Average Ratings 0 Ratings
Average Ratings 0 Ratings
Description
                    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
                
            
        
            Description
                    Meeting the demands of various new global data privacy laws and regulations is crucial for robust cybersecurity, and initiating data classification is the foundational step in establishing an effective data protection strategy. The suite of Titus Classification products offers vital resources that provide clear guidance to both personnel and regulations regarding which data must be safeguarded and the appropriate methods for its management. You can oversee and secure your data using the most adaptable and customizable classification metadata schema available in the industry. By giving your data context, you enable both individuals and automated systems to comprehend the proper handling of the information. It acts as a classification and policy enforcement mechanism, ensuring that every Microsoft Office document is appropriately classified before it can be saved, printed, or emailed. Additionally, every email must receive classification and protective marking before dispatch. Users can classify and secure any file type with just a few clicks in Microsoft Windows Explorer, significantly enhancing the protection of your organization. This streamlined process not only simplifies compliance but also fosters a culture of data awareness and responsibility among employees.
                
            
        
            API Access
            
                Has API
            
            
        
        
    
                API Access
            
                Has API
            
            
        
        
    
                Integrations
            
                
    AWS Marketplace
            
            
        
        
    
        
        
            
                
    Alation
            
            
        
        
    
        
        
            
                
    Amazon Athena
            
            
        
        
    
        
        
            
                
    Amazon EMR
            
            
        
        
    
        
        
            
                
    Amazon RDS
            
            
        
        
    
        
        
            
                
    Amazon S3
            
            
        
        
    
        
        
            
                
    Azure Container Registry
            
            
        
        
    
        
        
            
                
    Azure Functions
            
            
        
        
    
        
        
            
                
    Azure SQL Database
            
            
        
        
    
        
        
            
                
    Azure Synapse Analytics
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Integrations
            
                
    AWS Marketplace
            
            
        
        
    
        
        
            
                
    Alation
            
            
        
        
    
        
        
            
                
    Amazon Athena
            
            
        
        
    
        
        
            
                
    Amazon EMR
            
            
        
        
    
        
        
            
                
    Amazon RDS
            
            
        
        
    
        
        
            
                
    Amazon S3
            
            
        
        
    
        
        
            
                
    Azure Container Registry
            
            
        
        
    
        
        
            
                
    Azure Functions
            
            
        
        
    
        
        
            
                
    Azure SQL Database
            
            
        
        
    
        
        
            
                
    Azure Synapse Analytics
            
            
        
        
    
                
                    
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
        
        
        
    
                
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Pricing Details
        No price information available.
        
        
    
    
    
        
        
            
                Free Trial
            
            
        
        
    
        
        
            
                Free Version
            
            
        
        
    
            Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Deployment
            
                Web-Based
            
            
        
        
    
        
        
            
                On-Premises
            
            
        
        
    
        
        
            
                iPhone App
            
            
        
        
    
        
        
            
                iPad App
            
            
        
        
    
        
        
            
                Android App
            
            
        
        
    
        
        
            
                Windows
            
            
        
        
    
        
        
            
                Mac
            
            
        
        
    
        
        
            
                Linux
            
            
        
        
    
        
        
            
                Chromebook
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Customer Support
            
                Business Hours
            
            
        
        
    
        
        
            
                Live Rep (24/7)
            
            
        
        
    
        
        
            
                Online Support
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Types of Training
            
                Training Docs
            
            
        
        
    
        
        
            
                Webinars
            
            
        
        
    
        
        
            
                Live Training (Online)
            
            
        
        
    
        
        
            
                In Person
            
            
        
        
    
                Vendor Details
Company Name
Protegrity
Founded
1996
Country
United States
Website
www.protegrity.com
Vendor Details
Company Name
Fortra
Founded
1982
Country
United States
Website
www.titus.com/products/data-classification-suite
Product Features
Big Data
                                        Collaboration
                                        
                                    
                                    
                                    
                                        Data Blends
                                        
                                    
                                    
                                    
                                        Data Cleansing
                                        
                                    
                                    
                                    
                                        Data Mining
                                        
                                    
                                    
                                    
                                        Data Visualization
                                        
                                    
                                    
                                    
                                        Data Warehousing
                                        
                                    
                                    
                                    
                                        High Volume Processing
                                        
                                    
                                    
                                    
                                        No-Code Sandbox
                                        
                                    
                                    
                                    
                                        Predictive Analytics
                                        
                                    
                                    
                                    
                                        Templates
                                        
                                    
                            
                        Compliance
                                        Archiving & Retention
                                        
                                    
                                    
                                    
                                        Artificial Intelligence (AI)
                                        
                                    
                                    
                                    
                                        Audit Management
                                        
                                    
                                    
                                    
                                        Compliance Tracking
                                        
                                    
                                    
                                    
                                        Controls Testing
                                        
                                    
                                    
                                    
                                        Environmental Compliance
                                        
                                    
                                    
                                    
                                        FDA Compliance
                                        
                                    
                                    
                                    
                                        HIPAA Compliance
                                        
                                    
                                    
                                    
                                        ISO Compliance
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        OSHA Compliance
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Sarbanes-Oxley Compliance
                                        
                                    
                                    
                                    
                                        Surveys & Feedback
                                        
                                    
                                    
                                    
                                        Version Control
                                        
                                    
                                    
                                    
                                        Workflow / Process Automation
                                        
                                    
                            
                        Data Discovery
                                        Contextual Search
                                        
                                    
                                    
                                    
                                        Data Classification
                                        
                                    
                                    
                                    
                                        Data Matching
                                        
                                    
                                    
                                    
                                        False Positives Reduction
                                        
                                    
                                    
                                    
                                        Self Service Data Preparation
                                        
                                    
                                    
                                    
                                        Sensitive Data Identification
                                        
                                    
                                    
                                    
                                        Visual Analytics
                                        
                                    
                            
                        Data Governance
                                        Access Control
                                        
                                    
                                    
                                    
                                        Data Discovery
                                        
                                    
                                    
                                    
                                        Data Mapping
                                        
                                    
                                    
                                    
                                        Data Profiling
                                        
                                    
                                    
                                    
                                        Deletion Management
                                        
                                    
                                    
                                    
                                        Email Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Process Management
                                        
                                    
                                    
                                    
                                        Roles Management
                                        
                                    
                                    
                                    
                                        Storage Management
                                        
                                    
                            
                        Data Management
                                        Customer Data
                                        
                                    
                                    
                                    
                                        Data Analysis
                                        
                                    
                                    
                                    
                                        Data Capture
                                        
                                    
                                    
                                    
                                        Data Integration
                                        
                                    
                                    
                                    
                                        Data Migration
                                        
                                    
                                    
                                    
                                        Data Quality Control
                                        
                                    
                                    
                                    
                                        Data Security
                                        
                                    
                                    
                                    
                                        Information Governance
                                        
                                    
                                    
                                    
                                        Master Data Management
                                        
                                    
                                    
                                    
                                        Match & Merge
                                        
                                    
                            
                        Data Privacy Management
                                        Access Control
                                        
                                    
                                    
                                    
                                        CCPA Compliance
                                        
                                    
                                    
                                    
                                        Consent Management
                                        
                                    
                                    
                                    
                                        Data Mapping
                                        
                                    
                                    
                                    
                                        GDPR Compliance
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        PIA / DPIA
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Sensitive Data Identification
                                        
                                    
                            
                        Data Security
                                        Alerts / Notifications
                                        
                                    
                                    
                                    
                                        Antivirus/Malware Detection
                                        
                                    
                                    
                                    
                                        At-Risk Analysis
                                        
                                    
                                    
                                    
                                        Audits
                                        
                                    
                                    
                                    
                                        Data Center Security
                                        
                                    
                                    
                                    
                                        Data Classification
                                        
                                    
                                    
                                    
                                        Data Discovery
                                        
                                    
                                    
                                    
                                        Data Loss Prevention
                                        
                                    
                                    
                                    
                                        Data Masking
                                        
                                    
                                    
                                    
                                        Data-Centric Security
                                        
                                    
                                    
                                    
                                        Database Security
                                        
                                    
                                    
                                    
                                        Encryption
                                        
                                    
                                    
                                    
                                        Identity / Access Management
                                        
                                    
                                    
                                    
                                        Logging / Reporting
                                        
                                    
                                    
                                    
                                        Mobile Data Security
                                        
                                    
                                    
                                    
                                        Monitor Abnormalities
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Secure Data Transport
                                        
                                    
                                    
                                    
                                        Sensitive Data Compliance
                                        
                                    
                            
                        Encryption
                                        Central Policy Enforcement
                                        
                                    
                                    
                                    
                                        Drag & Drop UI
                                        
                                    
                                    
                                    
                                        Email Encryption
                                        
                                    
                                    
                                    
                                        Encryption Key Management
                                        
                                    
                                    
                                    
                                        Endpoint Encryption
                                        
                                    
                                    
                                    
                                        File Compression
                                        
                                    
                                    
                                    
                                        File Encryption
                                        
                                    
                                    
                                    
                                        Full Disk Encryption
                                        
                                    
                                    
                                    
                                        Public Key Cryptography
                                        
                                    
                                    
                                    
                                        Tokenization / Data Masking
                                        
                                    
                            
                        GDPR Compliance
                                        Access Control
                                        
                                    
                                    
                                    
                                        Consent Management
                                        
                                    
                                    
                                    
                                        Data Mapping
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        PIA / DPIA
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Sensitive Data Identification
                                        
                                    
                            
                        HIPAA Compliance
                                        Access Control / Permissions
                                        
                                    
                                    
                                    
                                        Audit Management
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Data Security
                                        
                                    
                                    
                                    
                                        Documentation Management
                                        
                                    
                                    
                                    
                                        For Healthcare
                                        
                                    
                                    
                                    
                                        Incident Management
                                        
                                    
                                    
                                    
                                        Policy Training
                                        
                                    
                                    
                                    
                                        Remediation Management
                                        
                                    
                                    
                                    
                                        Risk Management
                                        
                                    
                                    
                                    
                                        Vendor Management
                                        
                                    
                            
                        PCI Compliance
                                        Access Control
                                        
                                    
                                    
                                    
                                        Compliance Reporting
                                        
                                    
                                    
                                    
                                        Exceptions Management
                                        
                                    
                                    
                                    
                                        File Integrity Monitoring
                                        
                                    
                                    
                                    
                                        Intrusion Detection System
                                        
                                    
                                    
                                    
                                        Log Management
                                        
                                    
                                    
                                    
                                        PCI Assessment
                                        
                                    
                                    
                                    
                                        Patch Management
                                        
                                    
                                    
                                    
                                        Policy Management
                                        
                                    
                            
                        Product Features
Data Discovery
                                        Contextual Search
                                        
                                    
                                    
                                    
                                        Data Classification
                                        
                                    
                                    
                                    
                                        Data Matching
                                        
                                    
                                    
                                    
                                        False Positives Reduction
                                        
                                    
                                    
                                    
                                        Self Service Data Preparation
                                        
                                    
                                    
                                    
                                        Sensitive Data Identification
                                        
                                    
                                    
                                    
                                        Visual Analytics
                                        
                                    
                            
                        Data Management
                                        Customer Data
                                        
                                    
                                    
                                    
                                        Data Analysis
                                        
                                    
                                    
                                    
                                        Data Capture
                                        
                                    
                                    
                                    
                                        Data Integration
                                        
                                    
                                    
                                    
                                        Data Migration
                                        
                                    
                                    
                                    
                                        Data Quality Control
                                        
                                    
                                    
                                    
                                        Data Security
                                        
                                    
                                    
                                    
                                        Information Governance
                                        
                                    
                                    
                                    
                                        Master Data Management
                                        
                                    
                                    
                                    
                                        Match & Merge
                                        
                                    
                            
                         
         
        