Introducing G2.ai, the future of software buying.Try now
Nuix Neo Data Privacy
Sponsored
Nuix Neo Data Privacy
Visit Website
Product Avatar Image
PK Privacy

By PKWARE

4.8 out of 5 stars
4 star
0%
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with PK Privacy?

Nuix Neo Data Privacy
Sponsored
Nuix Neo Data Privacy
Visit Website
It's been two months since this profile received a new review
Leave a Review

PK Privacy Reviews & Product Details

Profile Status

This profile is currently managed by PK Privacy but has limited features.

Are you part of the PK Privacy team? Upgrade your plan to enhance your branding and engage with visitors to your profile!

Product Avatar Image

Have you used PK Privacy before?

Answer a few questions to help the PK Privacy community

PK Privacy Reviews (2)

Reviews

PK Privacy Reviews (2)

4.8
2 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
SK
Senior Sales Strategist
Education Management
Mid-Market (51-1000 emp.)
"Strategic data privacy initiative"
What do you like best about PK Privacy?

PK Privacy is good at employing automation. It helps in finding out the data and preparing the responses on its own which makes my team’s work very easy. It was useful also that some first impressions in DSAR responses are already prepared as templates for all organizations. Review collected by and hosted on G2.com.

What do you dislike about PK Privacy?

PK Privacy does not allow for much elaboration on responses based on templates for more specific and detailed requests. This poses a problem in that responses cannot be customized for particular circumstances, and thereby important details may be skipped or unimportant details may be given. Review collected by and hosted on G2.com.

Jackie K.
JK
Sales Associate
Small-Business (50 or fewer emp.)
"Very Good!"
What do you like best about PK Privacy?

I like the concept of it being private only to our company Review collected by and hosted on G2.com.

What do you dislike about PK Privacy?

Its newer so it still has some things needed to be worked out Review collected by and hosted on G2.com.

There are not enough reviews of PK Privacy for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.4
(1,109)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
Twilio Segment Logo
Twilio Segment
4.5
(562)
Segment is a customer data platform that helps every team access clean and reliable customer data to make real-time decisions, accelerate growth, and personalize experiences. Today, over 20,000 companies across 70+ countries use Segment, from fast-growing businesses like Instacart, Peloton, and Bonobos to some of the world’s largest organizations like Levi’s, Intuit, and FOX. With Segment, companies can connect and activate reliable first-party data across 300+ marketing, analytics, and data warehousing tools.
3
BetterCloud Logo
BetterCloud
4.4
(480)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
4
Palo Alto Cortex XSIAM Logo
Palo Alto Cortex XSIAM
4.3
(473)
Product Description: Palo Alto Networks' Cortex XSIAM is an AI-driven security operations platform designed to transform traditional Security Operations Centers by integrating and automating key functions such as data centralization, threat detection, and incident response. By leveraging machine learning and automation, it enables organizations to detect and respond to threats more efficiently, reducing manual workloads and improving overall security posture. Key Features and Functionality: - Data Centralization: Aggregates data from various sources into a unified platform, providing comprehensive visibility across the enterprise. - AI-Powered Threat Detection: Utilizes machine learning algorithms to identify anomalies and potential threats in real-time. - Automated Incident Response: Streamlines response processes through automation, enabling rapid mitigation of security incidents. - Integrated SOC Capabilities: Combines functions such as Extended Detection and Response , Security Orchestration, Automation, and Response , Attack Surface Management , and Security Information and Event Management into a cohesive platform, eliminating the need for multiple disparate tools. - Scalability: Designed to handle large volumes of data and adapt to the evolving needs of modern enterprises. Primary Value and Problem Solved: Cortex XSIAM addresses the challenges of disjointed data, weak threat defense, and heavy reliance on manual work in traditional SOCs. By centralizing data and automating security operations, it simplifies processes, enhances threat detection accuracy, and accelerates incident response times. This transformation enables organizations to proactively outpace threats, reduce operational costs, and achieve a more robust security posture.
5
AdOpt Logo
AdOpt
4.9
(329)
Intuitive and secure cookie widget and consent management platform.
6
TrustArc Logo
TrustArc
4.2
(313)
The TrustArc data privacy management platform is a comprehensive technology solution built to help you at every stage of your privacy program, across jurisdictions and across your enterprise.
7
MineOS Logo
MineOS
4.8
(221)
MineOS is the end-to-end platform that helps companies streamline and automate their data privacy management for increased brand trust. By integrating endless data sources, companies can provide customers with transparency over their data, handle data privacy requests at scale, and simplify complying with privacy regulations globally, including GDPR, CCPA, CPRA, and LGPD. More information can be found here: https://saymine.com/business
8
Usercentrics Logo
Usercentrics
4.3
(198)
Usercentrics offers an innovative software solution for enterprises, publishers and agencies which enables you to obtain, manage and legally document the consent of your users for data processing purposes in a granular way. Both the technical implementation and the design are 100% customizable.
9
DataGrail Logo
DataGrail
4.7
(193)
DataGrail is a purpose-built platform for legal and security teams to manage personal data for privacy regulations like the GDPR and California's Privacy Act.
10
Safetica Logo
Safetica
4.5
(188)
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization. Safetica covers the following data security solutions: Data Classification - Safetica offers complete data visibility across endpoints, networks, and cloud environments. It classifies sensitive data using its Safetica Unified Classification, which combines analysis of file content, file origin and file properties. Data Loss Prevention - With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement. Insider Risk Management - With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly. Notifications about how to treat sensitive data can help raise awareness around data security and educate your users. - Workspace and behavior analysis provides an extra level of detail to detect internal risks. It also helps understand how employees work, print, and use hardware and software assets, thus enabling organizations to optimize costs and increase operational efficiency. Cloud Data Protection - Safetica can monitor and classify files directly during user operations, such as exports, uploads and downloads, opening files, copying files to a different path, uploading files via web browsers, sending files via email or IM apps, and others. Regulatory compliance - Safetica helps organizations detect violations and comply with key regulations and data protection standards including GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
PK Privacy
View Alternatives