Hush-Hush partner

Promote Data Privacy Best Practice In Your Network

Data breaches are one of the largest and most catastrophic disruptors to business.


Secure your supply chain and protect your customers’ interests by recommending Hush-Hush Sensitive Data Discovery and Data Masking tools to your customers and suppliers.


We offer a range of patented data protection solutions suited to your individual customer’s needs and tech stack.

  • Boost your income stream

  • Protect your customers and suppliers

  • Flexible and easy to integrate

  • Zero operational disruption

  • No learning curve

  • Compliance audit-ready

Become part of the Hush-Hush family today.

Become a Partner

Microsoft Partner. We believe in what people make possible. Our mission is to empower every person and every organization on the planet to achieve more.

Telesens International ltd. (London, UK) is one of the European leaders in the development, distribution and support of software systems across a variety of sectors. With its origin in telecommunications, the company was founded in 1998 at a time of rapid growth in the market. Anchored by its cutting-edge, high-performance technical solutions, Telesens soon became a major software development center for businesses in Europe, Asia and USA.

Firm Solutions Inc: FSI is a results-oriented consulting company that transforms business with disruptive innovative technologies by transforming mix of sensors, wireless connectivity, and databases into complete systems while maintaing the highest standards of quality and innovation.

Info Incognito has created a data anonymization service that is used to protect the privacy of individuals and reduce the risk of data breach. We will build an automated process to mask and de-Identify personally identifiable information (PII) that is contained within your electronic records when this data is being used for secondary purposes. De-identification is absolutely required when using protected health information (PHI) for secondary purposes without the patient’s consent. Some examples of secondary purposes include copying production databases and datasets for the purpose of quality assurance testing, software development, research, and outsourced services. Info Incognito supports both the HIPAA Safe Harbor method and the HIPAA Expert Determination method.

BuildNumber = dev_20210906.1