Data Security

Browse 275 data security tools

Varonis DSPM Logo

DSPM platform that discovers, classifies, and protects data with automated remediation

0
FileFlex Enterprise Logo

Zero Trust Data Access platform for securing unstructured data across hybrid envs

0
Forcepoint Data Security Logo

AI-native data security platform for DLP, DSPM, and data classification

0
Concentric AI Data Security Governance Platform Logo

Data security governance platform for data at rest, in motion, and GenAI apps

0
Forcepoint Email DLP Solution Logo

DLP solution for preventing data exfiltration via outbound email channels

0
Kriptos AI-Driven Data Classification Logo

AI-driven data classification platform for automated discovery & labeling

0
Securiti Data Command Center Logo

Unified platform for data & AI security, governance, privacy & compliance

0
Satori Data Security Platform Logo

Agentless data security platform for discovery, monitoring, and access control

0
Cyscale Cloud Security Logo

Agentless CNAPP for multi-cloud security, compliance, and risk management

0
Formal Protocol Security Logo

Protocol-aware reverse proxy for datastores & APIs enforcing access policies

0
Wald AI Logo

DLP platform securing sensitive data in AI assistants via sanitization & E2EE

0
Cyera Data Security Platform Logo

AI-native data security platform for DSPM, DLP, and AI data protection

0
PII Crawler PII Scanner Logo

Scans files and databases for unencrypted PII like SSN, names, and addresses

1
Consilio PII Tools Logo

On-premises tool for discovering, analyzing, and remediating PII/PCI/PHI data

0
s3viewer Logo

A storage exploration tool that provides unified access to view publicly accessible Amazon S3 buckets, Azure Blob storage, FTP servers, and HTTP directory listings.

0
s3tk Logo

A security toolkit for Amazon S3 that provides bucket scanning, policy validation, ACL management, and encryption features to identify and remediate S3 security vulnerabilities.

0
suicideCrypt Logo

A tool for creating encrypted volumes with self-destruction capabilities that automatically destroy data when tampering is detected or commands are issued.

0
syslog-ng Store Box Logo

Log management appliance for collecting, storing, searching, and auditing logs

0
PHP Encryption Logo

A PHP library that provides secure data encryption capabilities using keys or passwords, designed to minimize implementation errors.

0
Acra Logo

A database protection suite that provides field-level encryption, access control, and intrusion detection for distributed applications storing sensitive data.

0
Wiper Toolkit Logo

A configurable data destruction toolkit that securely erases sensitive virtual data, temporary files, and swap memory using customizable overwrite methods.

0
Tang Logo

Tang is a network-based server that binds encrypted data access to network presence, allowing data decryption only when clients are connected to the specific network where the Tang server operates.

0
Deep Instinct Data Security X (DSX) Logo

Deep learning-based cloud data security for Amazon S3 buckets

0
Crypto Drainer Attack Logo

A deep dive into the Ledger connect-kit compromise decryption process.

0