Skip to main content
TrustRadius
DataStealth

DataStealth

Overview

What is DataStealth?

DataStealth is a data protection platform offered by DataStealth Inc. According to the vendor, the platform allows organizations to discover, classify, and protect their most sensitive data and documents. It aims to ensure that sensitive data and documents are secure and compliant with privacy, regulatory,...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Data Loss Prevention Software

Be the first one in your network to review DataStealth, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is MX Layer?

MX Layer is an enterprise security company based in the United States, focusing on providing cloud-based solutions for email security, business continuity, data loss prevention and email archiving services. MX Layer aims to ensure that their comprehensive email security platform protects company's…

What is Rewind Backups?

Rewind from Third Blink Software in Ontario (dba Rewind) is a service that protects the data that is driving your ecommerce and small to midsize businesses, focusing on backing up data that lives in the cloud – specifically in apps like Shopify, BigCommerce, and QuickBooks Online.

Return to navigation

Product Details

What is DataStealth?

DataStealth is a data protection platform offered by DataStealth Inc. According to the vendor, the platform allows organizations to discover, classify, and protect their most sensitive data and documents. It aims to ensure that sensitive data and documents are secure and compliant with privacy, regulatory, governance, and compliance requirements. DataStealth is designed for enterprise organizations of all sizes and is utilized by professionals in various industries, including cybersecurity professionals, IT professionals, compliance officers, risk management professionals, and the financial services industry.

DataStealth Platform: According to the vendor, the platform is built on patented technology and provides comprehensive discovery, classification, and protection of sensitive data and documents. It is deployed as a protocol and payload aware network appliance and aims to ensure compliance with privacy, regulatory, governance, and compliance requirements.

DataStealth PCI: The vendor claims that this feature reduces the scope of PCI Compliance audit and keeps payment card data out of the environment. It specifically addresses PCI DSS 4.0 requirements and tokenizes data, eliminating the need to handle PAN data.

DataStealth DDC (Data Discovery & Classification): According to the vendor, this feature enables organizations to find known and unknown data sources and classify data with virtually no false positives. It searches for structured and unstructured data, utilizing patented DataStealth technology for a robust solution.

DataStealth TDM (Test Data Management): The vendor states that this feature allows organizations to create high fidelity production-like test data and minimize the risk of exposing production information in non-production environments. It applies business and referentially-aware subsetting and supports deployment in-cloud or on-premises.

Dynamic Data Masking: According to the vendor, this feature obscures sensitive data in real-time with substitute values without changing the underlying data structure. It can be applied to various data types and formats and provides real-time access controls to mask and protect sensitive data.

Data Protection Choices: The vendor claims that DataStealth offers multiple data protection choices. Tokenization substitutes sensitive information with secure, non-sensitive tokens, encryption mathematically transforms sensitive information using encryption algorithms, and masking obscures sensitive data in real-time with substitute values like asterisks or random characters.

DataStealth Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsUnspecified
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation