Ketch Features
What are the features of Ketch?
Functionality
- Identity Verification
- Consent management
- Identity Verification
- Workflow
- DSAR Portal
- Reporting and logs
- Dashboard
- Reporting
- Integrations
- End-user management
- Audit trails
- APIs
- Mobile SDK
- Customizable design
- Server-side storage
Ketch Categories on G2
Filter for Features
Functionality
Data Subject Access Requests | Based on 17 Ketch reviews. Data Subject Access Request (DSAR) functionality helps companies comply with user access and deletion requests. | 88% (Based on 17 reviews) | |
Identity Verification | Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. 33 reviewers of Ketch have provided feedback on this feature. | 84% (Based on 33 reviews) | |
Privacy Impact Assessments | Based on 18 Ketch reviews. Privacy Impact Assessment (PIA) features help companies evalute, assess, track and report on the privacy implications of their data. | 79% (Based on 18 reviews) | |
Data Mapping - survey-based | As reported in 17 Ketch reviews. Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through manual surveys sent to company employees. | 76% (Based on 17 reviews) | |
Data Mapping - automated | Data mapping functionality, which helps companies understand how data flows throughout their organization, is achieved through automated machine learning. 18 reviewers of Ketch have provided feedback on this feature. | 77% (Based on 18 reviews) | |
Data Discovery | Data discovery features collect and aggregate data from a variety of sources and prepares it in formats that both people and software can easily use it to then run analytics. 18 reviewers of Ketch have provided feedback on this feature. | 82% (Based on 18 reviews) | |
Data Classification | Data classification features tag the discovered data to make it easy to search, find, retrieve, and track. This feature was mentioned in 17 Ketch reviews. | 75% (Based on 17 reviews) | |
De-identification/pseudonymization | As reported in 17 Ketch reviews. De-identification or pseudonymization features replace personally identifiable information with artificial identifiers, or pseudonyms to comply with privacy regulations. | 80% (Based on 17 reviews) | |
Consent management | Consent management features help companies obtain and manage user consent when collecting, sharing, buying, or selling a user's data. This feature was mentioned in 19 Ketch reviews. | 89% (Based on 19 reviews) | |
Website tracking scanning | Website tracking scanning features help companies understand what cookies, beacons, and other trackers are on their websites. 18 reviewers of Ketch have provided feedback on this feature. | 76% (Based on 18 reviews) | |
Data access governance | Data Access Governance functionality helps limit the number of people who have access to data unless they are permissioned to do so. This feature was mentioned in 17 Ketch reviews. | 82% (Based on 17 reviews) | |
Identity Verification | As reported in 33 Ketch reviews. Identity verification functionality validates a person's identity prior to a company complying with a data subject access request. | 84% (Based on 33 reviews) | |
Workflow | Based on 25 Ketch reviews. Offers workflows to process Data Subject Access Requests to enable multiple departments to assist when complying with user access and deletion requests. | 92% (Based on 25 reviews) | |
DSAR Portal | Offers a user-facing portal for data subjects to request access to their data. 25 reviewers of Ketch have provided feedback on this feature. | 92% (Based on 25 reviews) | |
Reporting and logs | As reported in 25 Ketch reviews. Has reporting and log functionality to prove that companies are in compliance with mandated response time, per privacy laws such as GDPR, CCPA, and others. | 89% (Based on 25 reviews) | |
Centralized platform | Has a centralized view of PIA software functions, such as tracking, templates, and reporting | Not enough data | |
Tracking | Offers tracking functionality to manage privacy impact assessments during its lifecycle | Not enough data | |
Templates | Offers assessment templates which can be customized to meet business needs | Not enough data | |
Workflow | Offers workflows to enable multiple departments to collaborate on privacy impact assessments. | Not enough data | |
Reporting and analytics | Has reporting and analytics functionality to highlight risks and compare analyses. | Not enough data | |
Dashboard | Based on 58 Ketch reviews. Offers a dashboard to capture, store, and manage granular user consents | 85% (Based on 58 reviews) | |
Reporting | Provide reporting functions showing granular data to demonstrate compliance to regulators This feature was mentioned in 55 Ketch reviews. | 83% (Based on 55 reviews) | |
Integrations | Integrates with marketing software and other analytical tools 56 reviewers of Ketch have provided feedback on this feature. | 80% (Based on 56 reviews) | |
End-user management | As reported in 57 Ketch reviews. Allows end-users to manage their preferences online | 87% (Based on 57 reviews) | |
Audit trails | Based on 53 Ketch reviews. Shows audit trails of how user consent preferences have changed | 82% (Based on 53 reviews) | |
APIs | As reported in 52 Ketch reviews. Offers APIs to link to your data | 81% (Based on 52 reviews) | |
Mobile SDK | As reported in 43 Ketch reviews. Offers a mobile SDK to use consent management tools on mobile apps | 75% (Based on 43 reviews) | |
Customizable design | Based on 52 Ketch reviews. Offers customizeable designs to match corporate branding | 83% (Based on 52 reviews) | |
Server-side storage | As reported in 45 Ketch reviews. Offers server-side storage of consent, not client-side, for compliance reporting purposes | 80% (Based on 45 reviews) | |
Auto scans | Automatically scan websites to identify web trackers, such as cookies | Not enough data | |
Auto privacy policy update | Automatically updates privacy policies based on scans | Not enough data | |
Cookie notice report | Generates a Cookie Notice report | Not enough data | |
Easy installation | Easy to install on existing websites with simple code | Not enough data | |
Reporting | Regularly sends scan reports to stakeholders | Not enough data | |
Structure type | Searches structured, semi-structured, and unstructured data for sensitive data. | Not enough data | |
Contextual search | Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. | Not enough data | |
Template algorithms | Has template rules and pattern matching algorithms (PII, PCI, PHI and more) | Not enough data | |
Custom algorithms | Offers the option to create custom templates and rules based on department, user type and data type. | Not enough data | |
False-positive management | Offers false-positive management functions | Not enough data | |
Multiple file and location types | Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) | Not enough data | |
Real-time monitoring | Monitors data stores in real-time searching for newly created sensitive data. | Not enough data | |
Dashboard | Offers a dashboard showing specific location of sensitive data. | Not enough data | |
Compliance | Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. | Not enough data | |
Reporting | Offers reporting functionality. | Not enough data |
Agentic AI - Sensitive Data Discovery
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data |