Best Data Security Software - Page 2

Compare the Top Data Security Software as of August 2025 - Page 2

  • 1
    Ping Identity

    Ping Identity

    Ping Identity

    Ping Identity builds identity security for the global enterprise with an intelligent identity platform that offers comprehensive capabilities including single sign-on (SSO), multi-factor authentication (MFA), directory, and more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping has solutions for both IT and developer teams. Enable digital collaboration with simple integrations to these popular tools. Support your employees wherever they are with integrations to these popular tools. Deploy quickly with interoperability across the entire identity ecosystem. Whether you just want single sign-on (SSO) or a risk-based, adaptive authentication authority, starting off with a PingOne solution package lets you only pay for what you need, and gives you room to grow.
    Starting Price: $5 per user per month
  • 2
    Netwrix Strongpoint
    Netwrix Strongpoint helps organizations build smart controls that automate the hardest parts of SOX compliance management and audit reporting, access reviews and segregation of duties, data security, and change management. Netwrix Strongpoint works with NetSuite and Salesforce. With tight controls to track and protect what’s in scope, Strongpoint customers are able to produce airtight audit reporting on demand, greatly reducing the cost and time of SOX compliance prep. See what’s safe to change and what requires additional review. Then, use highly sophisticated impact analysis tools to streamline the discovery process. Not subject to SOX? Netwrix Strongpoint’s award-winning data security, configuration management, and change management tools help businesses running complex business systems maintain transparency and harden their business-critical applications against security risks.
    Starting Price: $1000/month
  • 3
    IRI FieldShield

    IRI FieldShield

    IRI, The CoSort Company

    IRI FieldShield® is powerful and affordable data discovery and masking software for PII in structured and semi-structured sources, big and small. Use FieldShield utilities in Eclipse to profile, search and mask data at rest (static data masking), and the FieldShield SDK to mask (or unmask) data in motion (dynamic data masking). Classify PII centrally, find it globally, and mask it consistently. Preserve realism and referential integrity via encryption, pseudonymization, redaction, and other rules for production and test environments. Delete, deliver, or anonymize data subject to DPA, FERPA, GDPR, GLBA, HIPAA, PCI, POPI, SOX, etc. Verify compliance via human- and machine-readable search reports, job audit logs, and re-identification risk scores. Optionally mask data as you map it. Apply FieldShield functions in IRI Voracity ETL, federation, migration, replication, subsetting, or analytic jobs. Or, run FieldShield from Actifio, Commvault or Windocks to mask DB clones.
  • 4
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
    Starting Price: $159 per month
  • 5
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
    Starting Price: $1000 per day
  • 6
    IBM Storage Protect Plus
    IBM Storage Protect Plus is IBM Storage software that provides recovery, replication, retention and reuse for VMs, databases, applications, file systems, SaaS workloads and containers. Data can be copied to cloud-based object storage and on-premises storage including IBM Storage Protect and physical tape. IBM Storage Protect Plus can be easily deployed as a virtual appliance or as a container application and the agentless architecture is easy to maintain. This modern data resilience solution unlocks the value of your data by improving the quality and speed of development, testing and analytics. Cost-effective data retention, data compliance and disaster recovery are achieved via data copy to both on-premises, cloud-based object storage and IBM Storage Protect, including support for physical tape.
    Starting Price: $60 per 10 managed VMs
  • 7
    ALTR

    ALTR

    ALTR

    Easily and simply control your sensitive data in Snowflake today so you can get more value from it in minutes instead of months. With ALTR you can automatically discover and classify sensitive data with a checkbox on import. Add controls like data masking with a drop-down menu. Set alerts and limits on data access by user, amount, and IP address from a single screen. No on-prem hassles or added costs, no proxies to break with a platform change and no managed services disguised as SaaS. ALTR was born in the cloud and natively integrates with platforms like Snowflake. With ALTR’s complete data control, you can visualize data usage, detect anomalies and alert on them, block threats in real time, and tokenize critical data. Safeguarding all your data. Because ALTR is built for the cloud, there’s no large up-front commitment—you can start for free and only upgrade as needed.
    Starting Price: $10 per user per month
  • 8
    Normalyze

    Normalyze

    Normalyze

    Our agentless data discovery and scanning platform is easy to connect to any cloud account (AWS, Azure and GCP). There is nothing for you to deploy or manage. We support all native cloud data stores, structured or unstructured, across all three clouds. Normalyze scans both structured and unstructured data within your cloud accounts and only collects metadata to add to the Normalyze graph. No sensitive data is collected at any point during scanning. Display a graph of access and trust relationships that includes deep context with fine-grained process names, data store fingerprints, IAM roles and policies in real-time. Quickly locate all data stores containing sensitive data, find all-access paths, and score potential breach paths based on sensitivity, volume, and permissions to show all breaches waiting to happen. Categorize and identify sensitive data-based industry profiles such as PCI, HIPAA, GDPR, etc.
    Starting Price: $14,995 per year
  • 9
    WinZip SafeShare
    A modernized sharing experience. Share your files with confidence and security in an intuitive environment built with simplicity in mind. This powerful sharing tool allows you to share, compress, and encrypt, all within a simple interface. Easily share files to one or many locations, surrounded by extra layers of security, including military-grade encryption and time bomb capabilities. Enjoy expanded cloud services, including OpenStack and SwiftStack regions and credential files, Alibaba, Wasabi, HP, Oracle, Azure, WebDAV, CenturyLink, IONOS and OVH cloud providers. Combine multiple PDF files into a single PDF file to save, zip, or share. Streamline workflow when sharing via Slack IM. Manage files shared by WinZip or ZipShare. Open and view, share again or remove shared files. Keep track of which Zip files you have shared via WinZip or ZipShare. Email anyone directly from WinZip by adding contacts from all your supported sources into one combined address book.
    Starting Price: $34.95 one-time payment
  • 10
    Protective.ai

    Protective.ai

    Protective.ai

    Protective.ai helps startups & developers improve their data protection while boosting user trust and adoption. Connecting 3rd-party apps to your favorite platforms has never been easier. However, this means that your customer information, e-mails, docs, and internal conversations are stored & processed by tens of different companies, with various data security measures and privacy standards. We use AI to analyze cloud security, privacy policies, and social signals to determine the data protection level of more than 10K business apps & integrations. Use our score to understand which apps are treating your data with care, and which apps need to improve their security & privacy. We uncover actual risks posed by cloud vulnerabilities and promiscuous privacy-policy terms, not relying only on self-reported compliance. Our PRO solution provides R&D, marketing, sales, and info-sec managers with ongoing monitoring, alerts, and protection against unsafe integrations.
    Starting Price: $38 per month
  • 11
    Salesforce Shield
    Natively encrypt your most sensitive data at rest across all of your Salesforce apps with platform encryption. Ensure data confidentiality with AES 256-bit encryption. Bring your own encryption keys and manage your key lifecycle. Protect sensitive data from all Salesforce users including admins. Meet regulatory compliance mandates. See who is accessing critical business data, when, and from where with event monitoring. Monitor critical events in real-time or use log files. Prevent data loss with transaction security policies. Detect insider threats and report anomalies. Audit user behavior and measure custom application performance. Create a forensic data-level audit trail with up to 10 years of history, and set triggers for when data is deleted. Expand tracking capabilities for standard and custom objects. Obtain extended data retention capabilities for audit, analysis, or machine learning. Meet compliance requirements with automated archiving.
    Starting Price: $25 per month
  • 12
    1LimX

    1LimX

    1LimX

    1LimX - Offline cross-platform secure files, passwords, information manager Secure data with your own master password, master key with Google-chosen technology all offline Easy to use, minimal design, gigabytes of data encryption in seconds Customizable, multi data types: text, rich text, file, image, date, time, multifactor authentication,... supported. Cross-platform: available now on iOS, Android, MacOS, Windows, Linux. Turn all data, files into 1 single sharable encrypted backup file, dark mode, autofill.
    Starting Price: $9.99
  • 13
    STRM

    STRM

    STRM

    Creating and managing data policies is a slow pain. With PACE by STRM, you can make sure data is used securely. Apply data policies through code, wherever it lives. Farewell to long waits and costly meetings, meet your new open source data security engine. Data policies aren't just about controlling access; they are about extracting value from data with the right guardrails. PACE lets you collaborate on the why and when automating the how through code. With PACE you can programmatically define and apply data policies across platforms. Integrated into your data platform and catalog (optional), and by leveraging the native capabilities of the stack you already have. PACE enables automated policy application across key data platforms and catalogs to ease your governance processes. Ease the process of policy creation and implementation, centralize control, and decentralize execution. Fulfill auditing obligations by simply showing how controls are implemented.
    Starting Price: Free
  • 14
    Evervault

    Evervault

    Evervault

    Go from zero to audit-ready in less than a day using Evervault to encrypt cardholder data. Evervault works with all typical cardholder data flows, so you can compliantly collect PCI data for processing, issuing or storage. In most cases, we’ll reduce your PCI scope to the SAQ A control set — the smallest set of PCI DSS controls. We’ll work with you to understand your architecture and provide recommendations on how to integrate Evervault to reduce your compliance scope as much as possible. You’ll integrate Evervault based on one of our architecture templates and we’ll validate your integration to ensure it’s fully compliant. We’ll give you an audit-ready PCI DSS policies and procedures bundle, as well as our PCI DSS Attestation of Compliance (AoC). We’ll also introduce you to an auditor who’s familiar with Evervault’s architecture.
    Starting Price: $395 per month
  • 15
    RunReveal

    RunReveal

    RunReveal

    We questioned every assumption about SIEM and rebuilt it from the ground up. The result is a faster, cheaper, and higher fidelity security data platform designed to detect threats like never before. Attackers are not using sophisticated techniques to compromise your systems. They are logging into legitimate accounts and using them to move laterally. Detecting these compromises is hard for even the most sophisticated teams. RunReveal collects all of your logs, filters out the noise, and tells you about the things that are happening in your systems that really matter. Whether you have petabytes or gigabytes, RunReveal can correlate threats across all of your log sources and deliver high-quality alerts out of the box. We've invested in security controls that give us a strong foundational security program. Our philosophy is that by improving our security posture, it allows us to understand our customers even better.
    Starting Price: $200 per month
  • 16
    GRASP

    GRASP

    DextraData

    Capture, visualize, and communicate risks in an understandable way. Follow the risk-based approach: evaluation, treatment, and continuous overview of risks. Work in a time-saving and structured manner by spending less time on manual activities. GRASP can be customized to meet the specific needs of your organization, entirely without programming. With increasing digitalization and growing networking, the potential for threats has risen rapidly. Ignoring both familiar and new IT risks, especially in times of crisis, jeopardizes the economic success and continued existence of the company. An ISMS tool can help to make the company less risky. With the help of the data protection impact assessment (DPIA) and corresponding deletion concepts, you keep your data under control. GRASP guides you through business impact and risk analysis in accordance with ISO 22301 based on the applicability of the standard areas.
    Starting Price: 79€
  • 17
    Binarii Labs

    Binarii Labs

    Binarii Labs

    Binarii Labs has a patented data security process that uniquely solves cyber security risks, resilience, and bad actor threats. To revolutionize data security through a platform to enable people and enterprises to take back control, and ownership and secure custody of their own and their stakeholder’s data. This is achieved through our UK & UK-US-patented process which involves encryption, fragmentation, and distribution across multi-cloud storage solutions that enable business continuity, risk mitigation, and enterprises to uphold regulation and compliance. The secure storage of your data is proven through the world's first immutable ledger by providing the user a proof of record on the blockchain. Our patented data security process encrypts, fragments, and distributes your data wherever you want, and records its provenance on the blockchain for unprecedented security. 
However, you always own and control your data.
    Starting Price: €15 per month
  • 18
    Microsoft Purview Information Protection
    Understand what data is sensitive and business-critical, then manage and protect it across your environment. Experience built-in labeling and information protection in Microsoft 365 apps and services. Get accurate classification with AI-powered classifiers, exact data matches, and other capabilities. Configure and manage policies and view analytics across on-premises file shares, Microsoft 365 apps and services, and desktop and mobile devices in one place. Extend a consistent protection experience to popular non-Microsoft apps and services with an SDK. Enable discovery and protection of sensitive data across your digital estate, including Microsoft 365 and Azure clouds; on-premises, hybrid, and third-party clouds; and SaaS apps. Scan across data at rest and in use to classify it across on-premises file shares, SharePoint, OneDrive, Exchange, Microsoft Teams, endpoints, and non-Microsoft cloud apps.
    Starting Price: $12 per month
  • 19
    Ostendio

    Ostendio

    Ostendio

    Ostendio is the only integrated security and risk management platform that leverages the strength of your greatest asset. Your people. Ostendio delivers an easy-to-use, cost-effective platform that allows you to assess risk, create and manage critical policies and procedures, educate and empower your people to be secure with security awareness training, and monitor continuous compliance across 250+ security frameworks. With deep customization, advanced intelligence, and flexible controls, you’re always audit-ready, always secure, and always able to take on what’s next. For more information about Ostendio, visit ostendio.com.
  • 20
    Netwrix Enterprise Auditor
    Netwrix Enterprise Auditor automates the collection and analysis of the data you need to answer the most difficult questions you face in the management and security of dozens of critical IT assets, including data, directories, and systems. All organizations, regardless of size, require tools to help them manage and secure the various technology resources that power their businesses. However, no organization has the ability to afford, efficiently operate, or maintain separate point products for every technology they leverage. What they need are solutions that are flexible enough to bend to their unique requirements, while also providing the extensibility to deliver a common set of capabilities across multiple platforms within their IT ecosystem. Netwrix Enterprise Auditor contains over 40 built-in data collection modules covering both on-premises and cloud-based platforms from Operating Systems to Office 365.
    Starting Price: $10.00/one-time/user
  • 21
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 22
    BigID

    BigID

    BigID

    BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2
  • 23
    ManageEngine DataSecurity Plus
    Take charge of your sensitive data with ManageEngine DataSecurity Plus. Get a snapshot of recent user activity, file activity, and access trends. Know the essential four Ws for every access: Who accessed what, when, and from where. Focus on events that matter most, such as sudden permission changes, file deletions, and renaming events. Identify the most active users, most accessed files, and most modified files within your file server. rigger instant alerts whenever there's sudden spikes in file or folder access or modification events. Get real-time notifications whenever there's multiple failed access attempts to critical files. Monitor changes made to sensitive files after business hours. Selectively monitor critical files, folders, shares, and user activities. Get real-time alerts whenever unauthorized modifications are made to critical files. Spot privilege misuse and unusual activity by configuring threshold-based alerts to monitor user-generated events.
    Starting Price: $745 per year
  • 24
    SecureCircle

    SecureCircle

    SecureCircle

    SecureCircle's Zero Trust data protection eliminates data breaches and insider threats by protecting all data outside of SaaS applications. SecureCircle's Data Access Security Broker (DASB) protects and monitors data, including data egressing from enterprise cloud services and managed repositories to enforce access controls on data regardless of location, including cloud and endpoint devices. SecureCircle protects data transparently and persistently at scale delivering the world's only Zero Trust data protection. Most modern SaaS applications allow end users to pull data out of the browser onto the device. More often than not, end users leverage these features for productive reasons. The challenge most businesses face with modern SaaS applications is identifying the difference between productive activity and a security threat. With SecureCircle, all data is kept secure as it comes out of SaaS applications, which allows users to leverage data that comes out of these applications.
  • 25
    VGS Platform

    VGS Platform

    Very Good Security

    The VGS Vault enables users to safely store their tokenized data. This creates a safe haven for your most sensitive data. In the event of a breach, there’s nothing to steal. You can’t hack what’s not there. VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it. Use the interactive example to see how data is transformed by VGS. Choose Redact or Reveal to hide or display data, respectively. Whether you’re building a new product and want best-in-class security from the start or are an established company looking to eliminate compliance as a roadblock to new business, VGS can help. VGS takes on the liability of securing your data, eliminating the risk of data breaches and reducing compliance overhead. For companies that prefer to vault their own data, VGS layers on protection to the systems, preventing unauthorized access and leakage.
  • 26
    HushHush Data Masking
    Today’s businesses face significant punishment if they do not meet the ever-increasing privacy requirements of both regulators and the public. Vendors need to keep abreast by adding new algorithms to protect sensitive data such as PII and PHI. HushHush stays at the forefront of privacy protection (Patents: US9886593, US20150324607A1, US10339341) with its PII data discovery and anonymization tool workbench (also known as data de-identification, data masking, and obfuscation software). It helps you find your and your customer's sensitive data, classify it, anonymize it, and comply with GDPR, CCPA, HIPAA / HITECH, and GLBA requirements. Use a collection of rule-based atomic add-on anonymization components to configure comprehensive and secure data anonymization solutions. HushHush components are out-of-the box solutions designed to anonymize both direct identifiers (SSN, credit cards, names, addresses, phone numbers, etc.) as well as indirect identifiers, with both fixed algorithms.
  • 27
    DATPROF

    DATPROF

    DATPROF

    Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
  • 28
    Tenable Cloud Security
    The actionable cloud security platform. Reduce risk by rapidly exposing and closing priority security gaps caused by misconfigurations, risky entitlements and vulnerabilities–in one powerful cloud native application protection platform (CNAPP). CNAPP solutions replace a patchwork of siloed products that often cause more problems than they solve, such as multiple false positives and excessive alerts. Those products usually provide only partial coverage and often create overhead and friction with the products they’re supposed to work with. Most importantly, CNAPPs allow businesses to monitor the health of cloud native applications as a whole rather than individually monitoring cloud infrastructure and application security.
  • 29
    Sophos Central Device Encryption
    Increased remote working makes it more important than ever to secure computers and the data on them. With the huge number of laptops lost, stolen, or misplaced every day, a crucial first line of defense against the loss or theft of devices is full disk encryption. Sophos Central Device Encryption leverages Windows BitLocker and macOS FileVault to secure devices and data. Centralized security management and operations from the world’s most trusted and scalable cloud security platform. With open APIs, extensive third-party integrations, and consolidated dashboards and alerts, Sophos Central makes cybersecurity easier and more effective. Integrated SASE-ready solutions to secure your cloud and hybrid networks - now and into the future. From Firewall and Zero Trust to Switches, Wi-Fi, and more. Trust your inbox again with cloud email security that protects your people and critical information from malware, phishing and impersonation attempts.
  • 30
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.