Loading...
Data protection tools and solutions for data encryption, backup, classification, loss prevention, and privacy compliance. Task: Data Security
Explore 133 curated cybersecurity tools, with 14,275 visitors searching for solutions
Data-centric security platform with encryption and access controls for data
Data-centric security platform with encryption and access controls for data
Free SSL tools to generate and decode CSRs, convert cert files, and check installs
Free SSL tools to generate and decode CSRs, convert cert files, and check installs
Data management platform for data quality, migration, and governance
Data management platform for data quality, migration, and governance
GenAI-native platform for data analytics, governance, and AI operations
GenAI-native platform for data analytics, governance, and AI operations
Managed data security service with DLP and insider risk management
Managed data security service with DLP and insider risk management
Cloud storage solution for enterprise data backup, archival, and file transfer
Cloud storage solution for enterprise data backup, archival, and file transfer
File storage optimization solution (EOA announced, migrating to Risk Analysis)
File storage optimization solution (EOA announced, migrating to Risk Analysis)
Data protection service with encryption, access controls, and compliance
Data protection service with encryption, access controls, and compliance
DSPM solution for discovering & classifying sensitive data in cloud workloads
DSPM solution for discovering & classifying sensitive data in cloud workloads
CDR solution that sanitizes files to remove malware while preserving functionality
CDR solution that sanitizes files to remove malware while preserving functionality
Zero Trust platform for real-time data masking and file-borne threat prevention
Zero Trust platform for real-time data masking and file-borne threat prevention
Discovers and classifies sensitive data across enterprise environments
Discovers and classifies sensitive data across enterprise environments
Unified data security platform for discovery, classification, encryption & key mgmt
Unified data security platform for discovery, classification, encryption & key mgmt
Data-at-rest encryption solution with centralized key mgmt and access controls
Data-at-rest encryption solution with centralized key mgmt and access controls
Enterprise data protection platform for databases, big data, and applications
Enterprise data protection platform for databases, big data, and applications
Centralized platform for managing field-level data protection policies
Centralized platform for managing field-level data protection policies
Automated data discovery & classification for sensitive data across on-prem & cloud
Automated data discovery & classification for sensitive data across on-prem & cloud
On-premises data discovery, classification, and monitoring with AI detection
On-premises data discovery, classification, and monitoring with AI detection
DSPM solution for Kubernetes & AWS environments with real-time data discovery
DSPM solution for Kubernetes & AWS environments with real-time data discovery
Discovers, classifies, and redacts sensitive data across SaaS, cloud, and endpoints
Discovers, classifies, and redacts sensitive data across SaaS, cloud, and endpoints
Scans & remediates PII, PHI, PCI data across SaaS, cloud, endpoints & databases
Scans & remediates PII, PHI, PCI data across SaaS, cloud, endpoints & databases
DLP solution for Mac endpoints with real-time monitoring and data protection
DLP solution for Mac endpoints with real-time monitoring and data protection
DLP solution for Linux systems to prevent data leaks and protect sensitive data
DLP solution for Linux systems to prevent data leaks and protect sensitive data
Data security platform for protecting data across hybrid cloud and AI environments
Data security platform for protecting data across hybrid cloud and AI environments
Get the latest cybersecurity updates in your inbox
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs