Loading...
Browse 192 data loss prevention tools
Email security platform with AI-based threat detection and DLP capabilities
Email security platform with AI-based threat detection and DLP capabilities
Zero trust platform securing users, workloads, and devices across networks
Zero trust platform securing users, workloads, and devices across networks
Cloud-based zero trust platform for secure access to apps and workloads
Cloud-based zero trust platform for secure access to apps and workloads
Cloud-based DLP solution for web, email, endpoint, SaaS, and private apps
Cloud-based DLP solution for web, email, endpoint, SaaS, and private apps
ZTNA solution providing secure user-to-app access without network exposure
ZTNA solution providing secure user-to-app access without network exposure
CASB for securing SaaS and IaaS with inline and out-of-band protection
CASB for securing SaaS and IaaS with inline and out-of-band protection
AI security platform protecting against data loss, attacks, and AI threats
AI security platform protecting against data loss, attacks, and AI threats
AI-powered email security for M365 with phishing protection & remediation
AI-powered email security for M365 with phishing protection & remediation
AI-powered anti-phishing solution for Microsoft 365 environments
AI-powered anti-phishing solution for Microsoft 365 environments
Enterprise DLP solution for preventing data loss across endpoints, cloud, email
Enterprise DLP solution for preventing data loss across endpoints, cloud, email
Security platform for GenAI adoption with data protection and Shadow AI detection
Security platform for GenAI adoption with data protection and Shadow AI detection
Platform for securing AI models and autonomous agents across their lifecycle
Platform for securing AI models and autonomous agents across their lifecycle
MSSP offering managed SOC, MDR, compliance, DLP, and vulnerability services
MSSP offering managed SOC, MDR, compliance, DLP, and vulnerability services
Cloud-based email security service blocking phishing, spam, and malware
Cloud-based email security service blocking phishing, spam, and malware
Secure file transfer system with encryption, malware scanning, and CDR
Secure file transfer system with encryption, malware scanning, and CDR
AI-powered platform for detecting and mitigating insider threats and risks
AI-powered platform for detecting and mitigating insider threats and risks
Managed data security service with DLP and insider risk management
Managed data security service with DLP and insider risk management
Outbound email security with automated encryption and DLP for compliance
Outbound email security with automated encryption and DLP for compliance
Secure email gateway with automated DLP and zero-knowledge encryption
Secure email gateway with automated DLP and zero-knowledge encryption
DLP & compliance platform for collaboration tools like Slack and MS Teams
DLP & compliance platform for collaboration tools like Slack and MS Teams
Automated data discovery & classification for sensitive data across on-prem & cloud
Automated data discovery & classification for sensitive data across on-prem & cloud
On-premises data discovery, classification, and monitoring with AI detection
On-premises data discovery, classification, and monitoring with AI detection
Encrypted file sharing and collaboration platform with end-to-end encryption
Encrypted file sharing and collaboration platform with end-to-end encryption
Email encryption solution for securing sensitive data in email communications
Email encryption solution for securing sensitive data in email communications
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.