Anonymize your vast stores of sensitive data. Safely. And at scale.

Anonymize your vast stores of sensitive data.
Safely. And at scale.

Meet Eclipse Risk: your enterprise anonymization software

Start earning the trust it takes to innovate.

Innovators earn trust by protecting the privacy of people whose lives populate their large datasets. Safely leveraging this wealth of sensitive data affords you the privilege of driving innovations that benefit everyone.

Automated anonymization software that lets you do more with your data…

  • Anonymizes structured datasets of any size and sensitivity to the highest possible standard, while preserving data utility.
  • Statistically measures and then reduces the likelyhood of people being re-identified
  • Provides auditable proof that your data is no longer identifiable
  • Scales data de-identification across different regulatory jurisdictions including GDPR, HIPAA and CCPA
  • Enables safe data sharing with partners to advance mutual business interests

... and checks the boxes on all your technical requirements, as well.

Your privacy is important. That’s why Eclipse Risk is designed to run on your company’s platform, without any intervention from us. You can install Eclipse Risk on premise or in the cloud (Azure or AWS), securing the perimeter according to your internal protocols.

You can also leverage cloud-native cluster computing services like Amazon EMR or Databricks to take advantage of auto-scaling (better user experience at lower cost, and better support for Data Lake storage).

Your privacy is important. That’s why Eclipse Risk is designed to run on your company’s platform, without any intervention from us. You can install Eclipse Risk on premise or in the cloud (Azure or AWS), securing the perimeter according to your internal protocols.

You can also leverage cloud-native cluster computing services like Amazon EMR or Databricks to take advantage of auto-scaling (better user experience at lower cost, and better support for Data Lake storage).

Eclipse Risk does not store any personal data or protected health information. The source information is read from input data*, processed on main memory by Apache Spark and then, once anonymized, is written into new tables/files on the output data source.

Eclipse Risk supports security of ‘Data at Rest’ as well as ‘Data in Transit’ using encryption and TLS (SSL) as required for all PHI data flows. Includes enterprise security features like Active Directory integration, LDAP, and role-based access controls.

*Our list of supported data types is constantly evolving. Contact us for an up-to-date list.

Eclipse Risk can run manually through your browser or you can choose to automate de-identification jobs via ELT/ETL by calling REST APIs.

Safely leverage your data to drive innovation at scale. Complete the form to talk with our experts about what Eclipse Risk can do for you.

Want to learn more?
Talk with one of our experts.

Sign me up for marketing communications on safely leveraging my sensitive data.
Anita Fineberg

“Privacy Analytics Eclipse provides a sound evidentiary basis for substantiating the claim that personal information is de-identified. It also allows for appropriate security safeguards to protect the data based on an empirically assessed risk of re-identification in the recipient environment.”​

Anita Fineberg, LL.B., CIPP/C, Privacy Lawyer and Consultant

Archiving / Destroying

Are you unleashing the full value of data you retain?

Your Challenges

Do you need help...

OUR SOLUTION

Value Retention

Client Success

Client: Comcast

Situation: California’s Consumer Privacy Act inspired Comcast to evolve the way in which they protect the privacy of customers who consent to share personal information with them.

Evaluating

Are you achieving intended outcomes from data?

Your Challenge

Do you need help...

OUR SOLUTION

Unbiased Results

Client Success

Client: Integrate.ai

Situation: Integrate.ai’s AI-powered tech helps clients improve their online experience by sharing signals about website visitor intent. They wanted to ensure privacy remained fully protected within the machine learning / AI context that produces these signals.

Accessing

Do the right people have the right data?

Your Challenges

Do you need help...

OUR SOLUTION

Usable and Reusable Data

Client Success

Client: Novartis

Situation: Novartis’ digital transformation in drug R&D drives their need to maximize value from vast stores of clinical study data for critical internal research enabled by their data42 platform.

 

Maintaining

Are you empowering people to safely leverage trusted data?

Your Challenges

Do you need help...

OUR SOLUTION

Security / compliance efficiency

CLIENT SUCCESS

Client: ASCO’s CancerLinQ

Situation: CancerLinQ™, a subsidiary of American Society of Clinical Oncology, is a rapid learning healthcare system that helps oncologists aggregate and analyze data on cancer patients to improve care. To achieve this goal, they must de-identify patient data provided by subscribing practices across the U.S.

 

Acquiring / Collecting

Are you acquiring the right data? Do you have appropriate consent?

Your Challenge

Do you need help...

OUR SOLUTIONS

Consent / Contracting strategy

Client Success

Client: IQVIA

Situation: Needed to ensure the primary market research process was fully compliant with internal policies and regulations such as GDPR. 

 

Planning

Are You Effectively Planning for Success?

Your Challenges

Do you need help...

OUR SOLUTION

Build privacy in by design

Client Success

Client: Nuance

Situation: Needed to enable AI-driven product innovation with a defensible governance program for the safe and responsible use
of voice-to-text data under Shrems II.

 

Join the next 5 Safes Data Privacy webinar

This course runs on the 2nd Wednesday of every month, at 11 a.m. ET (45 mins). Click the button to register and select the date that works best for you.