Loading...
Data Security Posture Management platforms for discovering, classifying, and securing sensitive data across cloud and on-premises environments.
Browse 138 data security posture management tools
DSPM platform for multi-cloud data security and compliance monitoring
DSPM platform for multi-cloud data security and compliance monitoring
Encrypted cloud storage with end-to-end encryption and file sharing
Encrypted cloud storage with end-to-end encryption and file sharing
Secures AI agent data access with policy-based controls and monitoring
Secures AI agent data access with policy-based controls and monitoring
DSPM solution for discovering, protecting sensitive data & managing compliance
DSPM solution for discovering, protecting sensitive data & managing compliance
DSPM platform for discovering, classifying & protecting sensitive data
DSPM platform for discovering, classifying & protecting sensitive data
DSPM solution for discovering, classifying, and securing sensitive data
DSPM solution for discovering, classifying, and securing sensitive data
Tracks and audits data access activity for humans and AI across cloud data
Tracks and audits data access activity for humans and AI across cloud data
Unified AI data security platform for DSPM, IAM, and DLP capabilities
Unified AI data security platform for DSPM, IAM, and DLP capabilities
AI-powered cloud storage security for zero-day threat prevention
AI-powered cloud storage security for zero-day threat prevention
Scans files in applications to prevent zero-day malware and ransomware
Scans files in applications to prevent zero-day malware and ransomware
Deep learning-based malware detection for NAS storage environments
Deep learning-based malware detection for NAS storage environments
Data security platform with CDR, data masking, and threat analytics
Data security platform with CDR, data masking, and threat analytics
Enterprise-scale data security platform for multicloud and hybrid environments
Enterprise-scale data security platform for multicloud and hybrid environments
Enterprise data security platform with DSPM, DLP, privacy, and AI security
Enterprise data security platform with DSPM, DLP, privacy, and AI security
Enterprise data protection platform with encryption, key mgmt, and HSMs
Enterprise data protection platform with encryption, key mgmt, and HSMs
Data security platform for AI workflows with protection, governance & privacy
Data security platform for AI workflows with protection, governance & privacy
Encryption platform protecting data in transit and at rest with key management
Encryption platform protecting data in transit and at rest with key management
Real-time data observability platform combining DSPM, DDR, and DAG capabilities
Real-time data observability platform combining DSPM, DDR, and DAG capabilities
Identity-centric DSPM platform for data discovery, classification & governance
Identity-centric DSPM platform for data discovery, classification & governance
Edge data security platform for discovering and managing sensitive data risks
Edge data security platform for discovering and managing sensitive data risks
DSPM platform for data visibility, access control, and compliance across clouds
DSPM platform for data visibility, access control, and compliance across clouds
Data security platform for discovering, analyzing, and remediating sensitive data
Data security platform for discovering, analyzing, and remediating sensitive data
AI-powered DSPM platform for data discovery, classification, and protection
AI-powered DSPM platform for data discovery, classification, and protection
DSPM platform for data discovery, classification, access control, and AI governance
DSPM platform for data discovery, classification, access control, and AI governance
Common questions about Data Security Posture Management tools including selection guides, pricing, and comparisons.
Data Security Posture Management platforms for discovering, classifying, and securing sensitive data across cloud and on-premises environments.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Get strategic cybersecurity insights in your inbox