Loading...
Browse 1,081 data protection tools
DSPM platform that discovers, classifies, and protects data with automated remediation
DSPM platform that discovers, classifies, and protects data with automated remediation
Privacy management platform for data mapping, DSRs, consent, and risk assessments
Privacy management platform for data mapping, DSRs, consent, and risk assessments
Zero Trust Network Access platform for cloud, on-premises, and hybrid apps
Zero Trust Network Access platform for cloud, on-premises, and hybrid apps
Detects and prevents insider threats with visibility into risky user behavior
Detects and prevents insider threats with visibility into risky user behavior
Endpoint DLP solution for detecting, classifying, and controlling sensitive data
Endpoint DLP solution for detecting, classifying, and controlling sensitive data
Unified endpoint security platform integrating anti-malware, EDR, and mgmt tools
Unified endpoint security platform integrating anti-malware, EDR, and mgmt tools
DLP solution for preventing data exfiltration via outbound email channels
DLP solution for preventing data exfiltration via outbound email channels
Agentless data security platform for discovery, monitoring, and access control
Agentless data security platform for discovery, monitoring, and access control
Microsoft SEAL is an open-source homomorphic encryption library that enables arithmetic computations on encrypted data without decryption, supporting privacy-preserving applications across multiple platforms.
Microsoft SEAL is an open-source homomorphic encryption library that enables arithmetic computations on encrypted data without decryption, supporting privacy-preserving applications across multiple platforms.
DLP platform securing sensitive data in AI assistants via sanitization & E2EE
DLP platform securing sensitive data in AI assistants via sanitization & E2EE
AI-native data security platform for DSPM, DLP, and AI data protection
AI-native data security platform for DSPM, DLP, and AI data protection
Scans files and databases for unencrypted PII like SSN, names, and addresses
Scans files and databases for unencrypted PII like SSN, names, and addresses
On-premises tool for discovering, analyzing, and remediating PII/PCI/PHI data
On-premises tool for discovering, analyzing, and remediating PII/PCI/PHI data
Secret Bridge monitors GitHub repositories to detect and alert on leaked secrets and sensitive data exposure.
Secret Bridge monitors GitHub repositories to detect and alert on leaked secrets and sensitive data exposure.
A Chrome browser extension that uses machine learning to detect and alert users about sensitive data exposure and potential data breaches across web environments.
A Chrome browser extension that uses machine learning to detect and alert users about sensitive data exposure and potential data breaches across web environments.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
A command line steganography tool that uses LSB technique to hide files within images without visible alteration.
A command line steganography tool that uses LSB technique to hide files within images without visible alteration.
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
A configurable data destruction toolkit that securely erases sensitive virtual data, temporary files, and swap memory using customizable overwrite methods.
A configurable data destruction toolkit that securely erases sensitive virtual data, temporary files, and swap memory using customizable overwrite methods.
Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.
Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.
A general cybersecurity news site providing discussions and news on various cybersecurity topics.
A general cybersecurity news site providing discussions and news on various cybersecurity topics.
Tenzir is a data pipeline solution that provides security data management capabilities through pipelines, nodes, and a centralized platform for analytics and detection operations.
Tenzir is a data pipeline solution that provides security data management capabilities through pipelines, nodes, and a centralized platform for analytics and detection operations.
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance