Loading...
Data protection tools and solutions for data encryption, backup, classification, loss prevention, and privacy compliance.
Browse 784 data protection tools
Browser-based DLP solution preventing sensitive data loss via web traffic
Browser-based DLP solution preventing sensitive data loss via web traffic
Audits SQL Server configuration and permission changes with real-time alerts.
Audits SQL Server configuration and permission changes with real-time alerts.
Audits file activity & classifies data on Dell EMC Isilon storage systems.
Audits file activity & classifies data on Dell EMC Isilon storage systems.
Free data risk assessment service identifying misconfigurations and risks.
Free data risk assessment service identifying misconfigurations and risks.
Data access governance software for discovering, reviewing, and controlling access
Data access governance software for discovering, reviewing, and controlling access
Unified platform for auditing, threat detection & data security across AD & M365
Unified platform for auditing, threat detection & data security across AD & M365
Cloud-based endpoint backup solution with automated data protection and recovery
Cloud-based endpoint backup solution with automated data protection and recovery
Enterprise data protection platform with encryption, key mgmt & PKI solutions
Enterprise data protection platform with encryption, key mgmt & PKI solutions
Data backup and recovery service for business continuity and data protection
Data backup and recovery service for business continuity and data protection
Ransomware detection & snapshot verification for Infinidat storage systems
Ransomware detection & snapshot verification for Infinidat storage systems
Ransomware detection & recovery for IBM FlashSystem storage snapshots
Ransomware detection & recovery for IBM FlashSystem storage snapshots
AI-powered ransomware detection and data corruption recovery solution
AI-powered ransomware detection and data corruption recovery solution
AI-driven ransomware detection for backup data integrity and recovery
AI-driven ransomware detection for backup data integrity and recovery
Ransomware protection and backup solution for data recovery
Ransomware protection and backup solution for data recovery
ICAP server providing real-time threat removal using CDR technology
ICAP server providing real-time threat removal using CDR technology
Automated file redaction tool for sensitive data in documents and metadata.
Automated file redaction tool for sensitive data in documents and metadata.
Payment page security solution with tokenization for PCI DSS compliance
Payment page security solution with tokenization for PCI DSS compliance
Enterprise data security platform for encryption, key mgmt & access control
Enterprise data security platform for encryption, key mgmt & access control
Cryptographic technique for secure dataset intersection without revealing data
Cryptographic technique for secure dataset intersection without revealing data
Cryptographic protocol for secure multi-party data analysis without revealing inputs
Cryptographic protocol for secure multi-party data analysis without revealing inputs
FHE solution enabling computation on encrypted data without decryption
FHE solution enabling computation on encrypted data without decryption
Network-based DLP integrated into firewall for data leak prevention
Network-based DLP integrated into firewall for data leak prevention
Managed cloud backup service for VMs, files, and databases with encryption
Managed cloud backup service for VMs, files, and databases with encryption
Data discovery and classification platform for GDPR compliance and data protection
Data discovery and classification platform for GDPR compliance and data protection
Common questions about Data Protection tools including selection guides, pricing, and comparisons.
Data protection tools and solutions for data encryption, backup, classification, loss prevention, and privacy compliance.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Agentless cloud security platform for risk detection & prevention
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox