Alternatives to Box Shield

Compare Box Shield alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Box Shield in 2024. Compare features, ratings, user reviews, pricing, and more from Box Shield competitors and alternatives in order to make an informed decision for your business.

  • 1
    Heimdal Endpoint Detection and Response (EDR)
    Heimdal® Endpoint Detection and Response is our proprietary multi-solution service providing unique prevention, threat-hunting, and remediation capabilities. It combines some of the most advanced threat-hunting technologies: - Next-Gen Antivirus - Privileged Access Management - Application Control - Ransomware Encryption Protection - Patch & Asset Management - Email Security - Remote Desktop - Threat Prevention ( DNS based ) - Threat Hunting & Action Center With 9 modules working together seamlessly under one convenient roof, all within one agent and one platform, Heimdal Endpoint Detection and Response grants you access to all the essential cybersecurity layers your business needs to protect itself against both known and unknown online and insider threats. Our state-of-the-art product empowers you to quickly and effortlessly respond to sophisticated malware with stunning accuracy, protecting your digital assets and your reputation in the process as well.
    Leader badge
    Partner badge
    Compare vs. Box Shield View Software
    Visit Website
  • 2
    Safetica

    Safetica

    Safetica

    Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization. Safetica covers the following data security solutions: ✅ Data Classification: Safetica offers complete data visibility across endpoints, networks, and cloud environments. ✅ Data Loss Prevention: With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement. ✅ Insider Risk Management: With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly. ✅ Cloud Data Protection: Safetica can monitor and classify files directly during user operations. ✅ Regulatory compliance: GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
    Leader badge
    Partner badge
    Compare vs. Box Shield View Software
    Visit Website
  • 3
    GitGuardian

    GitGuardian

    GitGuardian

    GitGuardian is a code security platform that provides solutions for DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundreds of thousands of developers. GitGuardian helps developers, cloud operation, security, and compliance professionals secure software development and define and enforce policies consistently and globally across all systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets, sensitive files, IaC misconfigurations, and alert to allow investigation and quick remediation. Additionally, GitGuardian's Honeytoken module exposes decoy resources like AWS credentials, increasing the odds of catching intrusion in the software delivery pipeline. GitGuardian is trusted by leading companies, including 66 degrees, Snowflake, Orange, Iress, Maven Wave, DataDog, and PayFit. Used by more than 300K developers, it ranks #1 in the security category on GitHub Marketplace.
  • 4
    Teramind

    Teramind

    Teramind

    Teramind provides a user-centric security approach to monitoring your employees’ digital behavior. Our software streamlines employee data collection in order to identify suspicious activity, improve employee productivity, detect possible threats, monitor employee efficiency, and ensure industry compliance. We help reduce security incidents using highly customizable Smart Rules that can alert, block or lockout users when rule violations are detected, to keep your business running securely and efficiently. Our live & recorded screen monitoring lets you see user actions as they’re happening or after they’ve occurred with video-quality session recordings that can be used to review a security or compliance event, or to analyze productivity behaviors. Teramind can be installed in minutes and can be deployed either without employees knowing or with full transparency and employee control to maintain trust.
    Starting Price: $12/month/user
  • 5
    MSP360 RMM

    MSP360 RMM

    MSP360

    MSP360 RMM enables users to efficiently manage all aspects of their IT infrastructure within a single dashboard. Features include system resource monitoring, software deployment, patch management, alerting, remote access, scripting, and more. Licensed per admin with unlimited endpoints. Main features: - System resource and performance monitoring - Windows patch management - Software deployment - Reporting - Device management - Antivirus management - Alerting - PowerShell scripting - Remote access
  • 6
    SpinOne

    SpinOne

    Spin.AI

    SpinOne is an all-in-one, SaaS security platform that protects SaaS data for mission-critical SaaS applications, including Google Workplace, Microsoft 365, Salesforce and Slack, by delivering full visibility and fast incident response. It eliminates fundamental security and management challenges associated with protecting SaaS data by reducing the risk of data leak and data loss, saving time for SecOps teams through automation, reducing downtime and recovery costs from ransomware attacks, and improving compliance. SpinOne solutions include: -SaaS Backup & Recovery -SaaS Ransomware Detection & Response -SaaS Data Leak Prevention & Data Loss Protection -SaaS Security Posture Management SpinOne also integrates with popular business apps – Jira, ServiceNow, DataDog, Splunk, Slack, and Teams – to help you save time and reduce manual workloads. Exciting News: Spin.AI recognized as a Strong Performer in The Forrester Wave™: SaaS Security Posture Management, Q4 2023 Report.
  • 7
    Endpoint Protector
    Endpoint Protector is an advanced, all-in-one Data Loss Prevention solution for Windows, macOS and Linux, that puts an end to data leaks and data theft and offers seamless control of portable storage devices. Endpoint Protector’s filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or data protection regulations such as GDPR, PCI DSS, CCPA, HIPAA, etc. Endpoint Protector features several specialized modules that can be mixed and matched based on client needs. The modules comprise: Content Aware Protection, Device Control, Enforced Encryption, and eDiscovery . It makes work more convenient, secure and enjoyable, offering an excellent ROI.
  • 8
    Imatag

    Imatag

    IMATAG

    IMATAG protects your visual content online, such as product images, brand visuals, licensed content, or sensitive files. Based on a patented technology of Invisible Watermark (or Forensic Watermark), it comes in two flavors: - IMATAG LEAKS, the first online solution for the identification of photo or video leaks, - and IMATAG MONITOR, the most reliable visual search solution to track the use of your content on the internet. How it works: The software discreetly places an imperceptible identifier at the pixel level of images or videos. This invisible watermark allows to identify your content on the web regardless if it has been resized, cropped or trimmed, posted on social media or copied via a screenshot. Used as a tracker, it is also able to trace the origin of a leak. Supports images (photos, renders, design), videos, and PDF. Available as SaaS via Web UI or API, or on premise software.
  • 9
    Symantec Data Loss Prevention
    DLP gives you complete visibility and control over your information - wherever it lives and travels – and prevents insiders from exfiltrating sensitive data such as customer records and product designs. Monitors for policy violations and risky user behavior across control points at all times. Prevents and deters end users from leaking data with real-time blocking, quarantining and alerts. Allows you to respond quickly and efficiently when critical data loss happens with automated incident remediation workflows and one-click SmartResponses. Gives you flexibility to fine-tune policies to balance security and end-user productivity. Provides visibility and control over data t rest and in use in cloud apps, helping you uncover Shadow Data. Leverage your existing DLP policies and workflows to extend finely-tuned rules and business logic to cloud control points such as Office 365, G Suite, Box, Dropbox, and more.
  • 10
    Cyberhaven

    Cyberhaven

    Cyberhaven

    Cyberhaven’s Dynamic Data Tracing technology is a transformative approach to preventing IP theft and other insider threats. Automatically track and analyze the entire journey of your data from its creation through every user interaction. Continuous risk assessment proactively finds unsafe behaviors and practices before they lead to a breach. Full-context data tracing makes policies simpler and more effective with far fewer false positives and user disruptions. In-context user education and coaching drives better behavior and adherence to security best practices. Whether due to malicious actions or a moment of carelessness, data loss can have devastating financial and reputational impacts. Automatically classify sensitive data based on data origin, its creator, and content. Find data even if you didn’t know where to look. Proactively find and mitigate risks whether due to malicious insiders, unsafe behavior, or simple user mistakes.
  • 11
    Open Raven

    Open Raven

    Open Raven

    See what's exposed, stop data leaks and privacy violations. Open Raven is the cloud native data protection platform that prevents cloud security and privacy exposures driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents. Restore visibility, regain control of your sensitive data. Open Raven is policy-driven to discover, classify, and protect your sensitive cloud assets. Stop data leaks and privacy violations at their source, from shadow accounts and dark data to misconfigurations and ill-advised access. Gain a full view of data security and privacy to avoid costly incidents. Get real-time inventory of cloud assets & data stores. Auto-discover all cloud assets instantly with live 3D maps including which accounts, VPCs, security groups may be leaking data. Classify sensitive data for privacy engineering and SecOps triage. Quickly and accurately identify all sensitive data in your cloud environment per your organization’s definition
  • 12
    Check Point Data Loss Prevention (DLP)

    Check Point Data Loss Prevention (DLP)

    Check Point Software Technologies

    Check Point Data Loss Prevention (DLP) pre-emptively protects your business from unintentional loss of valuable and sensitive information. Monitor data movement and empower your employees to work with confidence, while staying compliant with regulations and industry standards. Tracks and controls any type or format of sensitive information in motion, such as e-mail, web browsing and file sharing services. Educates and alerts end-users on proper data handling without involving IT/security teams, and allows for real-time user remediation. Centrally managed across your entire IT infrastructure from a single console. Leverages out-of-the-box best practice policies.
  • 13
    GTB Technologies DLP

    GTB Technologies DLP

    GTB Technologies

    Data Loss Prevention is defined as a system that performs real-time data classification on data at rest and in motion while automatically enforcing data security policies. Data in motion is data going to the cloud, internet, devices, or the printer. Our solution is the technology leader. Protecting on-premises, off-premises, and the cloud whether it be Mac, Linux, or Windows; our Data Loss Prevention security engine accurately detects structured & unstructured data at the binary level. GTB is the only Data Loss Prevention solution that accurately protects data when off the network. Discover, identify, classify, inventory, index, redact, re-mediate, index, control and protect your data including PII, PCI, PHI, IP, unstructured data, structured data, FERC, NERC, SOX, GLBA & more. Our patented and patent-pending, proprietary technology is able to prevent the syncing of sensitive data to unsanctioned or private clouds, while allowing its users to automatically identify “sync folders”.
  • 14
    Material

    Material

    Material

    Email is an essential repository of sensitive content, the key to countless accounts, and the most ubiquitous business application. When attackers have multiple ways in, blocking messages is no longer enough. Secure critical messages without sacrificing productivity. Material automatically classifies and redacts sensitive content in email, keeping it safe even if someone gets in. A quick verification step brings the original message back into the mailbox. Limit the scope of a breach by preventing attackers from using email accounts to hijack other services. The material adds a simple verification step before granting access to password resets and other critical messages. Phishing training is an incomplete best practice, while one user reports an attack, others fall for it. Material allows a single report from any employee to instantly protect the entire organization. Get unprecedented visibility and control over your entire email footprint.
  • 15
    Google Cloud Data Loss Prevention
    Google Cloud Data Loss Prevention is a fully managed service designed to help you discover, classify, and protect your most sensitive data. Gain visibility into the data you store and process. Create dashboards and audit reports. Automate tagging, remediation, or policy based on findings. Connect DLP results into Security Command Center, Data Catalog, or export to your own SIEM or governance tool. Configure data inspection and monitoring with ease. Schedule inspection jobs directly in the console UI or stream data into our API to inspect or protect workloads on Google Cloud, on-premises, mobile applications, or other cloud service providers. Reduce risk to unlock more data for your business. Protection of sensitive data, like personally identifiable information (PII), is critical to your business. Deploy de-identification in migrations, data workloads, and real-time data collection and processing.
  • 16
    ManageEngine Device Control Plus
    Device Control Plus is an enterprise software, specially designed for complete device control and file access management. It is equipped with an intuitive interface using which the admin can efficiently classify USB and other peripheral devices as trusted, blocked or allowed temporary access. It is also equipped with numerous data security capabilities including assigning read-only file access, restricting file copying or blocking unauthorized file transfers. Additionally for extensive visibility over device actions and forensic analysis of policy efficacy and network performance, file tracing and file shadowing reports will be automatically generated. Know who is using what device on which endpoint with clear-cut audit data and reports, and receive instant alerts in case of unauthorized access.
    Starting Price: $5.95 per user per year
  • 17
    SecureTower

    SecureTower

    falcongaze

    Our DLP system helps companies protect against leaks of confidential information, as well as monitor the work of employees. Leaks of confidential information. Fraud schemes within the company. Insider activity, ineffective employees, control, actions on employees’ computers. Efficiency and loyalty of staff, employee communications, data channels, blocking, malicious actions of employees. Access to web resources (including by category), launching applications (including by category), saving data to the clipboard, connecting USB devices. Analysis, content of uploaded files (text, images, audio), employee efficiency, risk activity of employees. Statistical indicators of employee performance, investigation, information security incidents. Causes of safety violations, the reasons for the ineffective work of employees, fraud schemes within the company.
  • 18
    Humming Heads

    Humming Heads

    Humming Heads

    Prevent attacks by locking down all authorized actions and prevent leaked or stolen data from being read. Invisibly, automatically, without fail. SDS helps you focus your endpoint security efforts on what you can positively control instead of chasing the latest malware variant or trying to train your users to be security experts. Shinobi Defense System is a unique integrated portfolio of proven technologies now available for the first time in the USA. SDS invisibly protects against the top 3 hardest and most prevalent endpoint security problems driving business losses. We combine DeepWhite, the strongest whitelist-based protection technology, and Evolution DLP, a seamless and automatic data loss protection solution, into one integrated system that is powered by our patented Active Intercept engine and Shinobi Forensics logging and reporting platform. Invisibly prevents any leaked or stolen files from being read. Zero end user rules or interaction needed.
  • 19
    Fidelis Network

    Fidelis Network

    Fidelis Cybersecurity

    Detecting advanced threats requires deep inspection, extraction, and analysis of all forms of content going across the wire in real-time. Fidelis network detection and response bi-directionally scans all ports and protocols to collect rich metadata used as the basis for powerful machine-learning analytics. With direct, internal, email, web and cloud sensors, you gain full network coverage and visibility. Identified attacker TTPs are mapped against the MITRE ATT&CK™ framework to help security teams get ahead of the curve. Threats can run, but they can’t hide. Automatically profile and classify IT assets and services including enterprise IoT, legacy systems and shadow IT to map your cyber terrain. When integrated with Fidelis’ endpoint detection and response solution, you gain a software asset inventory correlated with known vulnerabilities including CVE and KB links, as well as security hygiene for patches and endpoint status.
  • 20
    Active Cypher

    Active Cypher

    Active Cypher

    Active Cypher simplifies data protection without end-users knowing and ensures hackers can’t read files even when stolen. Active Cypher integrates with Identity and Access Management solutions to provide access and privilege, secure your data, and doesn’t require extra administrative effort. Active Cypher’s Data First solutions: • Encrypts files in the background transparently to the end-user. • Allows users to share files, even outside your enterprise, and maintain control over how they’re used. • Document sharing can be revoked at any time. • Documents are controlled no matter where you store them, no matter where you send them. We turn data breaches from catastrophes to inconveniences. Regulatory reporting is reduced because data has not been compromised, even if your files are stolen.
  • 21
    MinerEye DataTracker
    MinerEye’s DataTracker enables organizations to overcome the information governance and protection challenge. It automatically scans, indexes, analyzes, virtually labels and categorizes every piece of unstructured and dark data contained in the organization’s data repositories. With proprietary Interpretive AI™, machine learning, and computer vision, the solution locates relevant files out of the billions that are stored, accurately evaluates them, qualifies them by significance and purpose, and automatically sends alerts with next best action recommendations in cases of conflicts, duplications, or potential violations. This way, data protection is profoundly enhanced while risk and operational costs are reduced.
    Starting Price: $2000/1TB/month
  • 22
    Clearswift Endpoint Data Loss Prevention
    As a vital piece of your IT security strategy, Clearswift Endpoint Data Loss Protection (DLP) solution allows organizations to detect, inspect and secure critical data on endpoints. In one solution, it provides context-aware Data in Use (DIU) policies to control which devices can connect to a corporate network and what information can be transferred. It also executes scheduled Data at Rest (DAR) scans on file systems to audit and manage critical data residing on the network or in the cloud. A lightweight agent, Clearswift Endpoint DLP works behind the scenes to enforce your security and compliance policies and provides continuity even when users are not connected to the network. Flexible and context-aware DIU policies allow organizations to apply rules that either prevent documents containing critical data from being copied to removable media, shared on the network or uploaded to the cloud, or automatically encrypt them before they are transferred.
  • 23
    Digital Guardian
    No-compromise data protection means the flexibility to adapt to your needs. Digital Guardian is unique among DLP solutions in its ability to support both a use case-based approach (known data types or user groups) or a data risk discovery approach (identifying unknown use cases). Our risk discovery approach enables you to gain visibility by showing you where sensitive data is located, how it flows in the organization, and where it is put at risk, all without policies. Powered by AWS, Digital Guardian delivers simplified deployment, low overhead, and elastic scalability for increased return on your security spend. Coverage for your Windows, macOS, or Linux operating systems and all your applications, both browser based and native. Our “unknown risk” approach enables you to see where sensitive data is located, how it flows, and where it is put at risk - all without policies. Only Digital Guardian provides content, user, and context-based data discovery and classification.
  • 24
    SURF Security

    SURF Security

    SURF Security

    Create a security air gap, reduce your attack surface and isolate your business from internal and external exploits, while streamlining SaaS apps and accessing your data. Grants access based on the identity of the users and their devices to any SaaS or on-prem apps. Isolated work environment from device and web threats locally on the endpoint, by encrypting, sandboxing and rendering content. Enforcing enterprise browser security policies like DLP, web filtering, phishing protection, extension management and more. SURF brings Zero-Trust principles to the user via the browser, protecting everyone and everything in the enterprise regardless of role. By configuring only a few policies, IT and security teams can significantly reduce the attack surface. Discover the benefits of utilizing SURF from an Information technology perspective.
  • 25
    Acronis DeviceLock DLP
    Acronis DeviceLock DLP provides comprehensive endpoint DLP (endpoint data loss prevention) – discovering and protecting sensitive data while monitoring the operations involving that information. Prevent data leakage due to employee negligence or malicious insiders by blocking any unauthorized attempt to access or transfer data, discovering and protecting sensitive data-at-rest. Reduce the complexity of data protection and cut reporting times with a single DLP solution for thorough visibility over data flows and user behavior. Reduce information security risks and comply with IT security standards and regulations by enforcing data use and handling policies that users can’t avoid following. Save the time and hassle associated with managing a DLP solution. Acronis DeviceLock DLP is easily deployable through Active Directory (AD) and offers various central management consoles, based on your organization’s requirements.
    Starting Price: $615 one-time payment
  • 26
    ITsMine Beyond DLP
    ITsMine Beyond DLP™ goes beyond traditional Data Loss Prevention (DLP) to protect organizations against all data threats. No policies or endpoint agents needed zero effect on employee productivity, and protection even after data exfiltration. Data loss incidents are becoming more common and more destructive than ever before, whether deliberate or inadvertent or from internal or external factors. Beyond DLP™ is a completely new security approach, that enables organizations to easily track and secure their data wherever it is, within their internal network and beyond. Maintain your high-security standards regardless of whether your data is located in on-prem or cloud-based file systems. Empower employees’ full productivity while controlling the usage and whereabouts of your sensitive data. Hassle-free compliance to data protection regulations, from GDPR, CCPA, PCI to HIPPA, with access control options to sensitive data, data breach detection and clear reporting options.
  • 27
    ManageEngine Endpoint DLP Plus
    ManageEngine's Endpoint DLP Plus is an enterprise solution that leverages advanced data loss prevention strategies to protect sensitive information contained within endpoint devices. The solution prevents the unauthorized transfer of important or classified data out side an organization, through the different communicative channels. This includes print or clipboard operations concerning sensitive files, upload of sensitive data to major Cloud platforms like Google Drive and Dropbox, offloading classified data on to removable storage devices and much more. Endpoint DLP Plus enables IT admins to create and deploy DLP policies for an organization's network from a centralized console and even offers ready-to-use templates to better meet compliance requirements of major regulatory bodies such as HIPAA & GDPR.
    Starting Price: $795/100 Workstations
  • 28
    Trellix DLP Endpoint
    Extend on-premises data loss prevention policies to the cloud for consistent data loss detection. Protect sensitive data such as PCI, PII, and PHI wherever it lives—on premises, in the cloud, or at the endpoints. Monitor and address day-to-day risky actions such as emailing, web posting, printing, screen capturing, uploading to the cloud, and more. Safeguard personal data and comply to regulatory compliance with automated reporting. Allow users to run endpoint discovery scans and perform self-remediation actions. With the support of DLP Endpoint on Trellix ePO, deployment, policies and incident management can be managed in the Cloud. Empower users to manually classify documents, increase employee data protection awareness, and reduce administrative burden. Includes enhanced content-aware protection and data loss prevention for Mac users. Integration with Threat Intelligence Exchange and Data Exchange Layer (DXL) helps block sensitive data in applications identified as malicious.
  • 29
    Nightfall

    Nightfall

    Nightfall

    Discover, classify, and protect your sensitive data. Nightfall™ uses machine learning to identify business-critical data, like customer PII, across your SaaS, APIs, and data infrastructure, so you can manage & protect it. Integrate in minutes with cloud services via APIs to monitor data without agents. Machine learning classifies your sensitive data & PII with high accuracy, so nothing gets missed. Setup automated workflows for quarantines, deletions, alerts, and more - saving you time and keeping your business safe. Nightfall integrates directly with all your SaaS, APIs, and data infrastructure. Start building with Nightfall’s APIs for sensitive data classification & protection for free. Via REST API, programmatically get structured results from Nightfall’s deep learning-based detectors for things like credit card numbers, API keys, and more. Integrate with just a few lines of code. Seamlessly add data classification to your applications & workflows using Nightfall's REST API.
  • 30
    Next DLP

    Next DLP

    Next DLP

    Discover risks, educate employees, enforce policies and prevent data loss with Reveal. Your people, users and data are dynamic: constantly changing and moving. In the hybrid world of work people create, manipulate and share data dynamically, across endless channels. The opportunities for data leaks are infinite and your people are the main target— securing your organization starts with securing your people. Reveal Cloud is cloud-native, so it is simple to buy, install, and use. You get automated protection from day 1 with out-of-the-box policies and machine learning, with smart remediation that works even if computers are disconnected from the network. The lightweight agent makes sure your data and employees are protected at all times without slowing you down. Continuous monitoring provides visibility into user behavior, data access, and system use. Security operators can search on file, USB device, connection, browser, application events, and more.
  • 31
    Barracuda Data Inspector
    See for yourself how Barracuda Data Inspector automatically scans and remediates your OneDrive for Business and SharePoint data for sensitive information and malicious files. SharePoint and OneDrive deployments can improperly store sensitive data, such as Social Security numbers, credit card information, network credentials, and more—putting your data at risk. With Barracuda Data Inspector, you see exactly what kind of data has been found, whether it has been shared internally or externally, and where it’s located. You can remediate that data – unshare it, quarantine it, or delete it entirely. Data Inspector also identifies sensitive information in images, including photos, screenshots, and document scans. You can further customize by creating your own data classifiers, and identify specific information types, such as employee or student IDs, project codenames, and other proprietary information.
  • 32
    Forcepoint DLP

    Forcepoint DLP

    Forcepoint

    Data protection does not have to get in the way of business productivity. Forcepoint’s focus on unified policies, user risk, and automation makes data security frictionless and intuitive. View and control all of your data with the industry's largest pre-defined policy library. Ensure regulatory compliance across 80+ countries for GDPR, CCPA and more. Deploy data classification with Boldon James and Azure Information Protection. Replace broad, sweeping rules with individualized, adaptive data security that doesn’t slow down your employees. Block actions only where you need to, and drive productivity. Protect PII and PHI, company financials, trade secrets, credit card data, and other pieces of sensitive customer data-even in images. Follow intellectual property (IP) in both structured and unstructured forms, and stop low & slow data theft even when user devices are off-network.
  • 33
    AccessPatrol

    AccessPatrol

    CurrentWare Inc.

    AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol controls a variety of peripherals, including… - Storage devices such as USB flash drives and external hard drives - Wireless Devices such as Bluetooth, Infrared, and WiFi - Communication Ports such as Serial and Parallel ports - Imaging Devices such as Scanners or Cameras, and… - Other Devices such as network share drives, printers, and mobile phones File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users. The security policies are enforced by a software agent that is installed on your user’s computers. This keeps devices restricted and monitored even when the computers are taken off of the network.
    Starting Price: $3.99 PUPM
  • 34
    InteliSecure Aperture
    Aperture centralizes, standardizes, and simplifies alert management for Microsoft data protection products including Office 365 DLP, Azure Information Protection (AIP), and Cloud App Security (CAS). Get more value from the security tools in your Microsoft E3 or E5 licenses by reducing or eliminating duplicate tools, duplicate costs, and duplicate efforts. Built for the enterprise, the Aperture platform is enabled by InteliSecure managed data protection services to streamline and simplify incident and triage handling. A personal demo, conducted by an expert Solutions Architect, will show how you can get true visibility into security events regardless of where they originate in your Microsoft ecosystem. Aperture enables tailored configurations so that your security administrators can create a powerful security strategy with custom classifications and policies, role-based access control, and standardized governance across on-premises and cloud-based applications.
  • 35
    Risk Monitor

    Risk Monitor

    SearchInform

    SearchInform Risk Monitor controls your maximum quantity of information channels as well as featuring built-in analytical tools. Provides your business with multifaceted protection against financial losses caused by internal threats in several stages: •Detecting incidents involving corporate fraud and profiteering •Controlling the human factor and predicting HR risks •Protecting confidential data from leaks during its storage, use and transfer •Facilitating regulatory compliance and investigation processes The system operates on two levels. It keeps track of the data leaving the network while at the same time monitors employee activities on computers. SearchInform Risk Monitor keeps an eye on the company’s assets 24/7 even if the employees are outside the office (field work, WFH or while on the business trip) but using corporate devices.
  • 36
    ManageEngine M365 Manager Plus
    M365 Manager Plus is an extensive Microsoft 365 tool used for reporting, managing, monitoring, auditing, and creating alerts for critical activities. With its user-friendly interface, you can easily manage Exchange Online, Azure Active Directory, Skype for Business, OneDrive for Business, Microsoft Teams, and other Microsoft 365 services all from one place. M365 Manager Plus provides exhaustive preconfigured reports on Microsoft 365 and helps you perform complex tasks including bulk user management, bulk mailbox management, secure delegation, and more. Monitor Microsoft 365 services around the clock, and receive instant email notifications about service outages. M365 Manager Plus eases compliance management with built-in compliance reports and offers advanced auditing and alerting features to keep your Microsoft 365 setup secure.
    Starting Price: $345 per year
  • 37
    Plurilock AI PromptGuard

    Plurilock AI PromptGuard

    Plurilock Security

    Plurilock AI PromptGuard is a new, patent-pending security tool designed to protect companies against data leaks while their employees use generative AI platforms like ChatGPT. Unlike other solutions to the generative AI data leakage problem, PromptGuard doesn't block AI use or individual AI prompts. Instead, PromptGuard relies on a mature DLP engine to detect sensitive data in prompts and anonymize it before it is sent to the AI platform. When the AI platform returns an answer, PromptGuard restores the original references before showing them to the user. This preserves the workflow and query flow of AI, enabling users to productively use it, while keeping sensitive data out of the AI platform's hands. PromptGuard also provides a complete, bi-directional audit log of queries and replies for each user, enabling companies to create a compliance-friendly record of what was sent to AI, and what AI sent back.
  • 38
    MyDLP

    MyDLP

    Comodo Group

    Monitor, discover and prevent data leakage on your company's network and endpoints. Sign up and get data loss protection for your company with MyDLP from Comodo! MyDLP from Comodo is a rock-solid all-in-one data loss prevention (DLP) solution. You don't need to buy several modules or products to Monitor, Discover and Prevent data leakage on your company network and endpoints. With MyDLP, you can block any data flow containing credit card numbers, social security numbers or any sensitive information. Your customers will be more comfortable when sharing their personal and financial information with you. MyDLP provides data security for web, mail, printers, removable devices and more. Your sensitive data will not leak out through network connections or endpoint devices. You train MyDLP with your private data files once, and MyDLP will protect them forever. No one will be able to transfer them outside your network.
  • 39
    Polymer

    Polymer

    Polymer Solutions

    Polymer DLP is a comprehensive data governance and remediation platform that integrates with your SaaS applications. We use machine learning and natural language processing to automatically detect and stop sensitive information like PII or business-critical data from going to the wrong people in real time. In addition, we offer real time feedback and training to stop future incidents before they happen. Try for free today and set up a custom policy in minutes. Polymer is constantly expanding, currently we integrate with Slack, Google Drive, Microsoft Teams, One Drive, Bitbucket, Github and Box.
    Starting Price: $4/month/user
  • 40
    Zecurion DLP

    Zecurion DLP

    Zecurion

    Minimize your corporate data leakage risks with Zecurion Data Loss Prevention. The easiest to implement enterprise DLP. You can deploy it yourself using our detailed step-by-step instructions. Policy templates for quick deployment right out of the box. Dedicated account manager speaking your language. Deployment and configuration support at no extra charge. 24x7 technical support via phone, email or messenger. Deployment within 2 business days. The most technologically advanced DLP system. More than 10 technologies, used together, minimize errors and false positives. Investigate any incidents easily with Zecurion DLP. А DLP system intuitively understandable without documentation. Use an early threat detection with user behavior analytics (UBA) module. Ready-made templates for compliance with legal requirements. Convenient dashboard and preset visual reports. Calculates more than 10 different characteristics for each user.
  • 41
    Netkiller DLP

    Netkiller DLP

    Netkiller

    We help every business to evolve in the cloud by bringing the best for Cloud Security because no business should be stopped by a security concern in the post-pandemic era. We provide industry-leading customization for your organization’s specific needs. From enterprise-level security protocols to affiliate integration, we offer services tailored to your business. Collavate was developed, at its core, for Google Workspace. It allows you to cultivate discussion, rapidly iterate, and submit assets for approval all in one place. Netkiller ISMS offers real-time data breach detection, immediate quarantine, and data access location logs. It offers unparalleled tracing and detection, with industry-leading AI reporting all through any Google Workspace Edition. KillerID provides individual or integrated cloud user logins in conjunction with home or office users from your Google Login. Create custom login security policies, IP filtering, and access limitations to private cloud services.
  • 42
    Fasoo Secure Email
    Allow users to send decrypted documents through email without having to remove the encryption before sending. This email-based DLP tool provides an exception for encrypted documents through an approval process so internal documents always remain encrypted. Once approved, documents are decrypted by the server prior to sending them. Decrypt documents automatically as users email them without requiring the sender to request approval to decrypt the document before sending it to a recipient. Maintain document security throughout your environment, since unprotected documents are not stored on the user’s PC or mailbox.
  • 43
    Carbide

    Carbide

    Carbide

    Get compliant, prevent breaches, and save money with a security and privacy program that doesn’t slow down your growth. While “checkbox”-style security and privacy can seem attractive, it builds security debt that multiplies with each new regulation and every new security questionnaire. Instead, Carbide makes enterprise-class security accessible to companies of all sizes. That means that start-ups get the step-by-step support they need to design and implement strong security and privacy, while established security teams gain back valuable time by capitalizing on the automation and efficiency provided by the platform. Adopting a security and privacy posture that goes beyond checkbox compliance is possible even without a large security team. Carbide breaks down enterprise-class security and privacy requirements and makes them accessible to, and achievable by, companies of all sizes.
  • 44
    SearchInform DLP

    SearchInform DLP

    SearchInform

    The solution helps you know your data and put controls just right where you need them to protect a company from confidential information leakage. SearchInform DLP monitors all popular data transfer channels, analyzes information, detects and prevents violations, provides reports to a person in charge. SEARCHINFORM DLP HELPS BUSINESSES IN MANY WAYS: •Protects confidential information from leakage during use and transfer •Takes control of remote access and virtualization tools (TeamViewer, RAdmin, RDP) •Encrypts data to prevent it from being used outside the company •Reports irregular events within the network, such as copying data to removable storage devices or deleting a large number of files
  • 45
    Proofpoint Intelligent Classification and Protection
    Augment your cross-channel DLP with AI-powered classification. Proofpoint Intelligent Classification and Protection is an AI-powered approach to classifying your business-critical data. It recommends actions based on risk accelerating your enterprise DLP program. Our Intelligent Classification and Protection solution helps you understand your unstructured data in a fraction of the time required by legacy approaches. It categorizes a sample of your files using a pre-trained AI-model. And it does this across file repositories both in the cloud and on-premises. With our two-dimensional classification, you get the business context and confidentiality level you need to better protect your data in today’s hybrid world.
  • 46
    ESET Endpoint Security
    Uncover the unknown in your network with this EDR solution. This endpoint detection and response tool leverages ESET's multilayered Endpoint Protection Platform. All layers send relevant data to ESET Enterprise Inspector, which analyzes vast amounts of real-time endpoint data. Provides quick analysis and remediation of any security issue in the network. ESET Enterprise Inspector provides a unique behavior and reputation based detection that is fully transparent to security teams. All rules are easily editable via XML to allow fine-tuning. New rules can be created to match the needs of specific enterprise environments, including SIEM integrations. Utilize ESET’s endpoint detection and response tool to easily suppress false alarms by adjusting the sensitivity of detection rules for different computer groups or users. Combine criteria such as file name/path/hash/command line/signer to fine-tune the trigger conditions.
    Starting Price: $38 per user per year
  • 47
    SecureIdentity DLP
    SecureIdentity DLP is a data protection portfolio of solutions (on-premises, off-premises and the cloud), which prevents the loss of data from malware, insider threat and human error. This can be achieved across multi-channels, regardless of file types, by blocking sensitive data across structured and unstructured data repositories. Our SecureIdentity DLP platform provides the identity of the user, the device and the data they are working on so you can prove exactly who is doing what at any time. With increasing integrations with other parts of the security market, DLP has become essential for protecting organizations when newer technologies are to be adopted. Our DLP solutions are unique from competitors as we address threats from trusted and un-trusted users, through unique intellectual algorithms and fingerprinting features. SecureIdentity DLP conducts real-time inspection of all protocols, even ones that are unknown, and has the ability to stop data loss immediately.
  • 48
    Talon Enterprise Browser

    Talon Enterprise Browser

    Talon Cyber Security

    The first secure enterprise browser designed for the future of work. Defend against malware and prevent data loss for SaaS and web-based applications for any business user from any location or device. TalonWork, is a hardened Chromium-based browser that isolates web traffic locally on the endpoint, providing a responsive, native user experience. TalonWork integrates with popular Identity Providers to streamline user onboarding and policy enforcement. TalonWork provides comprehensive DLP to reduce cyber risk. This includes file encryption to prevent sensitive files from being shared externally or stored on endpoints. TalonWork also provides granular clipboard, printing, and screenshot restrictions. TalonWork blocks access to malicious domains and phishing websites with URL filtering and enhanced safe browsing functions. TalonWork also prevents malicious files from being uploaded/downloaded using Talon’s file scanning engine or CrowdStrike Falcon X.
  • 49
    Menlo Security

    Menlo Security

    Menlo Security

    Our platform invisibly protects users wherever they go online. So threats are history and the alert storm is over. Explore the key ingredients that make the Menlo Security platform so secure, seamless, and simplified. Fueling our unique approach to security, the Elastic Isolation Core protects against known and unknown threats, and isolates them before they get to users. Zero Trust isolation provides 100% protection with no need for special software or plug-ins, so users experience no impact on performance or interruption in workflow. Cloud-native and high performance, the Elastic Edge is built to scale globally on demand. It dynamically scales to meet enterprise-level growth—from 1000 users to over 3M— with no performance hit, and is easily extendible with a rich set of APIs and integrations.
  • 50
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.