Loading...
Data Security Posture Management platforms for discovering, classifying, and securing sensitive data across cloud and on-premises environments.
Browse 93 data security posture management tools
Data-centric security platform with encryption and access controls for data
Data-centric security platform with encryption and access controls for data
Data management platform for data quality, migration, and governance
Data management platform for data quality, migration, and governance
Enterprise metadata mgmt & AIOps platform for IT landscape visibility & governance
Enterprise metadata mgmt & AIOps platform for IT landscape visibility & governance
GenAI-native platform for data analytics, governance, and AI operations
GenAI-native platform for data analytics, governance, and AI operations
Data protection platform with security posture scoring and threat detection
Data protection platform with security posture scoring and threat detection
File storage optimization solution (EOA announced, migrating to Risk Analysis)
File storage optimization solution (EOA announced, migrating to Risk Analysis)
Data protection service with encryption, access controls, and compliance
Data protection service with encryption, access controls, and compliance
DSPM solution for discovering & classifying sensitive data in cloud workloads
DSPM solution for discovering & classifying sensitive data in cloud workloads
CDR solution that sanitizes files to remove malware while preserving functionality
CDR solution that sanitizes files to remove malware while preserving functionality
Unified data security platform for discovery, classification, encryption & key mgmt
Unified data security platform for discovery, classification, encryption & key mgmt
Data-at-rest encryption solution with centralized key mgmt and access controls
Data-at-rest encryption solution with centralized key mgmt and access controls
Enterprise data protection platform for databases, big data, and applications
Enterprise data protection platform for databases, big data, and applications
Centralized platform for managing field-level data protection policies
Centralized platform for managing field-level data protection policies
DSPM solution for Kubernetes & AWS environments with real-time data discovery
DSPM solution for Kubernetes & AWS environments with real-time data discovery
Discovers, classifies, and redacts sensitive data across SaaS, cloud, and endpoints
Discovers, classifies, and redacts sensitive data across SaaS, cloud, and endpoints
Automated remediation platform for data security risks and access control
Automated remediation platform for data security risks and access control
AI-powered data identity graph linking sensitive data to identities & access
AI-powered data identity graph linking sensitive data to identities & access
Unified platform for data discovery, security, governance, privacy & compliance
Unified platform for data discovery, security, governance, privacy & compliance
AI-powered data security platform with autonomous agents for data protection
AI-powered data security platform with autonomous agents for data protection
AI-based data discovery & classification platform for cloud environments
AI-based data discovery & classification platform for cloud environments
Cloud-native DSPM platform for data discovery, classification, and risk mgmt.
Cloud-native DSPM platform for data discovery, classification, and risk mgmt.
SSE-enabled DSPM solution for discovering, classifying, and securing data
SSE-enabled DSPM solution for discovering, classifying, and securing data
DSPM and DDR platform for data discovery, classification, monitoring & response
DSPM and DDR platform for data discovery, classification, monitoring & response
DSPM solution with AI classification, data lineage tracking, and DLP controls
DSPM solution with AI classification, data lineage tracking, and DLP controls
Common questions about Data Security Posture Management tools including selection guides, pricing, and comparisons.
Data Security Posture Management platforms for discovering, classifying, and securing sensitive data across cloud and on-premises environments.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Get strategic cybersecurity insights in your inbox