Formal is a protocol-aware reverse proxy designed for datastores and APIs that provides data security controls and visibility. The tool operates by deploying within the organization's VPC and offers: - Real-time monitoring and classification of data flows - Dynamic data masking and filtering capabilities - Role-based and attribute-based access control implementation - Integration with infrastructure-as-code through Terraform and Pulumi - Multi-factor authentication for data stores - Automated policy enforcement based on historical patterns - PII and PHI data classification - Collaboration features for security policy management - Anomaly detection and alerting system The proxy is implemented in Go and Rust, operates with 2-10ms latency overhead, and is designed for high availability through stateless architecture.
FEATURES
SIMILAR TOOLS
BleachBit cleans files to free disk space and maintain privacy with various options and command line interface support.
An endpoint data loss prevention solution that discovers, classifies, and protects sensitive data while controlling data transfer methods and mitigating insider threats.
Hide data in images while maintaining perceptual similarity and extract it from printed and photographed images.
PII Crawler is a data scanning tool that identifies and locates Personally Identifiable Information in various file types and databases.
Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.
A browser extension that helps you find and track sensitive data exposure across the web.
Encode or encrypt strings to various hashes and formats, including MD5, SHA1, SHA256, URL encoding, Base64, and Base85.
A steganographic file system in userspace for plausible deniability of files.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.