Informatica Data Privacy

Informatica Data Privacy

Score 8.8 out of 10
Informatica Data Privacy (secure@source)

Overview

What is Informatica Data Privacy?

The Informatica Data Privacy portfolio including Secure@Source helps organizations protect their data in a constantly changing environment. The data privacy solutions are designed to help discover personal and sensitive data, understand data movement, link identities, analyze risk, and remediate problems...
Read more

Recent Reviews

Read all reviews
Return to navigation

Pricing

View all pricing
N/A
Unavailable

What is Informatica Data Privacy?

The Informatica Data Privacy portfolio including Secure@Source helps organizations protect their data in a constantly changing environment. The data privacy solutions are designed to help discover personal and sensitive data, understand data movement, link identities, analyze risk, and remediate…

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting / Integration Services

Would you like us to let the vendor know that you want pricing?

2 people want pricing too

Alternatives Pricing

What is Osano?

Osano, headquartered in Austin, Texas, is a data privacy platform boasting usage by more than 750,000 websites around the globe. With laws like GDPR and CCPA, it is designed so users can ensure their sites are compliant and mitigate the risk of being sued. The vendor states that while Osano assists…

Return to navigation

Product Details

What is Informatica Data Privacy?

The Informatica Data Privacy portfolio including Secure@Source helps organizations protect their data in a constantly changing environment. The data privacy solutions are designed to help discover personal and sensitive data, understand data movement, link identities, analyze risk, and remediate problems with AI-driven automation.

With Secure@Source, operationalize data privacy governance to help lower risk exposure for cloud modernization, data lakes, customer centricity, and new digital transformation programs. Discover and classify data, assess risk, monitor suspicious data access and movement, and automate protection and response.

Informatica Data Privacy Technical Details

Operating SystemsUnspecified
Mobile ApplicationNo
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews and Ratings

 (5)

Attribute Ratings

Reviews

(1-2 of 2)
Companies can't remove reviews or game the system. Here's why
Score 7 out of 10
Vetted Review
Verified User
Overall experience with Informatica data privacy management products is good. it provides end-to-end security to our data. It is an effective tool in identifying data risk scanning. The tool will find the sensitive data as well while scanning itself.
  • Dashboards
  • Reports
  • Visualization
  • Pricing
  • Data masking
The tool provides global visibility of sensitive data assets, actionable insights into sensitive data risks. It helps us to analyze the risk by measuring many parameters such as status, data volume, user access, etc.
  • Dashboards
  • privacy
  • Reports
  • Documentation
  • Pricing
In order to use this tool, we need to spend some time learning this. Once it is familiar it is one of the best data privacy tools.
Savan Solanki | TrustRadius Reviewer
Score 9 out of 10
Vetted Review
Verified User
Due to the fact that our client's real-time critical information cannot be shared with the business user, development, and testing teams, we were seeking a technology that could ensure data security. As a result, we made use of Informatica to hide the sensitive data fields. Eventually, I can state that this application contributed to the provision of data security and protection.
  • automated sensitive field detection
  • replace critical data with dummy but real-looking data
  • threat detection
  • role based access
  • documentation not available
  • technical knowledge required
In most circumstances, production data is necessary in staged environments in order to test and validate various test cases and scenarios. Real-time data, on the other hand, comprises sensitive information such as credit/debit card numbers, user names and passwords, and any other personal details that cannot be disclosed. As a result, this tool may be used to mask vital data with fake but realistic data in order to execute a variety of actions in the development and quality assurance environments. In order to protect the privacy and security of users' data, as well as to prevent future risk.
  • predefined rules - saved a lot of time
  • built-in templates
  • several way of data masking
  • risk mitigation
  • data loss prevention
  • role based data access
13
2
  • data masking
  • cloud based solution
  • data availability for rightful person
No
  • Product Features
  • Prior Experience with the Product
If I have to start again, still I would continue with Informatica only also, I would utilize the other product and services provided by the same service provider.
Return to navigation