Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 1 Rating

Total
ease
features
design
support

Alternatives to Consider

  • Captain Compliance Reviews & Ratings
    53 Ratings
    Company Website
  • Carbide Reviews & Ratings
    88 Ratings
    Company Website
  • Wiz Reviews & Ratings
    1,101 Ratings
    Company Website
  • Source Defense Reviews & Ratings
    7 Ratings
    Company Website
  • Safetica Reviews & Ratings
    401 Ratings
    Company Website
  • cside Reviews & Ratings
    23 Ratings
    Company Website
  • Admiral Reviews & Ratings
    63 Ratings
    Company Website
  • dbt Reviews & Ratings
    219 Ratings
    Company Website
  • DataBuck Reviews & Ratings
    6 Ratings
    Company Website
  • Jscrambler Reviews & Ratings
    33 Ratings
    Company Website

What is Securiti?

Securiti has established itself as the leader in the Data Command Center, a comprehensive platform designed to facilitate the secure utilization of data and Generative AI. This innovative solution offers cohesive data intelligence, management, and orchestration across diverse hybrid multicloud settings. Major international corporations depend on Securiti's Data Command Center to ensure data security, privacy, governance, and adherence to compliance standards. The company has garnered accolades such as being named a Gartner "Cool Vendor in Data Security," recognized as a Forrester "Privacy Management Wave Leader," and awarded by RSA as the "Most Innovative Startup." With these accomplishments, Securiti continues to set the standard in the data management landscape.

What is K2View?

K2View is committed to empowering enterprises to fully utilize their data for enhanced agility and innovation. Our Data Product Platform facilitates this by generating and overseeing a reliable dataset for each business entity as needed and in real-time. This dataset remains continuously aligned with its original sources, adjusts seamlessly to changes, and is readily available to all authorized users. We support a variety of operational applications, such as customer 360, data masking, test data management, data migration, and the modernization of legacy applications, enabling businesses to achieve their goals in half the time and at a fraction of the cost compared to other solutions. Additionally, our approach ensures that organizations can swiftly adapt to evolving market demands while maintaining data integrity and security.

Media

Media

Integrations Supported

AWS Marketplace
Amazon
Azure Marketplace
Salesforce

Integrations Supported

AWS Marketplace
Amazon
Azure Marketplace
Salesforce

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Securiti

Date Founded

2018

Company Location

United States

Company Website

securiti.ai/

Company Facts

Organization Name

K2View

Date Founded

2009

Company Location

United States

Company Website

k2view.com

Categories and Features

Consent Management Platforms

Additional Users / Permissions
Automatic Cookie-Blocking
CCPA Compliance
CMS Integration
Cookie Crawling
Design/Branding Customization
Fingerprinting
GDPR Compliance
IAB Compliance
Reporting / Analytics
Responsive Design
Subdomains Compatibility
Tag Manager Integration
Whitelabel Solution

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Lineage

Database Change Impact Analysis
Filter Lineage Links
Implicit Connection Discovery
Lineage Object Filtering
Object Lineage Tracing
Point-in-Time Visibility
User/Client/Target Connection Visibility
Visual & Text Lineage View

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Categories and Features

Customer Data Platforms (CDP)

Behavioral Analytics
Campaign Management
Customer Profiles
Customer Segmentation
Data Integration
Data Matching
GDPR Compliance
Personalization
Predictive Modeling

Data Fabric

Data Access Management
Data Analytics
Data Collaboration
Data Lineage Tools
Data Networking / Connecting
Metadata Functionality
No Data Redundancy
Persistent Data Management

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Preparation

Collaboration Tools
Data Access
Data Blending
Data Cleansing
Data Governance
Data Mashup
Data Modeling
Data Transformation
Machine Learning
Visual User Interface

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Integration

Dashboard
ETL - Extract / Transform / Load
Metadata Management
Multiple Data Sources
Web Services

iPaaS

AI / Machine Learning
Cloud Data Integration
Dashboard
Data Quality Control
Data Security
Drag & Drop
Embedded iPaaS
Integration Management
Pre-Built Connectors
White Label
Workflow Management

Master Data Management

Data Governance
Data Masking
Data Source Integrations
Hierarchy Management
Match & Merge
Metadata Management
Multi-Domain
Process Management
Relationship Mapping
Visualization

Popular Alternatives

Popular Alternatives

IRI DarkShield Reviews & Ratings

IRI DarkShield

IRI, The CoSort Company
Delphix Reviews & Ratings

Delphix

Perforce