Alternatives to IBM Storage Protect Plus

Compare IBM Storage Protect Plus alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to IBM Storage Protect Plus in 2024. Compare features, ratings, user reviews, pricing, and more from IBM Storage Protect Plus competitors and alternatives in order to make an informed decision for your business.

  • 1
    SpinOne

    SpinOne

    Spin.AI

    SpinOne is an all-in-one, SaaS security platform that protects SaaS data for mission-critical SaaS applications, including Google Workplace, Microsoft 365, Salesforce and Slack, by delivering full visibility and fast incident response. It eliminates fundamental security and management challenges associated with protecting SaaS data by reducing the risk of data leak and data loss, saving time for SecOps teams through automation, reducing downtime and recovery costs from ransomware attacks, and improving compliance. SpinOne solutions include: -SaaS Backup & Recovery -SaaS Ransomware Detection & Response -SaaS Data Leak Prevention & Data Loss Protection -SaaS Security Posture Management SpinOne also integrates with popular business apps – Jira, ServiceNow, DataDog, Splunk, Slack, and Teams – to help you save time and reduce manual workloads. Exciting News: Spin.AI recognized as a Strong Performer in The Forrester Wave™: SaaS Security Posture Management, Q4 2023 Report.
  • 2
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
  • 3
    Rubrik

    Rubrik

    Rubrik

    A logical air gap prevents attackers from discovering your backups while our append-only file system ensures backup data can't be encrypted. You can keep unauthorized users out with globally-enforced multi-factor authentication. From backup frequency and retention to replication and archival, replace hundreds or thousands of backup jobs with just a few policies. Apply the same policies to all your workloads across on-premises and cloud. Archive your data to your public cloud provider’s blob storage service. Quickly access archived data with real-time predictive search. Search across your entire environment, down to the file level, and select the right point in time to recover. Reduce recovery time from days and weeks to hours or less. Rubrik and Microsoft have joined forces to help you build a cyber-resilient business. Reduce the risk of backup data breach, loss, or theft by storing immutable copies of your data in a Rubrik-hosted cloud environment, isolated from your core workloads.
  • 4
    mProtect Platinum

    mProtect Platinum

    Meridian Group International

    mProtect Platinum is an enterprise-grade data protection solution that offers comprehensive features and premium support. It is designed to help you protect your data from all types of threats and ensure that your business can recover from any disaster. mProtect Platinum protects all of your critical assets, including physical and virtual servers, databases, applications, and endpoints. You can choose to back up your data on-premises, in the cloud, or both. Meridian's team of experts will proactively monitor your data protection environment for potential problems and take steps to resolve them before they cause any disruption to your business. mProtect Platinum allows you to schedule automatic backups for your data, which can save you time and effort. You can also schedule incremental backups to reduce the amount of data that needs to be backed up each time.
  • 5
    IBM Storage Protect
    IBM Storage Protect is a data backup and recovery software. Storage Protect is part of the software defined storage products in the IBM Storage portfolio. For backup and recovery of SaaS applications, see Storage Protect for Cloud. IBM Storage Protect (formerly IBM Spectrum Protect) provides comprehensive data resilience for physical file servers, virtual environments and a wide range of applications. Organizations can scale up to manage billions of objects per backup server. Clients can reduce backup infrastructure costs with built-in data efficiency capabilities and the ability to migrate or copy data to tape, public cloud services, and on-premises object storage. IBM Storage Protect can also store IBM Storage Protect Plus data, allowing companies to take advantage of their existing investment for long-term data retention and disaster recovery.
  • 6
    DobiProtect

    DobiProtect

    Datadobi

    DobiProtect® enables companies to safeguard their business-critical NAS and object data - on-premises or in the cloud - against cyberthreats, ransomware, accidental deletions, and software vulnerabilities. Support you can rely on when you need it most. Be assured by verifiable proof of 100% accurate data integrity. Supports all major storage platforms and cloud providers. Granular restore or complete failover to any cloud or storage. Set up quickly and manage easily with an intuitive interface. Protect as little or as much as needed on a flexible software-only license model. Every file on your source system is protected through an identical copy on your target system. DobiProtect will validate this copy to make sure that the content is exactly the same. When a file changes on the source, it is re-protected to the target.
  • 7
    JetStream DR

    JetStream DR

    JetStream Software

    JetStream DR reduces the complexity of continuously protecting all data center applications while minimizing downtime, lowering operating costs and enabling a shift from CapEx to OpEx through an on-demand subscription model. JetStream DR implements Continuous Data Protection (CDP) by constantly replicating data directly into cost-effective Azure Blob Storage and Azure NetApp Files (ANF) to scale independently from compute resources and not compromise performance. Real-time, hypervisor-based replication for continuous data protection. JetStream DR doesn’t require snapshots, so in addition to providing near-zero RPO and instant RTO, application performance stays high. Data transfer is resilient to network interruptions, ensuring that VM protection can continue despite interference or outages in the network connection to the recovery site.
  • 8
    Baffle

    Baffle

    Baffle

    Baffle provides universal data protection from any source to any destination to control who can see what data. Enterprises continue to battle cybersecurity threats such as ransomware, as well as breaches and losses of their data assets in public and private clouds. New data management restrictions and considerations on how it must be protected have changed how data is stored, retrieved, and analyzed. Baffle’s aim is to render data breaches and data losses irrelevant by assuming that breaches will happen. We provide a last line of defense by ensuring that unprotected data is never available to an attacker. Our data protection solutions protect data as soon as it is produced and keep it protected even while it is being processed. Baffle's transparent data security mesh for both on-premises and cloud data offers several data protection modes. Protect data on-the-fly as it moves from a source data store to a cloud database or object storage, ensuring safe consumption of sensitive data.
  • 9
    StealthAUDIT
    StealthAUDIT automates the collection and analysis of the data you need to answer the most difficult questions you face in the management and security of dozens of critical IT assets, including data, directories, and systems. All organizations, regardless of size, require tools to help them manage and secure the various technology resources that power their businesses. However, no organization has the ability to afford, efficiently operate, or maintain separate point products for every technology they leverage. What they need are solutions that are flexible enough to bend to their unique requirements, while also providing the extensibility to deliver a common set of capabilities across multiple platforms within their IT ecosystem. StealthAUDIT contains over 40 built-in data collection modules covering both on-premises and cloud-based platforms from Operating Systems to Office 365.
    Starting Price: $10.00/one-time/user
  • 10
    InfiniGuard

    InfiniGuard

    Infinidat

    Today, ransomware, malware, and cyberattacks put your data at significant risk. Infinidat’s modern data protection and cyber resilience solution, InfiniGuard®, plays an essential role in your overall cyber security strategy. InfiniGuard offers unmatched backup and lightning-fast recovery performance, at scale, for all of your data protection needs and is enhanced by our InfiniSafe cyber recovery technologies to ensure you are always ready in the event of a cyberattack, natural disaster, or basic human error. InfiniGuard is built on the award-winning, InfiniBox®, an enterprise-proven storage platform that delivers unmatched performance, availability, and a simple, set-it-and-forget-it management experience and offers unprecedented guarantees.
  • 11
    Dell EMC PowerProtect Data Manager
    Protect data and deliver governance control for modern cloud workloads across your evolving physical, virtual and cloud environments. Address ever-changing growth and IT complexity by leveraging Dell EMC’s software defined data protection platform. PowerProtect Data Manager delivers next generation data protection that enables faster IT transformation, while giving you the assurance that you can easily safeguard and quickly unlock your data’s value. Dell EMC PowerProtect Data Manager provides software defined data protection, automated discovery, deduplication, operational agility, self-service and IT governance for physical, virtual and cloud environments. PowerProtect Data Manager offers efficient data protection capabilities leveraging the latest evolution of Dell EMC trusted protection storage architecture.
  • 12
    BridgeHead

    BridgeHead

    BridgeHead

    Helping healthcare organizations to consolidate vital patient, clinical and administrative data, safeguard that information, and make it easily accessible to staff as part of a 360-degree view. Eliminate your data silos by aggregating patient and administrative information from across the healthcare enterprise. Optimize the storage of your healthcare data by utilizing all of your storage assets and reducing the total cost of ownership. Safeguard your healthcare data and ensure efficient recovery in the event of cyber attack, loss, corruption or disaster. Enhance care and improve outcomes by providing your staff with easy access to a 360-degree view of a patient’s history. Retire obsolete or legacy applications while retaining access to the data they contain- saving time, money and resources. Digitally transform your end-to-end clinical testing processes & accelerate testing operations, at scale.
  • 13
    Cloudian

    Cloudian

    Cloudian

    Solve your capacity and cost challenges with Cloudian® S3-compatible object and file storage. Exabyte-scalable and cloud-compatible, Cloudian software-defined storage and appliances make it easy for enterprises and service providers to deliver storage at one site, or across multiple sites with a modular architecture that’s easy to manage and grow. Gain actionable insight. Cloudian HyperIQ™ provides real-time infrastructure monitoring and user behavior analytics. Track user data access to verify compliance and monitor service levels. Spot infrastructure issues before they become problems with configurable, real-time alerts. Customize HyperIQ to your environment over 100 available data panels. Protect your data from ransomware with Cloudian Object Lock, a hardened solution for data immutability. HyperStore® is hardened by the use of HyperStore Shell (HSH) and RootDisable, securing the solution at the system level, even disabling root access to make the solution impregnable.
    Starting Price: Pricing as low as 1/2 ¢ per gi
  • 14
    Concentric

    Concentric

    Concentric AI

    Take control of your data with zero-trust access governance. Locate, risk assess, and protect business-critical content. Protect private and regulated data. Meet regulatory mandates for financial information, privacy and right-to-be-forgotten. Concentric provides agentless connectivity to a wide variety of data repositories so you can govern access to your data wherever it resides. We process both structured and unstructured data in the cloud or on-premises. We also integrate with popular data classification frameworks, like Microsoft Information Protection, so you can enjoy better coverage and more accurate classification results throughout your security stack. If you don’t see what you need on our list, let us know. Our professional services team will make quick work of getting your data connected.
  • 15
    Metallic

    Metallic

    Commvault

    Protect, secure, recover. From the minds of Commvault—ten times a leader in the Gartner Magic Quadrant—Metallic is a SaaS portfolio for enterprise-grade backup and recovery, designed to protect your data from corruption, deletion, ransomware, and any other threat out there. Stay two steps ahead with Metallic data management as a service. Metallic provides ultimate scale and proven security, so you can be free to focus on growing your business, not worrying about your data. Metallic is simple to adopt, simple to use, and simple to scale. No matter where your data lives — on-premise, cloud, hybrid, or SaaS — Metallic combines unmatched flexibility with proven security and industry-leading Commvault technology.
  • 16
    Google VPC Service Controls
    VPC Service Controls. Managed networking functionality for your Google Cloud resources. New customers get $300 in free credits to spend on Google Cloud during the first 90 days. All customers get free usage (up to monthly limits) of select products, including BigQuery and Compute Engine. Mitigate exfiltration risks by isolating multi-tenant services. Ensure sensitive data can only be accessed from authorized networks. Restrict resource access to allowed IP addresses, identities, and trusted client devices. Control which Google Cloud services are accessible from a VPC network. Enforce a security perimeter with VPC Service Controls to isolate resources of multi-tenant Google Cloud services—reducing the risk of data exfiltration or data breach. Configure private communication between cloud resources from VPC networks spanning cloud and on-premises hybrid deployments. Take advantage of fully managed tools like Cloud Storage, Bigtable, and BigQuery.
  • 17
    Polar Security

    Polar Security

    Polar Security

    Automate data discovery, protection & governance in your cloud workload and SaaS applications. Automatically pinpoint all your exposed sensitive data in cloud workloads and SaaS applications, allowing you to shrink the data attack surface. Identify and classify sensitive data such as PII, PHI, PCI, and custom company IP to prevent sensitive data exposure. Get actionable insights on how to protect your cloud data and ensure compliance, in real-time. Enforce data access policies to achieve least privileged access, maintain a strong security posture, and remain resilient to cyber-threats.
  • 18
    Theom

    Theom

    Theom

    Theom is a cloud data security product that discovers and protects all data in cloud stores, APIs, and message queues. Like a bodyguard who closely follows and protects a high-value asset, Theom ensures controls follow the data regardless of how it is stored or accessed. Theom identifies PII, PHI, financial information, and trade secrets using agentless scanning and NLP classifiers, which support custom taxonomies. Theom discovers dark data, data that are never accessed, and shadow data, data whose security posture is different from the primary copy. Theom pinpoints confidential data, e.g., developer keys, in APIs and message queues. Theom estimates the financial value of data to help prioritize risks. Theom maps the relationships between data, access identities, and security attributes to uncover the risks to data. Theom shows how high-value data is accessed by identities (users and roles). Security attributes including user location, atypical access patterns, etc.
  • 19
    Imperva Data Security Fabric
    Protect data at scale with an enterprise-class, multicloud, hybrid security solution for all data types. Extend data security across multicloud, hybrid, and on-premises environments. Discover and classify structured, semi-structured, & unstructured. Prioritize data risk for both incident context and additional data capabilities. Centralize data management via a single data service or dashboard. Protect against data exposure and avoid breaches. Simplify data-centric security, compliance, and governance. Unify the view and gain insights to at-risk data and users. Supervise Zero Trust posture and policy enforcement. Save time and money with automation and workflows. Support for hundreds of file shares and data repositories including public, private, datacenter and third-party cloud services. Cover both your immediate needs & future integrations as you transform and extend use cases in the cloud.
  • 20
    Voltage SecureData
    Secure sensitive data wherever it flows—on premises, in the cloud, and in big data analytic platforms. Voltage encryption delivers data privacy protection, neutralizes data breach, and drives business value through secure data use. Data protection builds customer trust and enables compliance to global regulations, including GDPR, CCPA, and HIPAA. Privacy regulations recommend encryption, pseudonymization, and anonymization to protect personal data. Voltage SecureData enables enterprises to de-identify sensitive structured data and support the use of data in its protect state to safely drive business value. Ensure that applications operate on secure data flowing through the enterprise with no gaps, no decryption, and no performance overhead. SecureData supports the broadest range of platforms and encrypts data in any language. Structured Data Manager integrates SecureData so that businesses can easily and continuously protect data throughout the lifecycle, from discovery to encryption.
  • 21
    IRI DMaaS

