Loading...
Browse 1,081 data protection tools
Enterprise platform for secure multi-model generative AI deployment & governance
Enterprise platform for secure multi-model generative AI deployment & governance
Quantum Key Distribution system for ultra-secure communications
DLP solution monitoring & blocking data leaks via email, cloud, USB channels
DLP solution monitoring & blocking data leaks via email, cloud, USB channels
One-time pad encryption system for secure data transmission over internet
DLP solution preventing data leaks via email, cloud, devices, and USB transfers
DLP solution preventing data leaks via email, cloud, devices, and USB transfers
Local computer repair service offering virus removal and malware cleaning
Local computer repair service offering virus removal and malware cleaning
Real-time ransomware attack deflection through deception and diversion
Real-time ransomware attack deflection through deception and diversion
Automates human capital data verification & compliance with identity control
Automates human capital data verification & compliance with identity control
FHE-based encryption for AI models, vector databases, and RAG workflows
FHE-based encryption for AI models, vector databases, and RAG workflows
FHE-powered vector database security platform for AI/LLM data protection
FHE-powered vector database security platform for AI/LLM data protection
GenAI data protection platform preventing leaks and governing shadow AI
GenAI data protection platform preventing leaks and governing shadow AI
Endpoint protection with ransomware defense, web filtering, and Tally backup
Endpoint protection with ransomware defense, web filtering, and Tally backup
AI-driven data anonymization & redaction software for documents & databases
AI-driven data anonymization & redaction software for documents & databases
Confidential AI platform for deploying AI agents on sensitive data securely
Confidential AI platform for deploying AI agents on sensitive data securely
Confidential computing platform for secure RAG and AI agent workflows
Confidential computing platform for secure RAG and AI agent workflows
Enables secure analytics across data silos using cryptographic verification
Enables secure analytics across data silos using cryptographic verification
Database activity monitoring and protection platform for data security
Zero Trust assessment service for Microsoft 365 environments
Zero Trust assessment service for Microsoft 365 environments
M365 security assessment service evaluating identity, devices, and data protection
M365 security assessment service evaluating identity, devices, and data protection
Risk management and cybersecurity consulting services provider
Enterprise encryption solution for data protection across endpoints and cloud
Enterprise encryption solution for data protection across endpoints and cloud
DLP solution protecting data from theft, malware, and accidental loss
DLP solution protecting data from theft, malware, and accidental loss
DLP solution with data classification and protection across endpoints and cloud
DLP solution with data classification and protection across endpoints and cloud
Insider threat detection platform monitoring user activity and data access
Insider threat detection platform monitoring user activity and data access
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance