Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

What is Titaniam?

Titaniam offers a comprehensive suite of data security controls tailored for enterprises and SaaS providers within a single solution. This encompasses sophisticated features like encrypted search and analytics, alongside conventional measures such as tokenization, data masking, various encryption methods, and anonymization techniques. Additionally, Titaniam provides a Bring Your Own Key (BYOK) and Hold Your Own Key (HYOK) option, allowing data owners to maintain control over their data's security. In the event of a security breach, Titaniam alleviates regulatory burdens by supplying proof that sensitive data remains encrypted. The platform's modular design enables integration to support numerous architectures spanning multiple cloud environments, on-premises setups, and hybrid systems. By consolidating the functions of over three separate solutions, Titaniam stands out as both a highly effective and cost-efficient option in the market. Garnering recognition from Gartner across various categories in four distinct markets—Data Security, Data Privacy, Enterprise Key Management, and as a Cool Vendor for 2022—underscores its industry impact. Furthermore, Titaniam has been acknowledged as a Distinguished Vendor by TAG Cyber and named an Intellyx Digital Innovator for 2022. In addition to these accolades, the company secured the prestigious SINET16 Security Innovator Award and triumphed in four categories at the Global Infosec Awards during RSAC2022, solidifying its reputation as a leading force in data security innovation. Such recognition reflects the company's commitment to excellence and leadership in the rapidly evolving cybersecurity landscape.

What is PHEMI Health DataLab?

In contrast to many conventional data management systems, PHEMI Health DataLab is designed with Privacy-by-Design principles integral to its foundation, rather than as an additional feature. This foundational approach offers significant benefits, including: It allows analysts to engage with data while adhering to strict privacy standards. It incorporates a vast and adaptable library of de-identification techniques that can conceal, mask, truncate, group, and anonymize data effectively. It facilitates the creation of both dataset-specific and system-wide pseudonyms, enabling the linking and sharing of information without the risk of data leaks. It gathers audit logs that detail not only modifications made to the PHEMI system but also patterns of data access. It automatically produces de-identification reports that are accessible to both humans and machines, ensuring compliance with enterprise governance risk management. Instead of having individual policies for each data access point, PHEMI provides the benefit of a unified policy that governs all access methods, including Spark, ODBC, REST, exports, and beyond, streamlining data governance in a comprehensive manner. This integrated approach not only enhances privacy protection but also fosters a culture of trust and accountability within the organization.

What is DataSunrise Database Security?

Data-Centric offers high-performance security solutions for databases, ensuring compliance with regulations like SOX, HIPAA, GDPR, and PCI DSS, among other privacy laws and standards. It features a Hybrid and Multicloud Database Security Proxy that operates seamlessly across platforms such as AWS, Azure, Google Cloud, and on-premises environments. With active protection, discovery, and auditing capabilities, the software safeguards sensitive and personally identifiable information (PII). The Data Auditing function enables real-time monitoring of user activities and data alterations, thereby enhancing compliance and visibility. It incorporates a Database Firewall alongside role-based and location-aware Data Access Control & Protection to defend corporate databases from both malicious actors and unintentional breaches. Additionally, it secures sensitive data in both testing and development settings; its robust encryption techniques effectively prevent reverse engineering of masked data. Furthermore, production data can be concealed using real-time location and role-based data masking, ensuring that sensitive privacy information remains protected, even when the original data is not physically modified. In this way, Data-Centric not only fortifies data security but also fosters a culture of compliance and accountability within organizations.

What is AVEVA Unified Engineering?

Leveraging Software as a Service (SaaS) through our industrial cloud platform, AVEVA Connect, AVEVA Unified Engineering provides a data-centric ecosystem for obtaining real-time engineering insights. This all-encompassing solution addresses the full spectrum of the project lifecycle, spanning from initial conceptual design to front-end engineering and design (FEED) and the detailed design stages. By promoting data transparency throughout various project disciplines and phases, it uniquely serves as the only data-driven framework that aligns both process and asset engineering lifecycles. Teams can effectively perform conceptual, FEED, and detailed engineering designs from a unified data source, enhancing collaboration among internal teams and outside suppliers alike. The development of a digital twin, fueled by real-time project data, significantly improves engineering visibility for all stakeholders involved while reducing transition challenges. Furthermore, the platform ensures secure operations from any location, which ultimately enhances productivity and empowers teams. This capability allows for rapid scalability to address project requirements, thereby ensuring that all facets of engineering are managed and optimized effectively. Consequently, AVEVA Unified Engineering allows organizations to adapt swiftly to changing demands while maintaining high standards of efficiency.

