Loading...
Data protection tools and solutions for data encryption, backup, classification, loss prevention, and privacy compliance.
Browse 785 data protection tools
Self-hosted enterprise file sync & share solution deployed on Oracle Cloud.
Self-hosted enterprise file sync & share solution deployed on Oracle Cloud.
Self-hosted enterprise file sharing with DLP, DRM, compliance, and hybrid cloud.
Self-hosted enterprise file sharing with DLP, DRM, compliance, and hybrid cloud.
On-prem EFSS solution for file sync, sharing & compliance on Windows.
On-prem EFSS solution for file sync, sharing & compliance on Windows.
On-premises file sync, share & compliance platform for Linux infrastructure.
On-premises file sync, share & compliance platform for Linux infrastructure.
Self-hosted file sharing server with remote access, sync, and security controls.
Self-hosted file sharing server with remote access, sync, and security controls.
Enterprise cloud file storage with collaboration, DLP, and compliance tools.
Enterprise cloud file storage with collaboration, DLP, and compliance tools.
Enterprise secure cloud storage with file sharing, DLP, and compliance tools.
Enterprise secure cloud storage with file sharing, DLP, and compliance tools.
EFSS platform enabling geographic data storage control for regulatory compliance.
EFSS platform enabling geographic data storage control for regulatory compliance.
Enterprise secure file transfer with E2E encryption and compliance tools.
Enterprise secure file transfer with E2E encryption and compliance tools.
Enterprise secure file storage & sharing with AES-256 encryption and DLP.
Enterprise secure file storage & sharing with AES-256 encryption and DLP.
File sharing platform for data sovereignty, residency, and compliance.
File sharing platform for data sovereignty, residency, and compliance.
Cryptographic post-authentication data use policy enforcement platform.
Cryptographic post-authentication data use policy enforcement platform.
EFSS platform for secure file sharing across China without a VPN.
File-level encryption platform with dynamic access controls for post-auth data security.
File-level encryption platform with dynamic access controls for post-auth data security.
Enterprise file sharing platform with on-prem, cloud, and hybrid deployment.
Enterprise file sharing platform with on-prem, cloud, and hybrid deployment.
Self-hosted & cloud secure file sharing portal with encryption & compliance.
Self-hosted & cloud secure file sharing portal with encryption & compliance.
HIPAA-compliant cloud storage & file sharing platform for ePHI protection.
HIPAA-compliant cloud storage & file sharing platform for ePHI protection.
Self-hosted file sharing & client portal with DLP, encryption & audit logs.
Self-hosted file sharing & client portal with DLP, encryption & audit logs.
ETL & JDBC-based data-at-rest protection with access control & policy mgmt.
ETL & JDBC-based data-at-rest protection with access control & policy mgmt.
Data classification, privacy & sovereignty platform with ABAC controls.
Unified platform for data sovereignty, encryption, and cross-border compliance.
Unified platform for data sovereignty, encryption, and cross-border compliance.
Automated sensitive data discovery and classification for compliance.
Automated sensitive data discovery and classification for compliance.
Client-side encryption for cloud/web apps with customer-held key mgmt.
PET suite for encrypted search and ML across data boundaries.
PET suite for encrypted search and ML across data boundaries.
Common questions about Data Protection tools including selection guides, pricing, and comparisons.
Data protection tools and solutions for data encryption, backup, classification, loss prevention, and privacy compliance.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Agentless cloud security platform for risk detection & prevention
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox