Alternatives to Concentric

Compare Concentric alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Concentric in 2024. Compare features, ratings, user reviews, pricing, and more from Concentric competitors and alternatives in order to make an informed decision for your business.

  • 1
    Satori

    Satori

    Satori

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.
  • 2
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 3
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
  • 4
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
  • 5
    Dasera

    Dasera

    Dasera

    Dasera is a Data Security Posture Management (DSPM) platform providing automated security and governance controls for structured and unstructured data across cloud and on-prem environments. Uniquely, Dasera monitors data in use while offering continuous visibility and automated remediation, preventing data breaches across the entire data lifecycle. Dasera provides continuous visibility, risk detection, and mitigation to align with business goals while ensuring seamless integration, unmatched security, and regulatory compliance. Through its deep understanding of the four data variables - data infrastructure, data attributes, data users, and data usage - Dasera promotes a secure data-driven growth strategy that minimizes risk and maximizes value, giving businesses a competitive edge in today's rapidly evolving digital landscape.
    Starting Price: 3 data stores at $20,000
  • 6
    Seclore Data-Centric Security Platform
    Integrate and automate best-of-breed data security solutions. Take control of your destiny. With Seclore’s Data-Centric Security Platform you can unify best-of-breed Data-Centric Security solutions into a cohesive, automated framework without added integration costs. While DLP, Classification, and Rights Management each have their strengths, together they ensure documents are properly protected and tracked wherever they travel. And let’s not forget your existing Enterprise systems! EFSS, eMail, ECM, Directories, and SIEM can be easily added to the framework to further automate the process. Seamlessly unite best-in-class DLP, Data Classification, Rights Management and SIEM systems into an automated process for superior information security without added integration costs. The Seclore Unified Policy Manager enables you to orchestrate identity management, policy management, connectivity, encryption, and the collection of document usage insights.
  • 7
    Klassify

    Klassify

    Klassify

    Klassify enforces users to clearly identify the sensitivity of information by applying classification labels and protective markings to documents and emails. As users work with the information, visual classification labels encourage them for proper handling as per their organization's information security guidelines. Klassify is a dynamic data classification platform that enables organizations to discover, classify and protect their business-critical data and ensure consistent and proper handling of the data by involving end users. Klassify helps organizations to discover and identify sensitive information in their legacy data across endpoint systems, servers, storage, databases, and cloud platforms for proper data handling in the future. Klassify simplifies the task of complying with regulatory compliances like PCI, GDPR, HIPAA, DPA, etc. View detailed metadata and contextual information to enable improved information governance and organizational efficiency for unstructured data.
  • 8
    Kogni

    Kogni

    Kogni

    Kogni's Discover feature enables enterprises to locate and detect all sensitive and critical information. Discover sensitive data from any source, in any format and in any type. Employ Kogni’s expert sensitive data discovery software to automate data discovery and classification. Our ease of implementation allows for seamless integration with your enterprise’s data warehouse. Accelerate compliance with international data regulations and industry standards with Kogni’s sensitive data discovery tool. Minimize the risk of data leak and the cost of non-compliance with data protection and privacy regulations like HIPAA, GDPR, CCPA, PCI, and PII amongst others. Scans and pin-points sensitive data from 10+ data sources. Produces a comprehensive sensitive information dashboard with an array of special features. Custom-build your sensitive data classification groups as per your company’s needs. Supports a wide range of data types and formats.
  • 9
    Proofpoint Intelligent Classification and Protection
    Augment your cross-channel DLP with AI-powered classification. Proofpoint Intelligent Classification and Protection is an AI-powered approach to classifying your business-critical data. It recommends actions based on risk accelerating your enterprise DLP program. Our Intelligent Classification and Protection solution helps you understand your unstructured data in a fraction of the time required by legacy approaches. It categorizes a sample of your files using a pre-trained AI-model. And it does this across file repositories both in the cloud and on-premises. With our two-dimensional classification, you get the business context and confidentiality level you need to better protect your data in today’s hybrid world.
  • 10
    Fasoo Data Radar
    Fasoo Data Radar (FDR) is a robust Data Security Posture Management (DSPM). Fasoo Data Radar discovers, classifies, and controls unstructured data without complex business rules, allowing organizations to fortify and scale their data security and privacy infrastructure. Our DSPM identifies potential risks and vulnerabilities, implements proper controls, and maintains data visibility through its entire lifecycle. As part of a comprehensive Data Security Platform (DSP), FDR goes beyond mere data discovery and classification by applying encryption, access control, and traceability to effectively prevent data breach, protect intellectual property, and maintain compliance with privacy regulations such as GDPR, HIPAA, CCPA, NYDFS, and PCI.
  • 11
    Symmetry DataGuard DSPM
    Modern businesses make decisions based on data. Modern privacy legislation is focused on the security and privacy of data. Some businesses are built on data. And as businesses become increasingly digital and move to the cloud, securing that data is more important than ever. While the cloud offers many advantages with flexibility and scalability, it also presents new challenges for data protection. One of the biggest challenges is the sheer volume of data that organizations need to protect. With the cloud, enterprises can generate and store vast amounts of data more easily than ever before. This data is often spread across multiple platforms and locations, making it more difficult to keep track of and protect. DataGuard DSPM extends the zero-trust philosophy to your hybrid cloud data stores and develops a complete understanding of what data types you have, where it data is stored, who and what has access, and how it’s secured.
  • 12
    Normalyze

    Normalyze

    Normalyze

    Our agentless data discovery and scanning platform is easy to connect to any cloud account (AWS, Azure and GCP). There is nothing for you to deploy or manage. We support all native cloud data stores, structured or unstructured, across all three clouds. Normalyze scans both structured and unstructured data within your cloud accounts and only collects metadata to add to the Normalyze graph. No sensitive data is collected at any point during scanning. Display a graph of access and trust relationships that includes deep context with fine-grained process names, data store fingerprints, IAM roles and policies in real-time. Quickly locate all data stores containing sensitive data, find all-access paths, and score potential breach paths based on sensitivity, volume, and permissions to show all breaches waiting to happen. Categorize and identify sensitive data-based industry profiles such as PCI, HIPAA, GDPR, etc.
    Starting Price: $14,995 per year
  • 13
    BigID

    BigID

    BigID

    BigID is data visibility and control for all types of data, everywhere. Reimagine data management for privacy, security, and governance across your entire data landscape. With BigID, you can automatically discover and manage personal and sensitive data – and take action for privacy, protection, and perspective. BigID uses advanced machine learning and data intelligence to help enterprises better manage and protect their customer & sensitive data, meet data privacy and protection regulations, and leverage unmatched coverage for all data across all data stores. 2
  • 14
    Getvisibility

    Getvisibility

    Getvisibility

    Getvisibility's customizable AI revolutionizes the DSPM landscape. With cutting-edge algorithms and user-friendly interfaces, it empowers businesses to unlock unprecedented insights, optimize performance, and detect anomalies in real time. Experience the power of tailored solutions that elevate your DSPM capabilities to new heights. Using AI and machine learning, Getvisibility provides the fastest and most accurate data discovery and classification platform. Our AI Models are trained on Industry-specific knowledge allowing you to quickly and accurately classify all of your data. Getvisibilities OCR capabilities enable organizations to see within pictures and images. Through our cutting-edge AI models, developed specifically for your security needs, our platform empowers your organization to swiftly identify your most sensitive data. With our advanced algorithms, Getvisibility enables the precise identification of protected surfaces, including personally identifiable information (PII).
  • 15
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 16
    CipherTrust Data Security Platform
    Thales has pushed the innovation envelope with the CipherTrust Data Security Platform to remove complexity from data security, accelerate time to compliance, and secure cloud migrations. This next-generation platform is built on a modern micro-services architecture, is designed for the cloud, includes Data Discovery and Classification, and fuses together the best capabilities from the Vormetric Data Security Platform and KeySecure and connector products. CipherTrust Data Security Platform unifies data discovery, classification, data protection, and unprecedented granular access controls with centralized key management – all on a single platform. This results in less resources dedicated to data security operations, ubiquitous compliance controls, and significantly reduced risk across your business. The CipherTrust Data Security Platform is an integrated suite of data-centric security products and solutions that unify data discovery, protection and control in one platform.
  • 17
    Netwrix Data Classification
    Does your organization’s ever-growing data give you a headache? Netwrix Data Classification solves your data-related challenges, such as mitigating the risk of data breaches, realizing the full value of your content, increasing employee productivity and passing compliance audits with less effort. Find sensitive content, such as financial data, medical records and other PII, both on premises and in the cloud. Automatically quarantine critical or sensitive data stored in unsecure locations or accessible by large groups of users to minimize its exposure until you can make a thoughtful remediation decision. Gain a better understanding of data patterns specific to your organization. With compound term processing and statistical analysis, you’ll get more relevant results than by relying on keywords and semantic analysis. Kick off your discovery in minutes with out-of-the-box rules that identify data protected by GDPR, PCI DSS, HIPAA and other regulations.
  • 18
    Microsoft Purview
    Microsoft Purview is a unified data governance service that helps you manage and govern your on-premises, multicloud, and software-as-a-service (SaaS) data. Easily create a holistic, up-to-date map of your data landscape with automated data discovery, sensitive data classification, and end-to-end data lineage. Empower data consumers to find valuable, trustworthy data. Automated data discovery, lineage identification, and data classification across on-premises, multicloud, and SaaS sources. Unified map of your data assets and their relationships for more effective governance. Semantic search enables data discovery using business or technical terms. Insight into the location and movement of sensitive data across your hybrid data landscape. Establish the foundation for effective data usage and governance with Purview Data Map. Automate and manage metadata from hybrid sources. Classify data using built-in and custom classifiers and Microsoft Information Protection sensitivity labels.
    Starting Price: $0.342
  • 19
    Forcepoint DLP

    Forcepoint DLP

    Forcepoint

    Data protection does not have to get in the way of business productivity. Forcepoint’s focus on unified policies, user risk, and automation makes data security frictionless and intuitive. View and control all of your data with the industry's largest pre-defined policy library. Ensure regulatory compliance across 80+ countries for GDPR, CCPA and more. Deploy data classification with Boldon James and Azure Information Protection. Replace broad, sweeping rules with individualized, adaptive data security that doesn’t slow down your employees. Block actions only where you need to, and drive productivity. Protect PII and PHI, company financials, trade secrets, credit card data, and other pieces of sensitive customer data-even in images. Follow intellectual property (IP) in both structured and unstructured forms, and stop low & slow data theft even when user devices are off-network.
  • 20
    Polar Security

    Polar Security

    Polar Security

    Automate data discovery, protection & governance in your cloud workload and SaaS applications. Automatically pinpoint all your exposed sensitive data in cloud workloads and SaaS applications, allowing you to shrink the data attack surface. Identify and classify sensitive data such as PII, PHI, PCI, and custom company IP to prevent sensitive data exposure. Get actionable insights on how to protect your cloud data and ensure compliance, in real-time. Enforce data access policies to achieve least privileged access, maintain a strong security posture, and remain resilient to cyber-threats.
  • 21
    Laminar

    Laminar

    Laminar

    In cloud environments developers and data scientists have the power to capture, copy and manipulate data whenever they see fit. The pace of change is so rapid that data in the cloud is largely invisible to security and governance teams. As cloud data is unknown and not visible to security it is often unprotected, exposed and vulnerable to both external and internal threats. Manual approaches to verify and enforce data security policies are no longer adequate. They are out of date the moment they are complete as the pace of change is too rapid to keep up. Further, data movement within the cloud (such as across geographies) can easily overcome controls and compliance. Data accesses are not monitored typically because security and governance teams don't know which instances to turn logging on and lack information about application dependencies to distinguish between authorized and unauthorized data accesses or to look for anomalies.
  • 22
    Forcepoint Data Classification
    Forcepoint Data Classification leverages Machine Learning (ML) and Artificial Intelligence (AI) to increase the accuracy of data classification for unstructured data to improve your team’s efficiency, reduce false alerts and better prevent data loss. Insight generated using AI drives an innovative approach to classification so you can accurately and efficiently determine how data should be classified, at scale. Coverage of the broadest range of data types in the industry powers efficiency and streamlines compliance while delivering better protection for organizations’ data. Increase the speed and efficiency of data classification to reduce false positives and spend more time on legitimate data security incidents. Forcepoint enables organizations to discover, classify, monitor, and protect data with a complementary suite of data security products. Gain a panoramic view of unstructured data across your organization.
  • 23
    SISA Radar

    SISA Radar

    SISA Information Security

    Helping organizations improve data protection with data discovery, file analysis and classification. Secure your entire data ecosystem with SISA Radar data discovery and data classification. Organize and classify sensitive data based on the criticality and business needs. Gain contextual information to improve sensitive data management. Gain visibility into structured, semi-structured and unstructured sensitive data. Protect data from unauthorized access. Meet compliance standards of PCI DSS, GDPR, CCPA, POPIA, PDPA, APRA and other privacy regulations Create and customize your own data classification scheme. Embrace a scalable and future-proof approach to next-gen data security. A single platform to discover, identify and contextualize sensitive data. A proprietary data discovery algorithm for faster detection and lower false positives.
  • 24
    GTB Technologies DLP

    GTB Technologies DLP

    GTB Technologies

    Data Loss Prevention is defined as a system that performs real-time data classification on data at rest and in motion while automatically enforcing data security policies. Data in motion is data going to the cloud, internet, devices, or the printer. Our solution is the technology leader. Protecting on-premises, off-premises, and the cloud whether it be Mac, Linux, or Windows; our Data Loss Prevention security engine accurately detects structured & unstructured data at the binary level. GTB is the only Data Loss Prevention solution that accurately protects data when off the network. Discover, identify, classify, inventory, index, redact, re-mediate, index, control and protect your data including PII, PCI, PHI, IP, unstructured data, structured data, FERC, NERC, SOX, GLBA & more. Our patented and patent-pending, proprietary technology is able to prevent the syncing of sensitive data to unsanctioned or private clouds, while allowing its users to automatically identify “sync folders”.
  • 25
    JANUSEC Privacy
    JANUSEC Privacy, provides an accountability framework and on-premise IT solutions for privacy compliance governance, including records of processing activities, privacy impact assessments, asset security assessments, control measures, etc., to help enterprises demonstrate privacy compliance with accountability (GDPR, CCPA etc.). Records of Processing Activities (GDPR Article 30). PIA (Privacy Impact Assessment) or DPIA (Data Protection Impact Assessment, GDPR Article 35). Data classification, demonstrate compliance with accountability (GDPR Article 5). JANUSEC Privacy, provides an accountability framework and on-premise IT solutions for privacy compliance governance, including records of processing activities, privacy impact assessments, asset security assessments, control measures, etc., to help enterprises demonstrate privacy compliance with accountability (GDPR etc.).
    Starting Price: $299/month
  • 26
    NetApp Cloud Data Sense
    Driven by powerful AI algorithms, NetApp® Cloud Data Sense provides automated controls and reporting so that you can always stay on top of your data. Data availability, ownership, completeness, and quality are crucial for business efficiency and cost optimization. Make smart data decisions, and automate and execute those data optimization plans you’ve been delaying. NetApp Cloud Data Sense automatically discovers, maps, and classifies your data, wherever it might be. With Cloud Data Sense, you can automatically label and act on information stored in files and database entries. By using granular data parameters and AI-driven contextual language identification, Cloud Data Sense makes it easier to govern your data. It visualizes your data for you at all times. Cloud Data Sense lets you analyze a wide and growing range of data sources. You can analyze structured and unstructured data, in the cloud or on premises.
    Starting Price: $50 TB per month
  • 27
    Sotero

    Sotero

    Sotero

    Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment. The Sotero data security platform employs an intelligent data security fabric that ensures your sensitive data is never left unprotected. Sotero automatically secures all your data instances and applications, regardless of source, location or lifecycle stage (at rest, in transit, or in use). With Sotero, you can move from a fragmented, complex data security stack to one unified data security fabric that provides 360° management of your entire data security ecosystem. You’re no longer forced to go to point solutions to know who is accessing your data. You get governance, auditability, visibility, and 100% control via a single pane. The Sotero platform protects any data asset wherever it resides – whether the data is a relational database, unstructured, semi-structured, structured, on-premise or in the cloud.
  • 28
    Protecto

    Protecto

    Protecto.ai

    While enterprise data is exploding and scattered across various systems, oversight of driving privacy, data security, and governance has become very challenging. As a result, businesses hold significant risks in the form of data breaches, privacy lawsuits, and penalties. Finding data privacy risks in an enterprise is a complex, and time-consuming effort that takes months involving a team of data engineers. Data breaches and privacy laws are requiring companies to have a better grip on which users have access to the data, and how the data is used. But enterprise data is complex, so even if a team of engineers works for months, they will have a tough time isolating data privacy risks or quickly finding ways to reduce them.
  • 29
    Dig

    Dig

    Dig Security

    Real-time visibility, control, and protection of data assets across any cloud. Dig allows you to protect all the data that matters without giving up cloud agility and speed. Comprising 40% of deployed cloud resources, cloud data assets are the target of most of the cyberattacks occurring today. The ever-growing volume and variety of data held by organizations across multiple clouds intensifies this very real risk. And yet, until now there has been no cyber security solution specifically dedicated to data. Dig Security bridges this gap. The foundation for data security via visibility into where sensitive data is, who has access and how it is being used. Prevents sensitive data from leaving an organization via monitoring sensitive data and stopping an attack before exfiltration. Proactive defense of data. Provides real-time detection and response to indicators of an active threat.
  • 30
    Open Raven

    Open Raven

    Open Raven

    See what's exposed, stop data leaks and privacy violations. Open Raven is the cloud native data protection platform that prevents cloud security and privacy exposures driven by modern speed and sprawl. Restore full visibility and regain control within minutes, without agents. Restore visibility, regain control of your sensitive data. Open Raven is policy-driven to discover, classify, and protect your sensitive cloud assets. Stop data leaks and privacy violations at their source, from shadow accounts and dark data to misconfigurations and ill-advised access. Gain a full view of data security and privacy to avoid costly incidents. Get real-time inventory of cloud assets & data stores. Auto-discover all cloud assets instantly with live 3D maps including which accounts, VPCs, security groups may be leaking data. Classify sensitive data for privacy engineering and SecOps triage. Quickly and accurately identify all sensitive data in your cloud environment per your organization’s definition
  • 31
    VGS Platform

    VGS Platform

    Very Good Security

    The VGS Vault enables users to safely store their tokenized data. This creates a safe haven for your most sensitive data. In the event of a breach, there’s nothing to steal. You can’t hack what’s not there. VGS is the modern approach to data security. Our SaaS solution gives you all the benefits of interacting with sensitive and regulated data without the liability of securing it. Use the interactive example to see how data is transformed by VGS. Choose Redact or Reveal to hide or display data, respectively. Whether you’re building a new product and want best-in-class security from the start or are an established company looking to eliminate compliance as a roadblock to new business, VGS can help. VGS takes on the liability of securing your data, eliminating the risk of data breaches and reducing compliance overhead. For companies that prefer to vault their own data, VGS layers on protection to the systems, preventing unauthorized access and leakage.
  • 32
    Qostodian
    Qostodian is the ultimate data security posture management platform for businesses. With risk profiling, real-time insights, sensor management, and actionable alerts, it’s the one-stop shop to stay ahead of security threats. Qostodian provides an unprecedented level of granular insights, allowing companies to continuously monitor their security posture and efficiently pinpoint and resolve security concerns as they arise. Qohash’s Qostodian platform finds, inventories, and continuously monitors individual data elements across workstations, attached and shared drives, and Microsoft 365 cloud apps. Monitor employee interactions with sensitive data 24/7, with a modern, intuitive SaaS data security platform, offered for a one-time predictable fee. Secure your entire environment, including workstations and Microsoft cloud applications. Your sensitive information never leaves your environment. Look into files and get even more precise results with granular data element tracking.
    Starting Price: $13,000 per 3 years
  • 33
    Titus Classification Suite
    Achieving compliance across a wealth of new international data privacy laws and regulations is the benchmark for effective cybersecurity, and data classification is the first step to building a strong data protection posture. The family of Titus Classification products provides the essential tools to clearly inform both your people and your policies on what data should be secured and how to handle it. Manage and protect your data with the industry’s most flexible and customizable classification metadata schema. Give your data context so people and systems understand how to handle the information. A classification and policy enforcement tool that ensures all Microsoft Office documents are classified before they can be saved, printed, or sent via email. Ensure that every email is classified and protectively marked before it is sent. Allow end users to classify and protect any file type with just a few mouse clicks in Microsoft Windows Explorer helping protect your organization.
  • 34
    Spirion

    Spirion

    Spirion

    Spirion has relentlessly solved real data protection problems since 2006 with accurate, contextual discovery of structured and unstructured data; purposeful classification; automated real-time risk remediation; and powerful analytics and dashboards to give organizations greater visibility into their most at-risk data and assets. Spirion's data protection software enables organizations to reduce risk exposure, gain visibility into their data footprint, improve business efficiencies and decision-making while facilitating compliance with data protection laws and regulations.
  • 35
    Nightfall

    Nightfall

    Nightfall

    Discover, classify, and protect your sensitive data. Nightfall™ uses machine learning to identify business-critical data, like customer PII, across your SaaS, APIs, and data infrastructure, so you can manage & protect it. Integrate in minutes with cloud services via APIs to monitor data without agents. Machine learning classifies your sensitive data & PII with high accuracy, so nothing gets missed. Setup automated workflows for quarantines, deletions, alerts, and more - saving you time and keeping your business safe. Nightfall integrates directly with all your SaaS, APIs, and data infrastructure. Start building with Nightfall’s APIs for sensitive data classification & protection for free. Via REST API, programmatically get structured results from Nightfall’s deep learning-based detectors for things like credit card numbers, API keys, and more. Integrate with just a few lines of code. Seamlessly add data classification to your applications & workflows using Nightfall's REST API.
  • 36
    IBM InfoSphere QualityStage
    IBM InfoSphere® QualityStage® is designed to support your data quality and information governance initiatives. It enables you to investigate, cleanse and manage your data, helping you maintain consistent views of key entities including customers, vendors, locations and products. The solution helps you deliver quality data for your big data, business intelligence, data warehousing, application migration and master data management projects. Also available for IBM System z®. Provides capabilities including data profiling, standardization, probabilistic matching and data enrichment. Enables cross-organization capabilities to support your information governance policies. Use deep data profiling and analysis to provide understanding of the content, quality and structure of tables and files. This includes column analysis, data classification, data quality scores, relationship analysis, multicolumn primary key analysis and overlap analysis.
  • 37
    Blindata

    Blindata

    Blindata

    Blindata covers all the functions of a Data Governance program: Business Glossary, Data Catalog & Data Lineage build an integrated and complete view on your Data. Data Classification module gives a semantic meaning to the data while the Data Quality, Issue Management & Data Stewardship modules improve the reliability and trust on data. Moreover, privacy compliance can leverage specific features: registry of processing activities, centralized privacy note management, consent registry with Blockchain integrated notarization. Blindata Agent can connect to different data sources, collecting metadata such data structures (Tables, Views, Fields, …), data quality metrics, reverse lineage, etc. Blindata has a modular and entirely API based architecture allowing systematic integration with the most critical business systems (DBMS, Active Directory, e-commerce, Data Platforms). Blindata is available as SaaS, can be installed “on Premise” or purchased on AWS Marketplace.
    Starting Price: $2000/year/user
  • 38
    Imperva Data Security Fabric
    Protect data at scale with an enterprise-class, multicloud, hybrid security solution for all data types. Extend data security across multicloud, hybrid, and on-premises environments. Discover and classify structured, semi-structured, & unstructured. Prioritize data risk for both incident context and additional data capabilities. Centralize data management via a single data service or dashboard. Protect against data exposure and avoid breaches. Simplify data-centric security, compliance, and governance. Unify the view and gain insights to at-risk data and users. Supervise Zero Trust posture and policy enforcement. Save time and money with automation and workflows. Support for hundreds of file shares and data repositories including public, private, datacenter and third-party cloud services. Cover both your immediate needs & future integrations as you transform and extend use cases in the cloud.
  • 39
    Stack Identity

    Stack Identity

    Stack Identity

    We identify, eliminate and govern shadow access - unauthorized, unmonitored and invisible access to cloud data, applications and infrastructure before an attacker can exploit it. We transform cloud IAM operations with an automated and risk-driven approach to securing and governing cloud data. This empowers cloud and security teams to quickly identify every data access pattern; who, what, when, where and why there is data access and its impact on cloud data security. Stack Identity protects cloud data by prioritizing both the risk and impact of identity, access and data vulnerabilities, visualized via our live data attack map. We help you remediate all types of access risks – human and API-based, guiding identity practitioners, governance and compliance teams and data owners to take definitive action and provide SecOps and DevOps teams with an honest view of cloud security risks.
  • 40
    Flow Security

    Flow Security

    Flow Security

    Flow is not just your cloud security tool with a data scanning utility. It is the only platform that analyzes both data at rest and data in motion. By also following and analyzing all data flows in runtime, the platform enables security teams to regain control over all their data, including shadow data stores and applications across all cloud, on-prem, and SaaS environments. Flow’s deep analysis of the organization’s data journey from origin to destination allows security teams to automatically catalog all their sensitive data (e.g. PII, PHI, PCI); visualize data flows; detect and remediate data risks; and effectively respond in real-time to data violations by providing the full context: who, what, when, where and why.
  • 41
    TrustLogix

    TrustLogix

    TrustLogix

    The TrustLogix Cloud Data Security Platform breaks down silos between data owners, security owners, and data consumers with simplified data access management and compliance. Discover cloud data access issues and risks in 30 minutes or less, without requiring visibility to the data itself. Deploy fine-grained attribute-based access control (ABAC) and role-based access control (RBAC) policies and centrally manage your data security posture across all clouds and data platforms. TrustLogix continuously monitors and alerts for new risks and non-compliance such as suspicious activity, over-privileged accounts, ghost accounts, and new dark data or data sprawl, thus empowering you to respond quickly and decisively to address them. Additionally, alerts can be reported to SIEM and other GRC systems.
  • 42
    iDiscover

    iDiscover

    Mage Data

    Uncover hidden sensitive data locations within your enterprise through Mage's patented Sensitive Data Discovery module. Find data hidden in all types of data stores in the most obscure locations, be it structured, unstructured, Big Data, or on the Cloud. Leverage the power of Artificial Intelligence and Natural Language Processing to uncover data in the most complex of locations. Ensure efficient identification of sensitive data with minimal false positives with a patented approach to data discovery. Configure any additional data classifications over and above the 70+ out of the box data classifications covering all popular PII and PHI data. Schedule sample, full, or even incremental scans through a simplified discovery process.
  • 43
    Global IDs

    Global IDs

    Global IDs

    Find out some of the best platform features provided by Global IDs, which brings in a set of Enterprise Data Solutions like data governance, data compliance, cloud migration, rationalization, privacy, analytics & much more! Global IDs EDA Platform feature comprises a set of core functions: automated discovery and profiling, data classification, data lineage, data quality and more – that render data transparent, trustworthy, and explainable across the ecosystem. Global IDs EDA platform architecture is designed for integration from the ground up with all platform functionality accessible via APIs. Global IDs EDA platform automates data management for enterprises of any size or data ecosystem.
  • 44
    Azure Government
    Accelerate your mission with a continuum of compute across data classifications from intelligent cloud to intelligent edge. Be future ready with the broadest range of commercial innovation for government. Azure delivers advanced compute and analytics capabilities from cloud to edge to help you gain insights, move faster, and do more for the mission. You can choose from the 60+ regions around the world or select Azure Government, the mission-critical cloud built to exceed requirements for classified and unclassified US Government data. Do more at the tactical edge, whether that's pre-processing data for low latency response times, bringing AI and machine learning to the far edge, or harnessing satellite data more rapidly to enable decision making in disconnected environments. Unlock insights, increase agility, and further your mission with Azure capabilities for classified data.
  • 45
    MindLink

    MindLink

    MindLink

    MindLink provides secure Persistent Chat rooms as an always-on collaboration backbone for mission-critical operations. MindLink safeguards highly classified information through next-generation end-to-end encryption, military-grade access control and data classification. MindLink is designed for key mission scenarios including incident management, real time ops, shift-based teamwork and inter-organizational collaboration. A solution designed specifically to deliver capabilities for today’s challenging mission environment. A unique data classification system that allows all chat and message content to be labelled appropriately. A sophisticated security architecture that separates data into secret “communities of interest”. An innovative mechanism to encrypt chat data and manage the sharing of encryption keys with users.
  • 46
    NVISIONx

    NVISIONx

    NVISIONx

    NVISIONx data risk Intelligence platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes, and storage costs. Data is growing out of control and getting worse every day. Business and security leaders are overwhelmed and can’t protect what they don’t know. More controls won’t fix the problem. Rich and unlimited analysis to support over 150 business use cases to empower data owners and cyber professionals to proactively manage their data from cradle to grave. First, categorize or group data that is redundant, outdated, or trivial (ROT) and see what data can be defensibly disposed of to reduce the classification scope (and storage costs). Then, contextually classify all remaining data using a number of easy-to-use data analytics techniques to enable the data owner to be their own data analyst! Data identified as useless and unwanted can then go through legal and records retention reviews.
  • 47
    MineOS
    💯 The #1-rated Data Privacy & Security platform on G2, custom-built with a people-centric approach to please and empower privacy and compliance professionals. We're so confident you'll love our platform, too, that our PoCs are completely free. Thanks to the fastest implementation time and the highest ROI on the market, companies can strengthen their privacy programs to handle DSARs, RoPA reports, and other privacy tasks faster and get true oversight over user data within days. We’re innovating the sphere so anyone within an organization can use and understand the value of data privacy through: Email Navigator Technology, Continuous Data Classification & Smart Sampling, Mine Radar, Data Mapping, Automated DSR/DSAR, Automated ROPA, DPIA and PIA reports, AI Suggestions, Consent Management, Vendor Risk Assessment. With MineOS, you’re not just investing in data governance, you’re creating a two-way street with your customers to show you respect their digital rights. MineOS.ai
  • 48
    Fixed Assets Register
    The Activa Fixed Assets Register is a high quality, functionally rich, life-cycle, fixed assets software application. It comes as a stand-alone application or as the system core of the Activa Business software solutions. It is presented here as a `best of breed`. Data classification is the key to flexible reporting. The data structure in Activa is a means to develop an information architecture that filters and indexes the content in a simple and highly visible way. This structure is constructed from simple building blocks into a multi-level hierarchy presented in a common tree form data model. It is used extensively throughout the application. The tree structure hierarchy can be configured with from 3, up to 10 levels. There are very few specific rules for this process and it is the sheer degree of flexibility of the structure tools that can produce designs to best suit your reporting needs.
  • 49
    Salt

    Salt

    Salt Security

    The Salt Security API Security Platform protects APIs across their full lifecycle – build, deploy and runtime phases. Only Salt can capture and baseline all API traffic -- all calls and responses -- over days, weeks, even months. Salt uses this rich context to detect the reconnaissance activity of bad actors and block them before they can reach their objective. The Salt API Context Engine (ACE) architecture discovers all APIs, pinpoints and stops API attackers, and provides remediation insights learned during runtime to harden APIs. Only Salt applies cloud-scale big data to address API security challenges. Salt applies its AI and ML algorithms, which have been in the market for more than four years, to provide real-time analysis and correlation across billions of API calls. That level of context is essential for rich discovery, accurate data classification, and the ability to identify and stop “low and slow” API attacks, which occur over time. On prem solutions simply lack the data.
  • 50
    Sentra

    Sentra

    Sentra

    Strengthen your cloud data security posture without slowing down your business. Sentra’s agentless solution is able to discover and scan cloud data stores to find sensitive data without any impact on performance. Sentra's data-centric approach is focused on securing your company's most valuable data. Automatically detect all managed and unmanaged cloud-native data stores. Sentra uses both existing and custom data recognition tools to identify sensitive cloud data. By leveraging data scanning technologies that are based on smart metadata clustering and data sampling, users can reduce cloud costs by three orders of magnitude compared to existing solutions. Sentra’s API-first and extensible classification easily integrates with your existing data catalogs and security tools. Assess the risk to your data stores by looking both at compliance requirements and your security posture. Sentra also integrates with your existing security tools, so you always have the full context.