Data Security
Browse 275 data security tools
FEATURED
DSPM platform that discovers, classifies, and protects data with automated remediation
DSPM platform that discovers, classifies, and protects data with automated remediation
Zero Trust Data Access platform for securing unstructured data across hybrid envs
Zero Trust Data Access platform for securing unstructured data across hybrid envs
AI-native data security platform for DLP, DSPM, and data classification
AI-native data security platform for DLP, DSPM, and data classification
Data security governance platform for data at rest, in motion, and GenAI apps
Data security governance platform for data at rest, in motion, and GenAI apps
DLP solution for preventing data exfiltration via outbound email channels
DLP solution for preventing data exfiltration via outbound email channels
AI-driven data classification platform for automated discovery & labeling
AI-driven data classification platform for automated discovery & labeling
Unified platform for data & AI security, governance, privacy & compliance
Unified platform for data & AI security, governance, privacy & compliance
Agentless data security platform for discovery, monitoring, and access control
Agentless data security platform for discovery, monitoring, and access control
Agentless CNAPP for multi-cloud security, compliance, and risk management
Agentless CNAPP for multi-cloud security, compliance, and risk management
Protocol-aware reverse proxy for datastores & APIs enforcing access policies
Protocol-aware reverse proxy for datastores & APIs enforcing access policies
DLP platform securing sensitive data in AI assistants via sanitization & E2EE
DLP platform securing sensitive data in AI assistants via sanitization & E2EE
AI-native data security platform for DSPM, DLP, and AI data protection
AI-native data security platform for DSPM, DLP, and AI data protection
Scans files and databases for unencrypted PII like SSN, names, and addresses
Scans files and databases for unencrypted PII like SSN, names, and addresses
On-premises tool for discovering, analyzing, and remediating PII/PCI/PHI data
On-premises tool for discovering, analyzing, and remediating PII/PCI/PHI data
A storage exploration tool that provides unified access to view publicly accessible Amazon S3 buckets, Azure Blob storage, FTP servers, and HTTP directory listings.
A storage exploration tool that provides unified access to view publicly accessible Amazon S3 buckets, Azure Blob storage, FTP servers, and HTTP directory listings.
A security toolkit for Amazon S3 that provides bucket scanning, policy validation, ACL management, and encryption features to identify and remediate S3 security vulnerabilities.
A security toolkit for Amazon S3 that provides bucket scanning, policy validation, ACL management, and encryption features to identify and remediate S3 security vulnerabilities.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.
Log management appliance for collecting, storing, searching, and auditing logs
Log management appliance for collecting, storing, searching, and auditing logs
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.
A configurable data destruction toolkit that securely erases sensitive virtual data, temporary files, and swap memory using customizable overwrite methods.
A configurable data destruction toolkit that securely erases sensitive virtual data, temporary files, and swap memory using customizable overwrite methods.
Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.
Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.
Deep learning-based cloud data security for Amazon S3 buckets
Deep learning-based cloud data security for Amazon S3 buckets
A deep dive into the Ledger connect-kit compromise decryption process.
A deep dive into the Ledger connect-kit compromise decryption process.