Teradata Vantage (July 2020)
Published: 1st July 2020 | By: Philip Howard
Teradata Vantage effectively consists of a merger between what was previously simply Teradata Database, and Aster Analytics.
Vertica Analytics Platform (2020)
Published: 1st July 2020 | By: Philip Howard
Vertica is a massively parallel, columnar database with advanced compression capabilities.
Yellowbrick Data
Published: 1st July 2020 | By: Philip Howard
Yellowbrick Data Warehouse is a massively parallel data warehouse available on-premises as an appliance or there is a multi-cloud option.
Ab Initio Semantic Discovery
Published: 21st May 2020 | By: Philip Howard and Daniel Howard
Ab Initio Semantic Discovery is a data discovery solution offered as part of Ab Initio’s broader data management platform.
Lumada Data Catalog
Published: 21st May 2020 | By: Philip Howard and Daniel Howard
The Lumada Data Catalog from Hitachi Vantara is a data catalogue targeted at both the enterprise data lake and traditional data environments.
Seeker DLP
Published: 21st May 2020 | By: Philip Howard and Daniel Howard
Seeker DLP finds sensitive data within files on Windows and Macs, across SMB-based file servers and web servers.
STEALTHbits Sensitive Data Discovery
Published: 21st May 2020 | By: Philip Howard and Daniel Howard
STEALTHbits supports discovery against a comprehensive list of file systems, SharePoint and OneDrive, Exchange, Dropbox, Oracle and Microsoft SQL Server.
DataSunrise Sensitive Data Discovery
Published: 21st May 2020 | By: Philip Howard and Daniel Howard
DataSunrise supports the discovery of sensitive data across a wide range of both relational and NoSQL data sources.
Solix Technologies Sensitive Data Discovery
Published: 21st May 2020 | By: Philip Howard and Daniel Howard
Solix Common Data Platform acts as a one stop shop for the management and governance of all enterprise data.
Dataguise DgSecure
Published: 21st May 2020 | By: Philip Howard and Daniel Howard
Dataguise started by offering sensitive data discovery and masking but now includes, additionally, encryption/decryption and extensive reporting.