Loading...
Data Security Posture Management platforms for discovering, classifying, and securing sensitive data across cloud and on-premises environments.
Browse 269 data security posture management tools
Security data fabric architecture for unified security data management
Security data fabric architecture for unified security data management
AI-first data intelligence platform for unified visibility & control
AI-first data intelligence platform for unified visibility & control
Software-defined file and object storage platform for hybrid cloud environments
Software-defined file and object storage platform for hybrid cloud environments
Cloud-delivered analytics platform for IT visibility across hybrid/multi-cloud
Cloud-delivered analytics platform for IT visibility across hybrid/multi-cloud
Data security platform with real-time policy enforcement and access control
Data security platform with real-time policy enforcement and access control
Data access governance platform for visibility, monitoring, and enforcement
Data access governance platform for visibility, monitoring, and enforcement
Data-centric security platform with encryption and access controls for data
Data-centric security platform with encryption and access controls for data
AI-powered DSPM for data discovery, classification, and risk remediation
AI-powered DSPM for data discovery, classification, and risk remediation
Data management platform for data quality, migration, and governance
Data management platform for data quality, migration, and governance
Enterprise metadata mgmt & AIOps platform for IT landscape visibility & governance
Enterprise metadata mgmt & AIOps platform for IT landscape visibility & governance
GenAI-native platform for data analytics, governance, and AI operations
GenAI-native platform for data analytics, governance, and AI operations
Data protection platform with security posture scoring and threat detection
Data protection platform with security posture scoring and threat detection
File storage optimization solution (EOA announced, migrating to Risk Analysis)
File storage optimization solution (EOA announced, migrating to Risk Analysis)
Data protection service with encryption, access controls, and compliance
Data protection service with encryption, access controls, and compliance
DSPM solution for discovering & classifying sensitive data in cloud workloads
DSPM solution for discovering & classifying sensitive data in cloud workloads
CDR solution that sanitizes files to remove malware while preserving functionality
CDR solution that sanitizes files to remove malware while preserving functionality
Unified data security platform for discovery, classification, encryption & key mgmt
Unified data security platform for discovery, classification, encryption & key mgmt
Data-at-rest encryption solution with centralized key mgmt and access controls
Data-at-rest encryption solution with centralized key mgmt and access controls
Enterprise data protection platform for databases, big data, and applications
Enterprise data protection platform for databases, big data, and applications
Centralized platform for managing field-level data protection policies
Centralized platform for managing field-level data protection policies
DSPM solution for Kubernetes & AWS environments with real-time data discovery
DSPM solution for Kubernetes & AWS environments with real-time data discovery
Discovers, classifies, and redacts sensitive data across SaaS, cloud, and endpoints
Discovers, classifies, and redacts sensitive data across SaaS, cloud, and endpoints
Automated remediation platform for data security risks and access control
Automated remediation platform for data security risks and access control
AI-powered data identity graph linking sensitive data to identities & access
AI-powered data identity graph linking sensitive data to identities & access
Common questions about Data Security Posture Management tools including selection guides, pricing, and comparisons.
Data Security Posture Management platforms for discovering, classifying, and securing sensitive data across cloud and on-premises environments.
Get strategic cybersecurity insights in your inbox