Best Data Security Software for AWS Marketplace

Compare the Top Data Security Software that integrates with AWS Marketplace as of October 2025

This a list of Data Security software that integrates with AWS Marketplace. Use the filters on the left to add additional filters for products that have integrations with AWS Marketplace. View the products that work with AWS Marketplace in the table below.

What is Data Security Software for AWS Marketplace?

Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected. Compare and read user reviews of the best Data Security software for AWS Marketplace currently available using the table below. This list is updated regularly.

  • 1
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
    Starting Price: $159 per month
  • 2
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 3
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 4
    Privacera

    Privacera

    Privacera

    At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™.
  • 5
    Dell EMC PowerProtect Data Manager
    Protect data and deliver governance control for modern cloud workloads across your evolving physical, virtual and cloud environments. Address ever-changing growth and IT complexity by leveraging Dell EMC’s software defined data protection platform. PowerProtect Data Manager delivers next generation data protection that enables faster IT transformation, while giving you the assurance that you can easily safeguard and quickly unlock your data’s value. Dell EMC PowerProtect Data Manager provides software defined data protection, automated discovery, deduplication, operational agility, self-service and IT governance for physical, virtual and cloud environments. PowerProtect Data Manager offers efficient data protection capabilities leveraging the latest evolution of Dell EMC trusted protection storage architecture.
  • 6
    ShardSecure

    ShardSecure

    ShardSecure

    We desensitize sensitive data in multi-cloud, hybrid-cloud, and private cloud environments while reducing management complexity and improving business continuity. Securely adopt the cloud without losing control of your data knowing your data is unintelligible and of no value to unauthorized users – anywhere it is stored. Backups are popular targets for attackers and ransomware. Improve your backup data resiliency and protect against attacks. We preserve the integrity of your microsharded data and roll back attempts at file tampering, including files encrypted by malware while your operations continue unaffected. Confidently address data privacy and security requirements to enable your data analysis projects. Secure your source code and other intellectual property from data breaches and supply chain attacks.
  • 7
    Flow Security

    Flow Security

    Flow Security

    Flow is not just your cloud security tool with a data scanning utility. It is the only platform that analyzes both data at rest and data in motion. By also following and analyzing all data flows in runtime, the platform enables security teams to regain control over all their data, including shadow data stores and applications across all cloud, on-prem, and SaaS environments. Flow’s deep analysis of the organization’s data journey from origin to destination allows security teams to automatically catalog all their sensitive data (e.g. PII, PHI, PCI); visualize data flows; detect and remediate data risks; and effectively respond in real-time to data violations by providing the full context: who, what, when, where and why.
  • 8
    Forum Sentry

    Forum Sentry

    Forum Systems

    Secure PEP, SSO, and Federation. Cyber-secure Identity Policy Enforcement Point (PEP) with built-in SSO and Federation. Combine identity with payload attributes for multi-context and multi-factor authentication. Built-in support for all modern IdM systems, PKI, and identity formats. Data Security. Bi-directional information assurance.Modern information security combining content-aware cyber-security intrusion, data leakage protection, antivirus, access control, and PKI cryptography. SLA enforcement with real-time monitoring and alerting. Cloud Integration. Point-and-click policies for REST APIs, SOAP APIs, and REST/SOAP Conversion. Supports B2B, Cloud, Mobile, and IoT Technology formats. Translates protocols and messages for legacy system modernization Recognized by KuppingerCole as the Only API Management Vendor “with a Primary Focus on Security” and an overall leader in both product and leadership categories in their Leadership Compass: API Security Managementq
  • Previous
  • You're on page 1
  • Next