Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Unrecognized threats can have significant consequences for your organization. It is crucial to pinpoint and mitigate risks associated with sensitive business information, as these can adversely affect business operations, processes, and competitive standing. IBM Data Risk Manager equips executives and their teams with a user-friendly data risk control center designed to identify, evaluate, and visualize risks linked to data, empowering them to take proactive measures to safeguard their organization. This tool helps locate high-value, sensitive information assets that may be vulnerable to both internal and external threats. It also provides a comprehensive overview of the business metadata connected to critical data assets. By translating complex data risks into understandable terms for executives, it fosters informed discussions among IT, security teams, and business units, ultimately enhancing processes and reducing risks. By leveraging this platform, organizations can create a culture of awareness and resilience against data risks.

Description

Limited insight into your data can expose your organization to significant risks. 1touch.io leverages a distinctive network analytics strategy, integrating advanced machine learning and artificial intelligence techniques, along with unmatched accuracy in data lineage, to continuously uncover and catalog all sensitive and protected information into a PII Inventory and a Master Data Catalog. By automatically identifying and analyzing data usage and lineage, we eliminate the need for organizations to be aware of the existence or location of their data. Our sophisticated multilayer machine learning analytic engine enhances our capability to "interpret and comprehend" the data, seamlessly connecting all elements to create a comprehensive overview in both the PII Inventory and the Master Catalog. This process not only facilitates the discovery of both known and unknown sensitive data within your network, leading to immediate risk mitigation, but it also streamlines your data flow, allowing for a clearer understanding of data lineage and business processes, which is essential for meeting crucial compliance standards. By staying ahead of potential data vulnerabilities, organizations can better protect themselves in an increasingly complex regulatory landscape.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Azure Marketplace

Integrations

Azure Marketplace

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/products/data-risk-manager

Vendor Details

Company Name

1touch.io

Founded

2017

Country

United States

Website

1touch.io/inventa/

Product Features

Risk Management

Alerts/Notifications
Auditing
Business Process Control
Compliance Management
Corrective Actions (CAPA)
Dashboard
Exceptions Management
IT Risk Management
Internal Controls Management
Legal Risk Management
Mobile Access
Operational Risk Management
Predictive Analytics
Reputation Risk Management
Response Management
Risk Assessment

Product Features

Data Discovery

Contextual Search
Data Classification
Data Matching
False Positives Reduction
Self Service Data Preparation
Sensitive Data Identification
Visual Analytics

Data Privacy Management

Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

Alternatives

Alternatives

SailPoint Reviews

SailPoint

SailPoint Technologies
Secuvy AI Reviews

Secuvy AI

Secuvy