Loading...
Data protection tools and solutions for data encryption, backup, classification, loss prevention, and privacy compliance.
Explore 238 curated cybersecurity tools, with 15,336 visitors searching for solutions
HIPAA-compliant secure file sharing and collaboration platform for healthcare
HIPAA-compliant secure file sharing and collaboration platform for healthcare
Secure file sharing platform with encryption, access controls, and audit logs
Secure file sharing platform with encryption, access controls, and audit logs
Unified zero-trust platform for securing sensitive data across communication channels
Unified zero-trust platform for securing sensitive data across communication channels
Secure data collection platform with compliance monitoring and data sovereignty
Secure data collection platform with compliance monitoring and data sovereignty
Cloud data security posture mgmt with discovery, classification & risk scoring
Cloud data security posture mgmt with discovery, classification & risk scoring
Cloud-native DLP for protecting sensitive data across users, locations, and clouds
Cloud-native DLP for protecting sensitive data across users, locations, and clouds
Managed DLP service with SOC support for data security programs
Managed DLP service with SOC support for data security programs
AI-driven DLP solution for real-time data classification and protection
AI-driven DLP solution for real-time data classification and protection
AI-driven data classification platform for sensitive data discovery & labeling
AI-driven data classification platform for sensitive data discovery & labeling
Risk calculator for estimating data classification time, costs, and exposure
Risk calculator for estimating data classification time, costs, and exposure
AI-driven data classification software for automated document labeling
AI-driven data classification software for automated document labeling
DSPM platform for multi-cloud data security and compliance monitoring
DSPM platform for multi-cloud data security and compliance monitoring
Detects sensitive data (PII, PHI, PCI) across application stacks
Detects sensitive data (PII, PHI, PCI) across application stacks
Encrypted cloud storage with end-to-end encryption and file sharing
Encrypted cloud storage with end-to-end encryption and file sharing
Secures AI agent data access with policy-based controls and monitoring
Secures AI agent data access with policy-based controls and monitoring
Scans logs and data streams to detect and redact sensitive data in real-time.
Scans logs and data streams to detect and redact sensitive data in real-time.
DSPM solution for discovering, protecting sensitive data & managing compliance
DSPM solution for discovering, protecting sensitive data & managing compliance
DLP platform protecting sensitive data across endpoints, networks, and cloud
DLP platform protecting sensitive data across endpoints, networks, and cloud
DSPM platform for discovering, classifying & protecting sensitive data
DSPM platform for discovering, classifying & protecting sensitive data
DSPM solution for discovering, classifying, and securing sensitive data
DSPM solution for discovering, classifying, and securing sensitive data
AI-powered DLP solution that detects, monitors, and protects data in motion
AI-powered DLP solution that detects, monitors, and protects data in motion
Tracks and audits data access activity for humans and AI across cloud data
Tracks and audits data access activity for humans and AI across cloud data
Unified AI data security platform for DSPM, IAM, and DLP capabilities
Unified AI data security platform for DSPM, IAM, and DLP capabilities
Endpoint DLP solution for discovering, protecting, and monitoring sensitive data
Endpoint DLP solution for discovering, protecting, and monitoring sensitive data
Common questions about Data Protection tools including selection guides, pricing, and comparisons.
Data protection tools and solutions for data encryption, backup, classification, loss prevention, and privacy compliance.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs