Loading...
Browse 1,081 data protection tools
Enhancement for Delphix that masks JSON and XML data in databases and files
Enhancement for Delphix that masks JSON and XML data in databases and files
Managed VPN service offering site-to-site and remote user connectivity
PII de-identification vault with patented PolyAnonymization technology
PII de-identification vault with patented PolyAnonymization technology
Decentralized biometric storage & matching platform using privacy-by-design
Decentralized biometric storage & matching platform using privacy-by-design
Identity management platform using biometrics and decentralized architecture
Identity management platform using biometrics and decentralized architecture
Decentralized biometric storage system using distributed cloud architecture
Decentralized biometric storage system using distributed cloud architecture
Backup solution for Google Workspace data including Gmail, Drive, and Chat
Backup solution for Google Workspace data including Gmail, Drive, and Chat
Backup solution for Microsoft Azure cloud data with local storage control
Backup solution for Microsoft Azure cloud data with local storage control
Backup solution for Amazon S3 cloud storage data protection and recovery
Backup solution for Amazon S3 cloud storage data protection and recovery
Enterprise security platform focused on preventing data exfiltration
Enterprise security platform focused on preventing data exfiltration
Real-time AI usage control at endpoints to prevent data loss
AI usage control & insider threat detection via endpoint behavioral monitoring
AI usage control & insider threat detection via endpoint behavioral monitoring
Customizable security log generation with code-based rules for SIEM enrichment
Customizable security log generation with code-based rules for SIEM enrichment
Edge AI security for in-vehicle systems against prompt injection attacks
Edge AI security for in-vehicle systems against prompt injection attacks
Managed cybersecurity services for enterprise security operations
Managed cybersecurity services for enterprise security operations
Managed backup and disaster recovery service with ransomware protection
Managed backup and disaster recovery service with ransomware protection
End-to-end LLM security platform protecting against attacks and data leakage
End-to-end LLM security platform protecting against attacks and data leakage
Secures data integrity of datasets for computer vision models
Secures data integrity of datasets for computer vision models
Unified search, archiving & compliance for UCC data across voice, video, chat
Unified search, archiving & compliance for UCC data across voice, video, chat
AI-powered compliance supervision for digital communications and collaboration
AI-powered compliance supervision for digital communications and collaboration
Captures chat messages from UC platforms and integrates them into archives
Captures chat messages from UC platforms and integrates them into archives
Mobile messaging archiving, compliance & security for enterprise comms
Mobile messaging archiving, compliance & security for enterprise comms
Quantum Key Distribution appliance for unconditional data security
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance