weeks of launch. The platform's low-code design allows for customization and compliance with any standard or regulation. You can operate in a fast-moving, constantly changing regulatory environment and comply instantly with a multitude of different legislation without assistance. Our ease of use is unmatched.
  • 20
    IBM InfoSphere Optim Data Privacy Reviews
    IBM InfoSphere® Optim™ Data Privacy offers a comprehensive suite of tools designed to effectively mask sensitive information in non-production settings like development, testing, quality assurance, or training. This singular solution employs various transformation methods to replace sensitive data with realistic, fully functional masked alternatives, ensuring the confidentiality of critical information. Techniques for masking include using substrings, arithmetic expressions, generating random or sequential numbers, manipulating dates, and concatenating data elements. The advanced masking capabilities maintain contextually appropriate formats that closely resemble the original data. Users can apply an array of masking techniques on demand to safeguard personally identifiable information and sensitive corporate data within applications, databases, and reports. By utilizing these data masking features, organizations can mitigate the risk of data misuse by obscuring, privatizing, and protecting personal information circulated in non-production environments, thereby enhancing data security and compliance. Ultimately, this solution empowers businesses to navigate privacy challenges while maintaining the integrity of their operational processes.
  • 21
    SeaCat Reviews
    SeaCat is a comprehensive cyber-security and data privacy platform designed specifically for mobile and IoT applications, ensuring that users can build and operate their apps without encountering any cyber-security incidents. Developed by a team of experts, SeaCat includes all essential features for robust cyber-security and data privacy, enabling a seamless deployment process. With SeaCat, users can enhance their security levels immediately without the need for any custom development work. Importantly, this platform prioritizes user experience, eliminating the need for complicated configurations or procedures. SeaCat incorporates state-of-the-art security measures, including biometric authentication and hardware security modules, making it a modern choice for developers. The platform comprises three key components: the SeaCat SDK, which integrates into mobile or IoT applications; the SeaCat Gateway, which is installed in the demilitarized zone (DMZ) in front of backend servers; and the SeaCat PKI service, which facilitates enrollment, access, and identity management. By utilizing SeaCat, users can confidently protect their applications while focusing on delivering a smooth user experience.
  • 22
    Tumult Analytics Reviews
    Developed and continuously improved by a dedicated team of professionals specializing in differential privacy, this system is actively utilized by organizations such as the U.S. Census Bureau. It operates on the Spark framework, seamlessly handling input tables with billions of entries. The platform offers an extensive and expanding array of aggregation functions, data transformation operations, and privacy frameworks. Users can execute public and private joins, apply filters, or utilize custom functions on their datasets. It enables the computation of counts, sums, quantiles, and more under various privacy models, ensuring that differential privacy is accessible through straightforward tutorials and comprehensive documentation. Tumult Analytics is constructed on our advanced privacy architecture, Tumult Core, which regulates access to confidential data, ensuring that every program and application inherently includes a proof of privacy. The system is designed by integrating small, easily scrutinized components, ensuring a high level of safety through proven stability tracking and floating-point operations. Furthermore, it employs a flexible framework grounded in peer-reviewed academic research, guaranteeing that users can trust the integrity and security of their data handling processes. This commitment to transparency and security sets a new standard in the field of data privacy.
  • 23
    NMTY Enterprise Reviews
    NMTY Enterprise provides robust protection for all privacy-sensitive information within your organization, whether it resides in databases or individual files. By incorporating NMTY Enterprise into your IT framework, you can swiftly anonymize any data sources that require safeguarding. The platform allows for the anonymization of data irrespective of its storage method, be it within databases or in files like CSV and XML. Anonymization occurs directly at the source, which effectively prevents the unnecessary duplication of non-anonymized data. Furthermore, connections to your data sources are secured with integrated authentication and encryption during storage. Beyond datasets, NMTY Enterprise can also anonymize data found in documents and images directly. Our cutting-edge solutions are designed to seamlessly integrate with your existing workflows, ensuring that optimal results are consistently achieved. By choosing NMTY Enterprise, you not only enhance your data security but also streamline your data management processes.
  • 24
    PK Protect Reviews
    PK Protect is an innovative data protection platform aimed at assisting organizations in securing their sensitive information across a wide range of environments. It offers powerful tools for data discovery, classification, encryption, and monitoring, ensuring that vital data remains secure whether it is stored or transmitted. Through the implementation of automated policies and compliance measures, PK Protect supports businesses in adhering to regulatory standards such as GDPR and HIPAA, thereby lowering the chances of data breaches. The platform seamlessly integrates with various systems, providing a cohesive strategy for managing data security in cloud, on-premises, and hybrid settings. By delivering real-time insights and proactive threat detection capabilities, PK Protect empowers organizations to maintain authority over their sensitive data, effectively mitigating security risks. This comprehensive approach not only enhances data protection but also fosters trust among clients and stakeholders.
  • 25
    Nyxeia Information Governance Suite Reviews
    The Information Governance Suite is a collection of products that help organizations better discover, categorize and enhance their information assets, regardless of which system they are managed. The suite includes: -.discover which connects with information systems to index and categorize structured and unstructured information assets –.policy which allows organizations create full lifecycle policies to preserve and dispose of information - preservation and disposal near the end of an asset's lifecycle -.preserve which allows organizations to retain and dispose digital assets near the end - process which automates content-related actions such as content categorization to help record teams deal with increasing workload.
  • Previous
  • You're on page 1
  • Next