Extract value from your data without fear

Leverage your sensitive data assets in a safe and protected manner that complies with data privacy regulations.

How Privly works

Anonymize big datasets within minutes.

icon

Auto-Discover

Connect Privly with multiple data sources from multiple data owners, whether internal or external to your organization.

Auto-Configure

Set anonymization parameters for your datasets, including which personal data profiles to mask or redact.

icon1

Auto-Generate

Store anonymized data in a destination database of your choice. That’s it, that easy.

Privly’s core anonymization capabilities

Auto-Discover

Organizations can choose to either mask or redact personal identifiable information.
Masking replaces data profiles with inauthentic information that follows the same structure. On the other hand, redaction blocks the selected data profiles.

Poly-Anonymization™

When each piece of information (name, address, mobile number, etc.) is masked or redacted, Privly swaps it with a Poly-Anonymous Identifier (Poly-ID).
Each Poly-ID is unique, inconsistent, unpredictable, has multiple potential values and is not hashed.

Data matching

Because every anonymized datapoint has a Poly-ID, Privly users can combine multiple datasets in a way that matches records at the individual level without revealing personal identifiable information.

PII Integration Gap

Pain points in protecting sensitive enterprise data

Integrating multiple data sources

Impaired extraction of value from data

Datasets owned by multiple owners, internal & external

Complexity & cost of compliance

Setting up Privly is easy

No-code Implementation

Using Privly doesn’t entail any coding. It also won’t require you to retrofit your enterprise systems.

Non-invasive

Setting up and operating the service doesn’t affect other enterprise systems.

Database agnostic

Privly connects with any database. It also doesn’t require any database expertise.

Container-based

The solution is delivered to your enterprise systems through a Docker Container.

Within your enterprise firewall

All data processing through Privly occurs inside of your enterprise firewall.

Original data untouched

When anonymizing personal data, Privly doesn’t expose or rewrite the original data in your databases.

Auto-discover databases.

Privly connects with any database from numerous data sources, internal or external to your business.

Highly configurable

Users can easily configure rules of anonymization, automation, storage, data matching, and other tools.

Privly protects your data through our proprietary

Sundering technology

Sundering prevents our clients’ data from being read at rest but allows Privly to search and join data values without having to decrypt entire database tables. It offers all the advantages of encryption without its limitations.

Our patent-pending Sundering technology parses datasets into components, and then obfuscates these elements so they cannot be recombined without the presence of unique, multi-part Sunder Keys.

Upon the creation of a Privly account, the service provides the account holder with their half of a Sunder Key, a value our solution never stores. This half of the Sunder Key is only provided to us upon a web service call from the client’s account, which combines it with our half of the Sunder Key. This triggers the work and anonymization process within Privly.

The service never stores both halves of a key, making the data secure at rest. This means that

Discover how Privly protects enterprise data