About
Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business.
We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues:
- Obfuscating, generating or masking databases and flat files;
- Extracting or filtering specific data content with data subsetting;
- Discovering, profiling and analysing solutions for understanding your test data,
- Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and
- Cloning, snapshotting and timetraveling throug your test data with database virtualization.
We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
|
About
IBM InfoSphere® Optim™ Data Privacy provides extensive capabilities to effectively mask sensitive data across non-production environments, such as development, testing, QA or training. To protect confidential data this single offering provides a variety of transformation techniques that substitute sensitive information with realistic, fully functional masked data. Examples of masking techniques include substrings, arithmetic expressions, random or sequential number generation, date aging, and concatenation. The contextually accurate masking capabilities help masked data retain a similar format to the original information. Apply a range of masking techniques on-demand to transform personally-identifying information and confidential corporate data in applications, databases and reports. Data masking features help you to prevent misuse of information by masking, obfuscating, and privatizing personal information that is disseminated across non-production environments.
|
About
JavaScript Obfuscator transforms readable JavaScript source code into an obfuscated and unintelligible form, preventing reverse engineering, tampering, and intellectual property theft while preserving full functionality and compatibility with the latest ECMAScript versions. It includes powerful features such as minification and compression for reduced file size and faster load times, dead code insertion to confuse static analysis, and domain- or IP-based locking to disable code execution outside authorized environments. The tool provides GUI-driven desktop batch processing that allows users to protect JavaScript embedded in HTML, PHP, JSP, or similar files with just a few clicks, and supports keeping initial comments or inserting custom headers into output files. Advanced controls let you exclude certain names from obfuscation and ensure consistent symbol renaming across multiple files.
|
About
The core of extensible programming is defining functions. Python allows mandatory and optional arguments, keyword arguments, and even arbitrary argument lists. Whether you're new to programming or an experienced developer, it's easy to learn and use Python. Python can be easy to pick up whether you're a first-time programmer or you're experienced with other languages. The following pages are a useful first step to get on your way to writing programs with Python! The community hosts conferences and meetups to collaborate on code, and much more. Python's documentation will help you along the way, and the mailing lists will keep you in touch. The Python Package Index (PyPI) hosts thousands of third-party modules for Python. Both Python's standard library and the community-contributed modules allow for endless possibilities.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Testers, QA Engineers, DBA, IT Managers, DPO; everyone who needs better, safer and faster test data!
|
Audience
Companies seeking a solution to protect privacy, support compliance and identify sensitive information
|
Audience
Developers and teams needing a tool to secure their JavaScript by easily transforming it into compressed, obfuscated code that deters tampering and unauthorized reuse
|
Audience
Developers interested in a beautiful but advanced programming language
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationDATPROF
Founded: 2005
Netherlands
www.datprof.com
|
Company InformationIBM
Founded: 1911
United States
www.ibm.com/il-en/products/infosphere-optim-data-privacy
|
Company InformationJavascript Obfuscator
Founded: 2003
United States
javascriptobfuscator.com
|
Company InformationPython
Founded: 1991
www.python.org
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
||||||
|
|
|
|
||||
|
|
||||||
|
|
|
|||||
Categories |
Categories |
Categories |
Categories |
|||
Compliance Features
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
HIPAA Compliance
Incident Management
ISO Compliance
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation
Data Analysis Features
Data Discovery
Data Visualization
High Volume Processing
Predictive Analytics
Regression Analysis
Sentiment Analysis
Statistical Modeling
Text Analytics
Data Discovery Features
Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics
Data Governance Features
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Data Privacy Management Features
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Data Quality Features
Address Validation
Data Deduplication
Data Discovery
Data Profililng
Master Data Management
Match & Merge
Metadata Management
Data Security Features
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
GDPR Compliance Features
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
HIPAA Compliance Features
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
PCI Compliance Features
Access Control
Compliance Reporting
Exceptions Management
File Integrity Monitoring
Intrusion Detection System
Log Management
Patch Management
PCI Assessment
Policy Management
|
||||||
Integrations
Banana
Bypass.io
CodeGemma
Constructor Proctor
Eventarc
Fine
Gemini 2.0 Flash
Google Earth Engine
Inspector
Koyeb
|
Integrations
Banana
Bypass.io
CodeGemma
Constructor Proctor
Eventarc
Fine
Gemini 2.0 Flash
Google Earth Engine
Inspector
Koyeb
|
Integrations
Banana
Bypass.io
CodeGemma
Constructor Proctor
Eventarc
Fine
Gemini 2.0 Flash
Google Earth Engine
Inspector
Koyeb
|
Integrations
Banana
Bypass.io
CodeGemma
Constructor Proctor
Eventarc
Fine
Gemini 2.0 Flash
Google Earth Engine
Inspector
Koyeb
|
|||
|
|
|
|
|