Gimmal Discover vs. Informatica Cloud Data Governance, Access and Privacy

Overview
ProductRatingMost Used ByProduct SummaryStarting Price
Gimmal Discover
Score 0.0 out of 10
N/A
A software solution used to locate, classify, and manage data in order to mitigate privacy risks and protect sensitive information for regulations like CCPA and GDPR or eDiscovery requests. Gimmal Discover works with content in a variety of corporate data sources including local workstations, file shares, PST files, Exchange, SharePoint, OneDrive, Box, and Google Workspace.N/A
Informatica Cloud Data Governance, Access and Privacy
Score 7.0 out of 10
N/A
Informatica Cloud Data Governance helps to ensure data is consistent, accurate and reliable with unified cataloging, governance and quality. It automates manual tasks with AI/ML, freeing data stewards to focus on mission-critical processes.N/A
Pricing
Gimmal DiscoverInformatica Cloud Data Governance, Access and Privacy
Editions & Modules
No answers on this topic
No answers on this topic
Offerings
Pricing Offerings
Gimmal DiscoverInformatica Cloud Data Governance, Access and Privacy
Free Trial
NoNo
Free/Freemium Version
NoNo
Premium Consulting/Integration Services
NoNo
Entry-level Setup FeeNo setup feeNo setup fee
Additional Details
More Pricing Information
Community Pulse
Gimmal DiscoverInformatica Cloud Data Governance, Access and Privacy
Best Alternatives
Gimmal DiscoverInformatica Cloud Data Governance, Access and Privacy
Small Businesses
Egnyte
Egnyte
Score 9.4 out of 10
Egnyte
Egnyte
Score 9.4 out of 10
Medium-sized Companies
IBM InfoSphere Information Server
IBM InfoSphere Information Server
Score 8.0 out of 10
IBM InfoSphere Information Server
IBM InfoSphere Information Server
Score 8.0 out of 10
Enterprises
IBM InfoSphere Information Server
IBM InfoSphere Information Server
Score 8.0 out of 10
IBM InfoSphere Information Server
IBM InfoSphere Information Server
Score 8.0 out of 10
All AlternativesView all alternativesView all alternatives
User Ratings
Gimmal DiscoverInformatica Cloud Data Governance, Access and Privacy
Likelihood to Recommend
-
(0 ratings)
7.2
(3 ratings)
Likelihood to Renew
-
(0 ratings)
9.0
(1 ratings)
User Testimonials
Gimmal DiscoverInformatica Cloud Data Governance, Access and Privacy
Likelihood to Recommend
Gimmal
No answers on this topic
Informatica
The Informatics vision is already determined and with the relationships already configured, or that plasters any new type of vision or relationship between the Assets. As a result, a pedigree diagram is poor and limited with the availability of information on the screen or in reports for consultation and decision making. It has an approval and maintenance workflow that is also limited to assets already made available only by Informática. It will not be possible to see the connection of a technical, functional, and documentary line in a single flow. It allows the registration of all data referring to a DPIA and LIA, but it does not generate a report that allows the aggregation of this set of information in a single place. The tool makes information available to support a decision regarding the DPIA and LIA, but it does not make it available in a unified way as in a report.
Read full review
Pros
Gimmal
No answers on this topic
Informatica
  • automated sensitive field detection
  • replace critical data with dummy but real-looking data
  • threat detection
  • role based access
Read full review
Cons
Gimmal
No answers on this topic
Informatica
  • High Complexity, requires training.
  • As it does not allow customization in relationships such as information separately in visual form and even in other tools of the Informatics group such as EDC.
  • Navigation is complex.
Read full review
Alternatives Considered
Gimmal
No answers on this topic
Informatica
Overall experience with Axon is average and it is a very manual product. Axon is a very good tool for data governance. User-friendly interface and is integrated with multiple systems.
Read full review
Return on Investment
Gimmal
No answers on this topic
Informatica
  • risk mitigation
  • data loss prevention
  • role based data access
Read full review
ScreenShots