Loading...
Browse 1,081 data protection tools
SaaS platform for ransomware protection via automated file encryption & monitoring.
SaaS platform for ransomware protection via automated file encryption & monitoring.
360° cybersecurity diagnostic service covering infra, apps, endpoints, IAM & data.
360° cybersecurity diagnostic service covering infra, apps, endpoints, IAM & data.
Managed data protection service covering encryption, DLP, backup, and compliance.
Managed data protection service covering encryption, DLP, backup, and compliance.
Managed DLP service to prevent unauthorized sensitive data loss.
Managed DLP service to prevent unauthorized sensitive data loss.
Cloud file sharing platform with built-in IRM for enterprise doc security.
Cloud file sharing platform with built-in IRM for enterprise doc security.
Gmail & Outlook add-in securing email attachments via IRM technology.
Android app for encrypting and securing files with cloud sync capabilities
Android app for encrypting and securing files with cloud sync capabilities
Encrypted cloud storage for law firms with end-to-end encryption and sharing
Encrypted cloud storage for law firms with end-to-end encryption and sharing
Mobile file encryption and cloud backup app for iOS devices
Encrypted cloud document storage for business with secure file sharing
Encrypted cloud document storage for business with secure file sharing
Data protection suite for securing data in public cloud environments
Data protection suite for securing data in public cloud environments
Post-quantum photonic layer security for data-in-transit protection
Post-quantum photonic layer security for data-in-transit protection
GLBA compliance monitoring for financial institutions' websites and apps
GLBA compliance monitoring for financial institutions' websites and apps
Confidential computing platform securing workloads with encrypted containers
Confidential computing platform securing workloads with encrypted containers
Proactive attack surface protection preventing info exposure about employees
Proactive attack surface protection preventing info exposure about employees
AI security platform protecting training data from poisoning and leakage
AI security platform protecting training data from poisoning and leakage
Physical air-gapped recovery device for restoring critical systems post-breach
Physical air-gapped recovery device for restoring critical systems post-breach
CIAM solutions for secure customer access to digital services and apps
CIAM solutions for secure customer access to digital services and apps
Generates random email addresses to mask real email and protect identity
Generates random email addresses to mask real email and protect identity
AI assistant security platform for data access control and audit trails
AI assistant security platform for data access control and audit trails
Protects AI applications and data from prompt injection attacks
Protects AI applications and data from prompt injection attacks
Privacy-preserving AI inference platform using Fully Homomorphic Encryption
Privacy-preserving AI inference platform using Fully Homomorphic Encryption
Maps knowledge graphs for AI assistant data access control and security
Maps knowledge graphs for AI assistant data access control and security
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance