Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages:
Lets analysts work with data without breaching privacy guidelines
Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data.
Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage.
Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns.
Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines.
Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more
Description
CAM addresses the difficulties associated with multiple collaboration platforms, alleviating risks and lowering costs, which simplifies the processes of data provisioning, classification, protection, movement, and minimization specifically for project and relationship-oriented organizations. Furthermore, CAM enhances the management and governance of data, ensuring it remains accessible, secure, and compliant with regulations. By reducing the disarray of data distributed across various systems, it helps users effectively organize documents while allowing risk management teams to grasp the necessary context. Users can swiftly set up Teams, Channels, workspaces, folders, and documents through automated processes or manual workflows. Adding comprehensive metadata empowers end users to efficiently find data and assists risk management teams in comprehending document relevance. Additionally, CAM provides standardized naming templates tailored for different groups and teams, thereby improving data organization. Ultimately, it revolutionizes data protection strategies, allowing for the efficient management of both internal and external users and groups, assigning appropriate roles and permissions, and facilitating the granting of access or restrictions as needed. This comprehensive approach cultivates a more structured and secure data environment.
API Access
Has API
API Access
Has API
Integrations
Apache Hive
Apache Ranger
Apache Spark
Cerrebro
Cloudera
DynaRent
Element
Hadoop
Microsoft 365
Microsoft Azure
Integrations
Apache Hive
Apache Ranger
Apache Spark
Cerrebro
Cloudera
DynaRent
Element
Hadoop
Microsoft 365
Microsoft Azure
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
PHEMI Systems
Founded
2013
Country
Canada
Website
www.phemi.com
Vendor Details
Company Name
Prosperoware
Founded
2009
Country
United States
Website
www.prosperoware.com/cam/
Product Features
Big Data
Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates
Data Governance
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Data Lineage
Database Change Impact Analysis
Filter Lineage Links
Implicit Connection Discovery
Lineage Object Filtering
Object Lineage Tracing
Point-in-Time Visibility
User/Client/Target Connection Visibility
Visual & Text Lineage View
Data Management
Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge
Data Privacy Management
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Product Features
Data Governance
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Data Security
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance