About
Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications.
|
About
Oracle NoSQL Database is designed to handle high-volume, high-velocity data applications requiring low-latency responses and flexible data models. It supports JSON, table, and key-value data types, and operates both on-premise and as a cloud service. The database scales elastically to meet dynamic workloads and provides distributed data storage across multiple shards, ensuring high availability and rapid failover. It includes Python, Node.js, Java, C, C#, and REST API drivers for easy application development. Additionally, it integrates with Oracle products such as IoT, Golden Gate, and Fusion Middleware. Oracle NoSQL Database Cloud Service is a fully managed service, freeing developers from backend infrastructure management. Oracle NoSQL Database Cloud Service is a fully managed database service for developers who want to focus on application development without dealing with the hassle of managing the back-end hardware and software infrastructure.
|
About
Automating privacy with secure redaction for document distribution. Rectify leverages privacy-enabled artificial intelligence to automate the removal of private information when data sharing occurs. We help organizations decrease the human involvement required to identify and remove consumer identities, trade secrets, IP and other private data in data sets that are being sent to third parties. Our experts have protected tens of millions of pages, and counting. Automating data protection with "privacy-enabled AI" deidentification. Break free from manual redaction with Rectify's secure AI redaction. The consequences of sharing sensitive information without using a secure redaction tool can be daunting. Rectify provides a complete end-to-end solution for your redaction needs. Choosing the right redaction service is crucial to the security and privacy of your business. Automate privacy with Rectify's secure redaction.
|
About
Transform compliance timescales with unrivaled, automated redaction for video and audio. Intelligent, intuitive editing tools to cater to all redaction needs. Automatically blur faces, license plates, audio, and other PII in recorded and live video. From CCTV, body-worn, dash cam footage, and more, automatically blur personal data in the video to quickly manage DSARs, FOIRs, and ROA requests, incidents, or for wider sharing. Across transport, healthcare, warehousing, or more, integrate live video anonymization for wider access to security video, to generate real-time alerts, or to gather high-quality video analytics metadata. Across retail, manufacturing, transport, and more, overlay alerts and analytics onto anonymized live video to unlock secure, privacy-compliant capabilities. Flexible deployment for each customer’s small-scale, tailored, or enterprise needs. Accessible via SaaS, APIs, or customer cloud.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Companies that want to stop attackers from bypassing the database and reading sensitive information
|
Audience
Developers and businesses needing a solutions to manage their applications
|
Audience
Businesses or individuals who need a secure AI redaction solution to automate the removal of private information in data exchanges
|
Audience
Organizations looking for a solution to blur faces in recorded and live video
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$49.99 per user per month
Free Version
Free Trial
|
Pricing
$299 per month
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationOracle
Founded: 1977
United States
www.oracle.com/security/database-security/advanced-security/
|
Company InformationOracle
Founded: 1977
United States
www.oracle.com/database/nosql/technologies/nosql/
|
Company InformationRectify
Founded: 2000
United States
www.rectifydata.com
|
Company InformationSecureRedact
Founded: 2017
United Kingdom
www.secureredact.ai/
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
||||||
|
|
|
|
||||
|
|
|
|||||
Categories |
Categories |
Categories |
Categories |
|||
Integrations
Adobe Acrobat
Amazon Web Services (AWS)
C
C#
Cisco CX Cloud
Cisco Meraki
Cisco Multicloud Defense
Eagle Eye Networks
JSON
Java
|
Integrations
Adobe Acrobat
Amazon Web Services (AWS)
C
C#
Cisco CX Cloud
Cisco Meraki
Cisco Multicloud Defense
Eagle Eye Networks
JSON
Java
|
Integrations
Adobe Acrobat
Amazon Web Services (AWS)
C
C#
Cisco CX Cloud
Cisco Meraki
Cisco Multicloud Defense
Eagle Eye Networks
JSON
Java
|
Integrations
Adobe Acrobat
Amazon Web Services (AWS)
C
C#
Cisco CX Cloud
Cisco Meraki
Cisco Multicloud Defense
Eagle Eye Networks
JSON
Java
|
|||
|
|
|
|
|