NN — Anonymize your documents containing sensitive data.
- NN is the software that anonymizes documents containing sensitive data.
- It can be used completely offline, without sending files to external services.
- Available for Windows and Linux.
- Supports PDF, Word, Excel and plain text files.
- Recognizes and masks numbers, codes, dates, names and other potentially sensitive data.
- Lets you add or remove masks interactively.
- Lets you define terms that you want to be always masked.
- Also works on entire folders, anonymizing all documents found in batch.
Sign in to manage downloads, licenses and your account securely.
Windows: download the installer and install NN with guided setup.
Linux: download the ZIP, extract the folder and start NN.
Open a document (or a folder) and apply the anonymization procedure interactively.
Immediately see everything you can do:
after login you can download and use NN right away, even before purchasing a license.
In this mode you can enable and test all features, except saving anonymized documents at the different stages
(tagged, cleaned and reconstructed).
You need it because…
NN is useful when you need to share documents, run audits, answer requests, archive or deliver material without exposing personal data or confidential information. It is also especially useful for preparing documents to be uploaded into Artificial Intelligence environments (LLMs, chatbots, RAG systems, internal search engines), reducing the risk of exposing sensitive data during analysis and indexing.
Share documents with clients/suppliers without exposing sensitive data, reducing risks and review time.
Publications, access to records and transparency: quickly redact personal data and confidential information.
Handle reports, attachments and cases without disclosing health data, even in closed operational environments.
Court filings, expert reports and document sharing: protect names and references while keeping the document readable.
Financial statements, tax returns and accounting documents: remove unnecessary data before sending or archiving.
Files and deeds: mask personal data and codes while keeping an orderly and verifiable workflow.
CVs, evaluations, disputes and disciplinary notes: share and archive without exposing unnecessary personal data.
Prepare evidence and reports for internal/external audits, reducing the risk of releasing confidential information.
Deliver analyses and documentation to clients or partners while redacting identifying and sensitive details.
Datasets, interviews and project documents: anonymize before sharing with teams, reviewers or publications.
Claims, expert reports and case files: protect data of insured people and third parties while keeping useful management information.
Reports, KYC and contracts: remove identifying data when exchanging documents with consultants or internal functions.
Tickets, communications and attachments: share examples and cases with teams/vendors without customer data.
Logs, screenshots and evidence: redact users, addresses, references and data before sending to third parties.
Handle GDPR requests, data breaches and reviews: produce safe copies of documents to analyze or forward.
Contracts, offers and evaluations: share documents with stakeholders while reducing exposure of sensitive commercial data.
Cases, beneficiaries and reporting: protect personal data in communications with partners and funders.
Prepare documents to upload into LLMs, chatbots and RAG systems: anonymize before indexing and querying content.
Preview
A screenshot to immediately understand what you will find.
A concrete example of detecting sensitive data: simple interaction and result-oriented workflow.
FAQ
The most common questions. To purchase and download NN, sign in.