About
Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA.
Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
|
About
The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in.
Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden.
PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools.
|
About
SQL is a domain-specific programming language used for accessing, managing, and manipulating relational databases and relational database management systems.
|
About
Simple, fast, safe, and compiled. For developing maintainable software. Simple language for building maintainable programs. You can learn the entire language by going through the documentation over a weekend, and in most cases, there's only one way to do something. This results in simple, readable, and maintainable code. This results in simple, readable, and maintainable code. Despite being simple, V gives a lot of power to the developer and can be used in pretty much every field, including systems programming, webdev, gamedev, GUI, mobile, science, embedded, tooling, etc. V is very similar to Go. If you know Go, you already know 80% of V. Bounds checking, No undefined values, no variable shadowing, immutable variables by default, immutable structs by default, option/result and mandatory error checks, sum types, generics, and immutable function args by default, mutable args have to be marked on call.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Data analytics and operations teams that need simple, scalable policy enforcement and data masking capabilities for their cloud data ecosystem.
|
Audience
Organizations interested in a system to manage data governance, data privacy and data security at petabyte scale.
|
Audience
Developers and database admins
|
Audience
Developers interested in a language for building maintainable programs
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
Pricing
Free
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationImmuta
Founded: 2015
United States
immuta.com
|
Company InformationPHEMI Systems
Founded: 2013
Canada
www.phemi.com
|
Company InformationSQL
Founded: 1974
sourceforge.net/software/product/SQL/
|
Company InformationV Programming Language
United States
vlang.io
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
||||||
|
|
|
|
||||
Categories |
Categories |
Categories |
Categories |
|||
Big Data Features
Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates
Cloud Security Features
Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management
Cloud Workload Protection Features
Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity
Data Governance Features
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Data Privacy Management Features
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Data Quality Features
Address Validation
Data Deduplication
Data Discovery
Data Profililng
Master Data Management
Match & Merge
Metadata Management
Data Security Features
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
Data Visualization Features
Analytics
Content Management
Dashboard Creation
Filtered Views
OLAP
Relational Display
Simulation Models
Visual Discovery
Encryption Features
Central Policy Enforcement
Drag & Drop UI
Email Encryption
Encryption Key Management
Endpoint Encryption
File Compression
File Encryption
Full Disk Encryption
Public Key Cryptography
Tokenization / Data Masking
GDPR Compliance Features
Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
HIPAA Compliance Features
Access Control / Permissions
Audit Management
Compliance Reporting
Data Security
Documentation Management
For Healthcare
Incident Management
Policy Training
Remediation Management
Risk Management
Vendor Management
Machine Learning Features
Deep Learning
ML Algorithm Library
Model Training
Natural Language Processing (NLP)
Predictive Modeling
Statistical / Mathematical Tools
Templates
Visualization
|
Big Data Features
Collaboration
Data Blends
Data Cleansing
Data Mining
Data Visualization
Data Warehousing
High Volume Processing
No-Code Sandbox
Predictive Analytics
Templates
Data Governance Features
Access Control
Data Discovery
Data Mapping
Data Profiling
Deletion Management
Email Management
Policy Management
Process Management
Roles Management
Storage Management
Data Management Features
Customer Data
Data Analysis
Data Capture
Data Integration
Data Migration
Data Quality Control
Data Security
Information Governance
Master Data Management
Match & Merge
Data Privacy Management Features
Access Control
CCPA Compliance
Consent Management
Data Mapping
GDPR Compliance
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification
Data Security Features
Alerts / Notifications
Antivirus/Malware Detection
At-Risk Analysis
Audits
Data Center Security
Data Classification
Data Discovery
Data Loss Prevention
Data Masking
Data-Centric Security
Database Security
Encryption
Identity / Access Management
Logging / Reporting
Mobile Data Security
Monitor Abnormalities
Policy Management
Secure Data Transport
Sensitive Data Compliance
|
|||||
Integrations
Chat2DB
ColdFusion Builder
DeepSeek R2
Five
GPT-4o
Gemini 2.5 Flash-Lite
Grok 4 Heavy
Horde
JetBrains Datalore
Mimer SQL
|
Integrations
Chat2DB
ColdFusion Builder
DeepSeek R2
Five
GPT-4o
Gemini 2.5 Flash-Lite
Grok 4 Heavy
Horde
JetBrains Datalore
Mimer SQL
|
Integrations
Chat2DB
ColdFusion Builder
DeepSeek R2
Five
GPT-4o
Gemini 2.5 Flash-Lite
Grok 4 Heavy
Horde
JetBrains Datalore
Mimer SQL
|
Integrations
Chat2DB
ColdFusion Builder
DeepSeek R2
Five
GPT-4o
Gemini 2.5 Flash-Lite
Grok 4 Heavy
Horde
JetBrains Datalore
Mimer SQL
|
|||
|
|
|
|
|