Loading...
Data Security Posture Management platforms for discovering, classifying, and securing sensitive data across cloud and on-premises environments.
Browse 138 data security posture management tools
DSPM services for discovering, classifying, and protecting sensitive data
DSPM services for discovering, classifying, and protecting sensitive data
Quantum security platform protecting confidential data across environments
Quantum security platform protecting confidential data across environments
Quantum-resistant file sharing service with encryption and secure storage
Quantum-resistant file sharing service with encryption and secure storage
Long-term log storage solution for SOC teams separate from SIEM systems
Long-term log storage solution for SOC teams separate from SIEM systems
Data management and security platform with discovery and classification tech.
Data management and security platform with discovery and classification tech.
Data security, governance, and management platform with discovery and classification
Data security, governance, and management platform with discovery and classification
Metadata lake for enterprise data visibility, governance, and security
Metadata lake for enterprise data visibility, governance, and security
Free tool for discovering and classifying sensitive data in Snowflake
Free tool for discovering and classifying sensitive data in Snowflake
Quantum-resistant decentralized cloud storage with QRNG-based encryption
Quantum-resistant decentralized cloud storage with QRNG-based encryption
Secure file sharing and storage platform with compliance certifications
Secure file sharing and storage platform with compliance certifications
Cloud storage with patented encryption key management and quantum-safe security
Cloud storage with patented encryption key management and quantum-safe security
Data governance & security platform for managing data policies & access control
Data governance & security platform for managing data policies & access control
Proactive secure data governance solution
Proactive secure data governance solution
Software cryptographic library with embedded countermeasures for attacks
Software cryptographic library with embedded countermeasures for attacks
Hardware IP cores for block cipher encryption algorithms and modes
Hardware IP cores for block cipher encryption algorithms and modes
Hardware IP for memory encryption and protection against physical attacks
Hardware IP for memory encryption and protection against physical attacks
CDR service via API/ICAP for inline file sanitization and threat elimination
CDR service via API/ICAP for inline file sanitization and threat elimination
Secures DICOM medical imaging files from malware before upload to healthcare networks
Secures DICOM medical imaging files from malware before upload to healthcare networks
Centralized data access control platform for multi-cloud environments
Centralized data access control platform for multi-cloud environments
Secure vaulting solution for storing and managing sensitive data
Secure vaulting solution for storing and managing sensitive data
Cloud-based secure file sharing platform with encryption and access controls
Cloud-based secure file sharing platform with encryption and access controls
Free data risk assessment service identifying misconfigurations and risks.
Free data risk assessment service identifying misconfigurations and risks.
Data access governance software for discovering, reviewing, and controlling access
Data access governance software for discovering, reviewing, and controlling access
Unified platform for auditing, threat detection & data security across AD & M365
Unified platform for auditing, threat detection & data security across AD & M365
Common questions about Data Security Posture Management tools including selection guides, pricing, and comparisons.
Data Security Posture Management platforms for discovering, classifying, and securing sensitive data across cloud and on-premises environments.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox