Alternatives to ALTR

Compare ALTR alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to ALTR in 2024. Compare features, ratings, user reviews, pricing, and more from ALTR competitors and alternatives in order to make an informed decision for your business.

  • 1
    Satori

    Satori

    Satori

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.
    Compare vs. ALTR View Software
    Visit Website
  • 2
    GitGuardian

    GitGuardian

    GitGuardian

    GitGuardian is a code security platform that provides solutions for DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundreds of thousands of developers. GitGuardian helps developers, cloud operation, security, and compliance professionals secure software development and define and enforce policies consistently and globally across all systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets, sensitive files, IaC misconfigurations, and alert to allow investigation and quick remediation. Additionally, GitGuardian's Honeytoken module exposes decoy resources like AWS credentials, increasing the odds of catching intrusion in the software delivery pipeline. GitGuardian is trusted by leading companies, including 66 degrees, Snowflake, Orange, Iress, Maven Wave, DataDog, and PayFit. Used by more than 300K developers, it ranks #1 in the security category on GitHub Marketplace.
    Leader badge
    Compare vs. ALTR View Software
    Visit Website
  • 3
    Netwrix Auditor
    Netwrix Auditor is a visibility platform that enables control over changes, configurations and access in hybrid IT environments and eliminates the stress of your next compliance audit. Monitor all changes across your on-prem and cloud systems, including AD, Windows Server, file storage, databases, Exchange, VMware and more. Simplify your reporting and inventory routines. Regularly review your identity and access configurations, and easily verify that they match a known good state.
    Compare vs. ALTR View Software
    Visit Website
  • 4
    Titaniam

    Titaniam

    Titaniam

    Titaniam provides enterprises and SaaS vendors with a full suite of data security/privacy controls in a single, enterprise grade solution. This includes highly advanced options such as encryption-in-use that enables encrypted search and analytics without decryption, and also traditional controls such as tokenization, masking, various types of encryption, and anonymization. Titaniam also offers BYOK/HYOK (bring/hold your own key) for data owners to control the security of their data. If attacked, Titaniam minimizes regulatory overhead by providing evidence that sensitive data retained encryption. Titaniam’s interoperable modules can be combined to support hundreds of architectures across multiple clouds, on-prem, and hybrid environments. Titaniam provides the equivalent of 3+ categories of solutions making it the most effective, and economical solution in the market. Titaniam is featured by Gartner, IDC, and TAG Cyber and has won coveted industry awards e.g. SINET16 and at RSAC2022.
  • 5
    DATPROF

    DATPROF

    DATPROF

    Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
  • 6
    IRI Voracity

    IRI Voracity

    IRI, The CoSort Company

    Voracity is the only high-performance, all-in-one data management platform accelerating AND consolidating the key activities of data discovery, integration, migration, governance, and analytics. Voracity helps you control your data in every stage of the lifecycle, and extract maximum value from it. Only in Voracity can you: 1) CLASSIFY, profile and diagram enterprise data sources 2) Speed or LEAVE legacy sort and ETL tools 3) MIGRATE data to modernize and WRANGLE data to analyze 4) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. Use Voracity to comply with data privacy laws, de-muck and govern the data lake, improve the reliability of your analytics, and create safe, smart test data
  • 7
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 8
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 9
    HashiCorp Vault

    HashiCorp Vault

    HashiCorp

    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 10
    Baffle

    Baffle

    Baffle

    Baffle provides universal data protection from any source to any destination to control who can see what data. Enterprises continue to battle cybersecurity threats such as ransomware, as well as breaches and losses of their data assets in public and private clouds. New data management restrictions and considerations on how it must be protected have changed how data is stored, retrieved, and analyzed. Baffle’s aim is to render data breaches and data losses irrelevant by assuming that breaches will happen. We provide a last line of defense by ensuring that unprotected data is never available to an attacker. Our data protection solutions protect data as soon as it is produced and keep it protected even while it is being processed. Baffle's transparent data security mesh for both on-premises and cloud data offers several data protection modes. Protect data on-the-fly as it moves from a source data store to a cloud database or object storage, ensuring safe consumption of sensitive data.
  • 11
    Sotero

    Sotero

    Sotero

    Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment. The Sotero data security platform employs an intelligent data security fabric that ensures your sensitive data is never left unprotected. Sotero automatically secures all your data instances and applications, regardless of source, location or lifecycle stage (at rest, in transit, or in use). With Sotero, you can move from a fragmented, complex data security stack to one unified data security fabric that provides 360° management of your entire data security ecosystem. You’re no longer forced to go to point solutions to know who is accessing your data. You get governance, auditability, visibility, and 100% control via a single pane. The Sotero platform protects any data asset wherever it resides – whether the data is a relational database, unstructured, semi-structured, structured, on-premise or in the cloud.
  • 12
    eperi Gateway
    You alone have full control over the encryption of your data – at any time and definitely without backdoors. All Systems – One Solution. Thanks to the patented template concept you can use the eperi® Gateway for all your (cloud-) applications and adapt it to your data protection requirements. Your employees can continue working as usual, while the eperi® Gateway encrypts data transparently and preserves the central functions of your applications (such as search and sort). Take advantage of cloud applications while staying compliant with the stringent regulations of the financial industry like privacy-preserving analytics. IoT brings forth smart machines and products that collect data independently and automatically. Thanks to encryption, you can ensure data privacy and comply with legislation.
  • 13
    VGS Platform

    VGS Platform

    Very Good Security

    The VGS Vault enables users to safely store their tokenized data. This creates a safe haven for your most sensitive data. In the event of a breach, there’s nothing to steal. You can’t hack what’s not there. VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it. Use the interactive example to see how data is transformed by VGS. Choose Redact or Reveal to hide or display data, respectively. Whether you’re building a new product and want best-in-class security from the start or are an established company looking to eliminate compliance as a roadblock to new business, VGS can help. VGS takes on the liability of securing your data, eliminating the risk of data breaches and reducing compliance overhead. For companies that prefer to vault their own data, VGS layers on protection to the systems, preventing unauthorized access and leakage.
  • 14
    Voltage SecureData
    Secure sensitive data wherever it flows—on premises, in the cloud, and in big data analytic platforms. Voltage encryption delivers data privacy protection, neutralizes data breach, and drives business value through secure data use. Data protection builds customer trust and enables compliance to global regulations, including GDPR, CCPA, and HIPAA. Privacy regulations recommend encryption, pseudonymization, and anonymization to protect personal data. Voltage SecureData enables enterprises to de-identify sensitive structured data and support the use of data in its protect state to safely drive business value. Ensure that applications operate on secure data flowing through the enterprise with no gaps, no decryption, and no performance overhead. SecureData supports the broadest range of platforms and encrypts data in any language. Structured Data Manager integrates SecureData so that businesses can easily and continuously protect data throughout the lifecycle, from discovery to encryption.
  • 15
    Rixon

    Rixon

    Rixon

    Maximize data security & solve data privacy concerns with the fastest cloud-native vaultless tokenization platform. Knowing your business meets and exceeds compliance requirements gives you the time and peace of mind to focus on what is important for your business. Organizations are faced with increasing operating costs, threats from ransomware, and ongoing compliance audits. Rixon enables you to be safe and confident, giving you the freedom to bring your business value to the world. The Rixon privacy platform drives business outcomes by giving organizations the tools they need to deliver security, compliance, and privacy operations to the business and the applications they support. Rixon eliminates sensitive data exposure within your applications by leveraging our patented tokenization process. Sensitive information is securely ingested and converted into smart security tokens which armor the data from unauthorized data access.
    Starting Price: $99 per month
  • 16
    Skyflow

    Skyflow

    Skyflow

    Skyflow lets you run workflows, logic and analytics on fully encrypted data. Skyflow leverages multiple encryption and tokenization techniques for optimal security. Manage data residency, access, and policy enforcement, with auditable logs and provenance. Get to compliance in minutes, not weeks. Our trusted infrastructure and simple REST and SQL APIs make it easy. Tokenization for compliance, plus an encrypted data store so you can search, analyze, and use secure data. Run Skyflow in a virtual private cloud you choose. Use it as secure gateway, zero trust data store, and more. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. Leverage the power of your sensitive data in any workflow or application without ever decrypting the data.
  • 17
    Dasera

    Dasera

    Dasera

    Dasera is a Data Security Posture Management (DSPM) platform providing automated security and governance controls for structured and unstructured data across cloud and on-prem environments. Uniquely, Dasera monitors data in use while offering continuous visibility and automated remediation, preventing data breaches across the entire data lifecycle. Dasera provides continuous visibility, risk detection, and mitigation to align with business goals while ensuring seamless integration, unmatched security, and regulatory compliance. Through its deep understanding of the four data variables - data infrastructure, data attributes, data users, and data usage - Dasera promotes a secure data-driven growth strategy that minimizes risk and maximizes value, giving businesses a competitive edge in today's rapidly evolving digital landscape.
    Starting Price: 3 data stores at $20,000
  • 18
    EncryptRIGHT

    EncryptRIGHT

    Prime Factors

    EncryptRIGHT simplifies application-level data protection, delivering robust encryption, tokenization, dynamic data masking, and key management functionality, along with role-based data access controls and a data-centric security architecture, to secure sensitive data and enforce data privacy. EncryptRIGHT is architected to deploy quickly with very little integration effort and scale from a single application to thousands of applications and servers on premises or in the cloud. Our unique Data-Centric Security Architecture allows information security teams to comprehensively define an EncryptRIGHT Data Protection Policy (DPP) and to bind the policy to data itself, protecting it regardless of where the data is used, moved or stored. Programmers do not need to have cryptography expertise to protect data at the application layer – they simply configure authorized applications to call EncryptRIGHT and ask for data to be appropriately secured or unsecured in accordance with its policy.
    Starting Price: $0
  • 19
    Privacera

    Privacera

    Privacera

    At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™.
  • 20
    Fortanix Data Security Manager
    Minimize expensive data breaches and accelerate regulatory compliance with a data-first approach to cybersecurity. The Fortanix DSM SaaS offering is purpose-built for the modern era to simplify and scale data security deployments. It is protected by FIPS 140-2 Level 3 confidential computing hardware and delivers the highest security and performance standards. The DSM accelerator is an optional add-on to achieve the highest performance for latency-sensitive applications. A Single System of Record and Pane of Glass for Crypto Policy, Key Lifecycle Management, and Auditing in a Scalable SaaS Solution That Makes Data Security a Breeze.
  • 21
    Polar Security

    Polar Security

    Polar Security

    Automate data discovery, protection & governance in your cloud workload and SaaS applications. Automatically pinpoint all your exposed sensitive data in cloud workloads and SaaS applications, allowing you to shrink the data attack surface. Identify and classify sensitive data such as PII, PHI, PCI, and custom company IP to prevent sensitive data exposure. Get actionable insights on how to protect your cloud data and ensure compliance, in real-time. Enforce data access policies to achieve least privileged access, maintain a strong security posture, and remain resilient to cyber-threats.
  • 22
    LightBeam.ai

    LightBeam.ai

    LightBeam.ai

    Discover within minutes if sensitive information lurks in places you never expected (screenshots, logs, tickets, messages, tables). With one click, LightBeam can easily generate executive or delta reports to gain valuable insights into your sensitive data. Automate DSRs leveraging LightBeam's unique PII/PHI graphs comprehensively created from your data infrastructure. Build trust with your users by empowering them to exercise control over their data collection. Continuously monitor how sensitive data is collected, used, shared, and maintained with appropriate safeguards within your organization.
  • 23
    Lepide Data Security Platform
    Intelligent Threat Detection. Faster Response. 98% of all threats start with Active Directory and nearly always involve the compromise of data stored on enterprise data stores. Our unique combination of detailed auditing, anomaly detection, real time alerting, and real time data discovery and classification allows you to identify, prioritize and investigate threats - fast. Protect Sensitive Data from Rogue Users and Compromised User Accounts. We enable you to detect and investigate threats to your most sensitive data in ways no other vendor can. Bringing together data discovery and classification with threat detection enables you to investigate all events, changes, actions and anomalies with context. End to end visibility of Active Directory, Group Policy, File Servers, Office 365, NetApp, SharePoint, Box, Dropbox and more. Detect and Respond to Security Threats 10x Faster. Investigate threats as they emerge in Active Directory and track movement
  • 24
    PHEMI Health DataLab

    PHEMI Health DataLab

    PHEMI Systems

    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden. PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools.
  • 25
    Dell EMC PowerProtect Data Manager
    Protect data and deliver governance control for modern cloud workloads across your evolving physical, virtual and cloud environments. Address ever-changing growth and IT complexity by leveraging Dell EMC’s software defined data protection platform. PowerProtect Data Manager delivers next generation data protection that enables faster IT transformation, while giving you the assurance that you can easily safeguard and quickly unlock your data’s value. Dell EMC PowerProtect Data Manager provides software defined data protection, automated discovery, deduplication, operational agility, self-service and IT governance for physical, virtual and cloud environments. PowerProtect Data Manager offers efficient data protection capabilities leveraging the latest evolution of Dell EMC trusted protection storage architecture.
  • 26
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 27
    CipherTrust Tokenization

    CipherTrust Tokenization

    Thales Cloud Security

    CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates like PCI DSS while also making it simple to protect other sensitive data including personally identifiable information (PII). While there are no tokenization standards in the industry, most tokenization solutions fall into one of two architectures: vaultless- or vaulted tokenization Both secure and anonymize sensitive assets. Tokenization software can reside in the data center, big data environments or the cloud. Tokenization can remove card holder data from PCI DSS scope with minimal cost and effort, enabling organizations to save on costs associated with compliance with the industry standard. Modern IT architectures require both use and protection of personally identifiable information (PII). With CipherTrust tokenization, PII protection is gained without encryption key management required by the software developer.
  • 28
    Secuvy AI

    Secuvy AI

    Secuvy AI

    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 29
    ShieldConex

    ShieldConex

    Bluefin

    Tokenize PAN (primary account number) data and associated PII/PHI data so you maintain compliance for regulations governing the handling of sensitive data. PCI DSS scope reduction across all channels and trusted third parties. Tokenization masks data at the time of input and helps your organization meet evolving security standards. The ShieldConex platform provides vaultless, format-preserving tokenization for every data element. Payment data, including credit or debit card primary account number (PAN), expiration, date, CVV, cardholder name, and more. Standardize the payment experience across businesses, locations and channels including mobile, online, and in-store.
  • 30
    Flow Security

    Flow Security

    Flow Security

    Flow is not just your cloud security tool with a data scanning utility. It is the only platform that analyzes both data at rest and data in motion. By also following and analyzing all data flows in runtime, the platform enables security teams to regain control over all their data, including shadow data stores and applications across all cloud, on-prem, and SaaS environments. Flow’s deep analysis of the organization’s data journey from origin to destination allows security teams to automatically catalog all their sensitive data (e.g. PII, PHI, PCI); visualize data flows; detect and remediate data risks; and effectively respond in real-time to data violations by providing the full context: who, what, when, where and why.
  • 31
    Acra

    Acra

    Cossack Labs

    Data leakage prevention in your app made simple. Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. Acra is easy to integrate, doesn't require significant modifications in the existing code, provides reliable data security, reduces MTTD and MTTR. Acra provides an integration library that can encrypt any record with AcraServer’s key.
    Starting Price: $10000 per year
  • 32
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
  • 33
    Prosperoware CAM

    Prosperoware CAM

    Prosperoware

    CAM fixes the challenges, mitigates the risks, and reduces the costs of using multiple collaboration systems, making it easier to provision, classify, protect, move and minimize data for project & relationship-based organizations. CAM streamlines the process of managing & governing data, making it accessible, secure and compliant. CAM minimizes the chaos of data spread across systems, making it easier for users to place documents in the right place and for risk management teams to understand context. Quickly provision Teams, Channels, workspaces, folders, & documents automatically or through a human workflow across systems. Apply rich metadata to help end users locate data & risk management teams to understand document context. Gain naming templates to create standardized naming for different groups and teams. Transform the way you protect your data. Manage internal & external users and groups across systems, assign relevant roles and permissions, & grant permissions or restrictions.
  • 34
    Commvault Intelligent Data Services
    An integrated family of solutions for actionable insights, combining Commvault Data Governance, Commvault File Storage Optimization, and Commvault eDiscovery & Compliance. We’re creating more data than ever before — we should know all about it. Drive proactive and automated actions to respond faster, prevent data theft or breach, eliminate data sprawl, and make data-driven decisions for your org. Increase storage efficiency, enable faster responses to compliance requests, and reduce your data risks with analytics, reporting, and search across production and backup data sources. Advanced “4D” technology delivering a centralized and dynamic multi-dimensional index of metadata, content, classifications, and AI applied insights. Gain visibility into production and backup data with a single unified index across on-premises, remote, cloud, and backup data sources. Customizable dashboards enable you to search, filter, and drill down to the relevant details.
  • 35
    Asigra

    Asigra

    Asigra

    Asigra helps IT teams increase their data recovery confidence through our unsurpassed reliability, security, manageability, and affordability in data protection software. Asigra's Enterprise Backup and Disaster Recovery (BDR) software platform was designed for Managed Service Providers (MSPs) to host and operate their own Backup as a Service solution. The easy to manage platform offers users the ability to white-label it to match your brand, while its breakthrough Hybrid Cloud Backup architecture combines a Cloud optimized scale-out architecture, a Cloud backup and recovery software platform, and a Cloud API and management system to help IT Teams seamlessly and efficiently manage, scale and deliver data protection services.
  • 36
    Egnyte

    Egnyte

    Egnyte

    Egnyte provides a unified content security and governance solution for collaboration, data security, compliance, and threat detection for multicloud businesses. More than 16,000 organizations trust Egnyte to reduce risks and IT complexity, prevent ransomware and IP theft, and boost employee productivity on any app, any cloud, anywhere.
    Starting Price: $10 per user per month
  • 37
    StealthAUDIT

    StealthAUDIT

    Netwrix

    StealthAUDIT automates the collection and analysis of the data you need to answer the most difficult questions you face in the management and security of dozens of critical IT assets, including data, directories, and systems. All organizations, regardless of size, require tools to help them manage and secure the various technology resources that power their businesses. However, no organization has the ability to afford, efficiently operate, or maintain separate point products for every technology they leverage. What they need are solutions that are flexible enough to bend to their unique requirements, while also providing the extensibility to deliver a common set of capabilities across multiple platforms within their IT ecosystem. StealthAUDIT contains over 40 built-in data collection modules covering both on-premises and cloud-based platforms from Operating Systems to Office 365.
    Starting Price: $10.00/one-time/user
  • 38
    ITsMine Beyond DLP
    ITsMine Beyond DLP™ goes beyond traditional Data Loss Prevention (DLP) to protect organizations against all data threats. No policies or endpoint agents needed zero effect on employee productivity, and protection even after data exfiltration. Data loss incidents are becoming more common and more destructive than ever before, whether deliberate or inadvertent or from internal or external factors. Beyond DLP™ is a completely new security approach, that enables organizations to easily track and secure their data wherever it is, within their internal network and beyond. Maintain your high-security standards regardless of whether your data is located in on-prem or cloud-based file systems. Empower employees’ full productivity while controlling the usage and whereabouts of your sensitive data. Hassle-free compliance to data protection regulations, from GDPR, CCPA, PCI to HIPPA, with access control options to sensitive data, data breach detection and clear reporting options.
  • 39
    IRI Data Protector Suite

    IRI Data Protector Suite

    IRI, The CoSort Company

    The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: ​IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you.
  • 40
    Open Raven

    Open Raven

    Open Raven

    See what's exposed, stop data leaks and privacy violations. Open Raven is the cloud native data protection platform that prevents cloud security and privacy exposures driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents. Restore visibility, regain control of your sensitive data. Open Raven is policy-driven to discover, classify, and protect your sensitive cloud assets. Stop data leaks and privacy violations at their source, from shadow accounts and dark data to misconfigurations and ill-advised access. Gain a full view of data security and privacy to avoid costly incidents. Get real-time inventory of cloud assets & data stores. Auto-discover all cloud assets instantly with live 3D maps including which accounts, VPCs, security groups may be leaking data. Classify sensitive data for privacy engineering and SecOps triage. Quickly and accurately identify all sensitive data in your cloud environment per your organization’s definition
  • 41
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
    Starting Price: $1000 per day
  • 42
    Metomic

    Metomic

    Metomic

    Reduce the risk of a data breach and automate necessary security practises, so you can spend time growing your business. Accurately identify sensitive data across all of your cloud apps and infrastructure, so you know precisely where it is, and who has access to it. Precisely control sensitive data across thousands of locations. Block data being uploaded to the wrong place, and automatically delete it when it's no longer needed. Put compliance on autopilot, with no added risk. Use Metomic's off-the-shelf data classifiers or create your own using our no-code data classifier builder. Create your own data-driven workflows from any app using our Webhooks or Query API. Metomic's secure architecture helps you eliminate your security risks, without adding new ones. Leverage Metomic's pre-built app integrations to gain visibility into data flows from day one. Explore your surface area of security risks and control what data is being processed where.
  • 43
    BooleBox

    BooleBox

    Boole Server

    BooleBox is a content security platform that maintains clients data integrity and confidentiality from unauthorized access while ensuring the highest level of encryption to protect sensitive data from attacks. Thanks to an advanced encryption system and various security settings, users can finally create, edit, share and classify files and folders, without compromising the usability. With boolebox solutions, we protect your data wherever it is, at work, in the cloud, in transit via e-mail, in shared projects, and in the most commonly used platforms, such as Windows, Outlook, Gmail, OneDrive, and SharePoint. We understand your potential digital vulnerabilities, and we protect them like no one else can because our protection is the bodyguard of your data. It never abandons it and follows it everywhere! We protect large amounts of data in different types of business sectors. We have been doing this every day since 2011.
  • 44
    TrustLogix

    TrustLogix

    TrustLogix

    The TrustLogix Cloud Data Security Platform breaks down silos between data owners, security owners, and data consumers with simplified data access management and compliance. Discover cloud data access issues and risks in 30 minutes or less, without requiring visibility to the data itself. Deploy fine-grained attribute-based access control (ABAC) and role-based access control (RBAC) policies and centrally manage your data security posture across all clouds and data platforms. TrustLogix continuously monitors and alerts for new risks and non-compliance such as suspicious activity, over-privileged accounts, ghost accounts, and new dark data or data sprawl, thus empowering you to respond quickly and decisively to address them. Additionally, alerts can be reported to SIEM and other GRC systems.
  • 45
    Google VPC Service Controls
    VPC Service Controls. Managed networking functionality for your Google Cloud resources. New customers get $300 in free credits to spend on Google Cloud during the first 90 days. All customers get free usage (up to monthly limits) of select products, including BigQuery and Compute Engine. Mitigate exfiltration risks by isolating multi-tenant services. Ensure sensitive data can only be accessed from authorized networks. Restrict resource access to allowed IP addresses, identities, and trusted client devices. Control which Google Cloud services are accessible from a VPC network. Enforce a security perimeter with VPC Service Controls to isolate resources of multi-tenant Google Cloud services—reducing the risk of data exfiltration or data breach. Configure private communication between cloud resources from VPC networks spanning cloud and on-premises hybrid deployments. Take advantage of fully managed tools like Cloud Storage, Bigtable, and BigQuery.
  • 46
    Theom

    Theom

    Theom

    Theom is a cloud data security product that discovers and protects all data in cloud stores, APIs, and message queues. Like a bodyguard who closely follows and protects a high-value asset, Theom ensures controls follow the data regardless of how it is stored or accessed. Theom identifies PII, PHI, financial information, and trade secrets using agentless scanning and NLP classifiers, which support custom taxonomies. Theom discovers dark data, data that are never accessed, and shadow data, data whose security posture is different from the primary copy. Theom pinpoints confidential data, e.g., developer keys, in APIs and message queues. Theom estimates the financial value of data to help prioritize risks. Theom maps the relationships between data, access identities, and security attributes to uncover the risks to data. Theom shows how high-value data is accessed by identities (users and roles). Security attributes including user location, atypical access patterns, etc.
  • 47
    AuricVault® Tokenization

    AuricVault® Tokenization

    Auric Systems International

    The AuricVault® tokenization service secures your vitally sensitive financial and personal data by safely storing that data and replacing the data in your system with a token. Tokens are random strings of numbers and letters that have no relationship to the stored data. If someone stole all your tokens, they still would not have any of your sensitive data. Tokenization provides what is called data separation. Data separation ensures that no single entity has all the data at one time. Auric's tokenization solution provides fine-grained permissions for one or more parties to access sensitive tokenized data. Depending on your business model, using the AuricVault® tokenization service may exclude your systems and servers from PCI scope. We help businesses protect billions of dollars and millions of transactions securely, safely, and simply.
    Starting Price: $300 per year
  • 48
    Classify360

    Classify360

    Congruity360

    A single-source Data Governance solution delivering actionable data intelligence to empower strategic decisions around data reduction, compliance, and journey to the cloud. Classify360 enables enterprises to address their ROT (redundant, obsolete, trivial) data, PII, and risk data and apply policies to maintain compliance and to reduce their data sets – leading to smaller footprints and more efficient and compliant cloud migrations. Fully index and create a single view of your organization’s data from varied and growing data sets. Identify data at the source location eliminating the burden, cost, and risk of managing additional copies. Unlock data identification at petabyte scale across all of your on-prem and cloud data sources.
  • 49
    FIS Tokenization
    The solution secures card payments anywhere by concealing sensitive cardholder information everywhere. FIS® Tokenization™ dynamically encrypts your card payments for ultimate security when customers pay online, with their phone or in a store. By replacing sensitive cardholder data with unique tokens that can’t be matched back to the cardholder or their account, our payment tokenization solutions can ease Payment Card Industry Data Security Standard (PCI DSS) compliance, better protect cardholders and manage your risk. Replace sensitive cardholder information with a unique token for reduced fraud risk. Enable cardholders to load card credentials to different payment apps quickly and securely. Simplify compliance by reducing the scope of systems that fall under the PCI DSS.
  • 50
    ACI Omni-Tokens
    Secure your customers, reduce your compliance burden, and retain the flexibility and independence to effectively manage your business with single- and multi-use tokens from ACI. ACI’s omni-tokens can be used across channels and with card and alternative payment methods. Our omni-tokens link the customer to their tokenized payment method with ease, while ensuring their highly sensitive personal data remains secure. Tokenization is one piece of the puzzle when it comes to data security — and its perfect teammate is point-to-point encryption (P2PE), which encrypts sensitive card and customer information at the terminal. Hackers target customer payment data from merchants’ back-office systems as it travels from the payments terminal to the processor. Combine tokenization and P2PE capabilities to give you peace of mind that customer data is protected at every touchpoint.