Comparing General Data Protection Regulation (GDPR) Solutions
Dynamic Data Classification
Trainable ML Libraries
Data Migration
Data Loss Prevention
Email Archiving
Comprehensive Data Archiving/Mapping
Data Minimization
Data Retention & Deletion
Data Subject Requests (DSAR)
PIA and DPIA Automation
ROT Data Detection
Sensitive Data Discovery
File Analysis
Sensitive Data Protection
Yes
Yes
Yes
Yes
Yes
Yes
No
No
Yes
Yes
No
Yes
Yes
Yes
Yes
No
Yes
No
No
Yes
No
No
Yes
No
No
Yes
No
Yes
Scalability
Audit Trails and Reporting
Defensible Disposition
Policy Enforcement
Redundancy Detection
Risk Assessment
API Integration
Incident Management
Automated Intelligence
Continuous Data Monitoring
Access Management
Streamlined IT Security Audits
Change and Access Reports
Threat Pattern Alerts
Automated Risk Remediation
Security Posture Gaps
Access Monitoring
Threat Remediation
Password Security
IT Resource Optimization
Alerts on Critical Changes
File Integrity Monitoring
Security Incident Response
Ransomware Response
Insider Threat Detection
Log Management
Active Directory Change Auditing
Incident Detection
Incident Response
Threat Hunting
Security Orchestration, Automation, and Response (SOAR)
SIEM (Security Information and Event Management)
Real-time Event Correlation
User Activity Monitoring
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
No
Yes
No
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes
Yes
Yes
No
Yes
Yes
No
No
Yes
Yes
No
No
No
No
Yes
Yes
No
No
Yes
No
Yes
Yes
Yes
No
Yes
Yes
No
No
Yes
Yes
No
No
Yes
Yes
No
No
No
No
No
Yes
No
No
No
No
No
No
No
No
Yes
Cloud-deployed
Centralized Management
Enhanced Connectivity
Automated Sharepoint Provisioning
Multi-Tenant Management
Cloud App Discovery
Cloud Protection
Integration Capabilities
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
Yes
No
No
Yes
No
No
Yes
Yes
Compliance Reporting
Cookie Consent
Privacy Intelligence
Product Privacy Page
One-click Reporting
Email Security
Dynamic data masking
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
Yes
Yes
Yes
No
No
Inclusive Global Search
Risk Assessment
Advanced Search
Filtering
Human-Readable Reports
File Copy Auditing
Workstation Monitoring
ROT Analysis
Permissions Analyzer
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
No
No
No
Yes
Yes
Yes
Yes
Yes
Yes
Free Trial
Quotation Based
Yes
No
No
Yes
https://wirewheel.io/company/
https://pitchbook.com/profiles/company/183222-46
https://wirewheel.io/privacy-operations-manager
https://wirewheel.io/trust-access-and-consent-center/
https://aws.amazon.com/marketplace/seller-profile?id=0b0855be-be4c-4b0f-af8b-4f083fa5ab79
https://aws.amazon.com/marketplace/pp/prodview-cfiwkjtdxclhu#:~:text=Product%20Overview,party%20compliance%2C%20and%20consent%20management.
https://aws.amazon.com/marketplace/pp/prodview-qr3xmcrn6bwt6?sr=0-1&ref_=beagle&applicationId=AWSMPContessa
https://aws.amazon.com/marketplace/pp/prodview-f7t5ungaihljs?sr=0-2&ref_=beagle&applicationId=AWSMPContessa
https://www.g2.com/categories/data-privacy-management
https://www.zoominfo.com/c/wirewheel-inc/447814509
https://crustdata.com/profiles/company/wirewheel_io
https://www.onetrust.com/blog/privacy-management/
https://wirewheel.io/integration-center/
https://wirewheel.io/low-code-adapters/
https://www.g2.com/products/wirewheel/reviews#reviews
and many more at https://wirewheel.io/low-code-adapters/