Media

Media

Media

Media

Integrations Supported

AVEVA Connect
AVEVA Diagrams
AVEVA E3D Design
AVEVA Electrical and Instrumentation
AVEVA Engineering
AVEVA P&ID
Amazon Web Services (AWS)
Apache Hive
Apache Ranger
Apache Spark
Cloudera
Hadoop
Microsoft Azure
Microsoft Power BI
OpenText Analytics Database (Vertica)
Recruitee
Tableau

Integrations Supported

AVEVA Connect
AVEVA Diagrams
AVEVA E3D Design
AVEVA Electrical and Instrumentation
AVEVA Engineering
AVEVA P&ID
Amazon Web Services (AWS)
Apache Hive
Apache Ranger
Apache Spark
Cloudera
Hadoop
Microsoft Azure
Microsoft Power BI
OpenText Analytics Database (Vertica)
Recruitee
Tableau

Integrations Supported

AVEVA Connect
AVEVA Diagrams
AVEVA E3D Design
AVEVA Electrical and Instrumentation
AVEVA Engineering
AVEVA P&ID
Amazon Web Services (AWS)
Apache Hive
Apache Ranger
Apache Spark
Cloudera
Hadoop
Microsoft Azure
Microsoft Power BI
OpenText Analytics Database (Vertica)
Recruitee
Tableau

Integrations Supported

AVEVA Connect
AVEVA Diagrams
AVEVA E3D Design
AVEVA Electrical and Instrumentation
AVEVA Engineering
AVEVA P&ID
Amazon Web Services (AWS)
Apache Hive
Apache Ranger
Apache Spark
Cloudera
Hadoop
Microsoft Azure
Microsoft Power BI
OpenText Analytics Database (Vertica)
Recruitee
Tableau

API Availability

Has API

API Availability

Has API

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Titaniam

Date Founded

2019

Company Location

United States

Company Website

titaniam.io

Company Facts

Organization Name

PHEMI Systems

Date Founded

2013

Company Location

Canada

Company Website

www.phemi.com

Company Facts

Organization Name

DataSunrise

Date Founded

2014

Company Location

United States

Company Website

www.datasunrise.com

Company Facts

Organization Name

AVEVA

Company Location

United Kingdom

Company Website

www.aveva.com/en/products/unified-engineering/

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Encryption

Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking

Categories and Features

Big Data

Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates

Data Governance

Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management

Data Lineage

Database Change Impact Analysis
Filter Lineage Links
Implicit Connection Discovery
Lineage Object Filtering
Object Lineage Tracing
Point-in-Time Visibility
User/Client/Target Connection Visibility
Visual & Text Lineage View

Data Management

Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Data Security

Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance

Categories and Features

Database

Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization

Categories and Features

Engineering

2D Drawing
3D Modeling
Chemical Engineering
Civil Engineering
Collaboration
Design Analysis
Design Export
Document Management
Electrical Engineering
Mechanical Engineering
Mechatronics
Presentation Tools
Structural Engineering

Simulation

1D Simulation
3D Modeling
3D Simulation
Agent-Based Modeling
Continuous Modeling
Design Analysis
Direct Manipulation
Discrete Event Modeling
Dynamic Modeling
Graphical Modeling
Industry Specific Database
Monte Carlo Simulation
Motion Modeling
Presentation Tools
Stochastic Modeling
Turbulence Modeling

Popular Alternatives

Popular Alternatives

Popular Alternatives

Popular Alternatives

IRI DMaaS Reviews & Ratings

IRI DMaaS

IRI, The CoSort Company
Secuvy AI Reviews & Ratings

Secuvy AI

Secuvy