    IRI DMaaS

    IRI, The CoSort Company

    Data may be the most important asset, and risk, that your company holds. It describes customers, products, transaction histories, and everything else that you use and plan in business. This data can be in databases, files, spreadsheets, Hadoop, cloud platforms or apps. If you don't have the time or expertise to find and de-identify the personally identifiable information (PII) in those sources yourself, IRI Data Masking as a Service (DMaaS) can help. With IRI DMaaS, you can minimize risk and cost because you only pay for the data you need protected. IRI can do all, or some, of the work to classify, find, and mask that data. IRI can also provide your auditors with the logs and targets that verify that your sensitive data was protected and now complies with privacy laws. To facilitate the service, you can transfer unprotected data to a secure on-premise or cloud-based staging area, or provide remote, supervised access to IRI to the data sources(s) at issue under a strict NDA.
    Starting Price: $1000 per day
  • 22
    Titus Illuminate
    Data is growing, it’s estimated that over 25 petabytes of data are created each day in 2019 and almost all of it gets saved somewhere. Far too much of this data is saved – on file shares, network drives, and cloud services – “just in case,” and upwards of 70 percent of this data holds no business value. Data that is redundant, obsolete, or trivial (ROT) can lead to legal risks or compliance violations. It’s been said that data is a company’s greatest asset, but it can also represent its greatest risk. What’s required is a data at rest strategy to separate the assets from the liabilities while helping organizations define what and where their data is, who has access to it, and how to protect it. Illuminate scans locations where you store data, including on-premise shares, Box, Dropbox, OneDrive, and Microsoft SharePoint and SharePoint Online.
  • 23
    AWS Storage Gateway
    AWS Storage Gateway is a hybrid cloud storage service that gives you on-premises access to virtually unlimited cloud storage. Customers use Storage Gateway to simplify storage management and reduce costs for key hybrid cloud storage use cases. These include moving tape backups to the cloud, reducing on-premises storage with cloud-backed file shares, providing low latency access to data in AWS for on-premises applications, as well as various migration, archiving, processing, and disaster recovery use cases. To support these use cases, the service provides three different types of gateways – Tape Gateway, File Gateway, and Volume Gateway – that seamlessly connect on-premises applications to cloud storage, caching data locally for low-latency access. Your applications connect to the service through a virtual machine or hardware gateway appliance using standard storage protocols, such as NFS, SMB, and iSCSI.
  • 24
    Sotero

    Sotero

    Sotero

    Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment. The Sotero data security platform employs an intelligent data security fabric that ensures your sensitive data is never left unprotected. Sotero automatically secures all your data instances and applications, regardless of source, location or lifecycle stage (at rest, in transit, or in use). With Sotero, you can move from a fragmented, complex data security stack to one unified data security fabric that provides 360° management of your entire data security ecosystem. You’re no longer forced to go to point solutions to know who is accessing your data. You get governance, auditability, visibility, and 100% control via a single pane. The Sotero platform protects any data asset wherever it resides – whether the data is a relational database, unstructured, semi-structured, structured, on-premise or in the cloud.
  • 25
    Salesforce Shield
    Natively encrypt your most sensitive data at rest across all of your Salesforce apps with platform encryption. Ensure data confidentiality with AES 256-bit encryption. Bring your own encryption keys and manage your key lifecycle. Protect sensitive data from all Salesforce users including admins. Meet regulatory compliance mandates. See who is accessing critical business data, when, and from where with event monitoring. Monitor critical events in real-time or use log files. Prevent data loss with transaction security policies. Detect insider threats and report anomalies. Audit user behavior and measure custom application performance. Create a forensic data-level audit trail with up to 10 years of history, and set triggers for when data is deleted. Expand tracking capabilities for standard and custom objects. Obtain extended data retention capabilities for audit, analysis, or machine learning. Meet compliance requirements with automated archiving.
    Starting Price: $25 per month
  • 26
    SearchInform FileAuditor
    SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for automated audit of information storages, search for access violations and tracking changes made to critical data. The system protects confidential documents from careless and deliberate malicious actions of employees and puts things in order in file storages. The system performs: •Classification of vulnerable data Finds files in a document flow that contain critical information, and adds a special mark to each file, indicating the type of info it contains: personal data, trade secret, credit card numbers, etc. •Access rights audit Controls access rights to information (full access, editing, reading, writing, reading and changing, etc.). Finds confidential files stored in violation of established security rules . •Monitoring and blocking user actions Audits user operations with the file system. •Critical documents archiving Makes shadow copies of critical files.
  • 27
    Catalogic DPX

    Catalogic DPX

    Catalogic Software

    Reliable, rapid, and low-cost backup and recovery. Protect and recover your data from human errors, disasters, and ransomware attacks. Fast recovery-in-place from disk, tape and cloud. Agentless backup for virtual environments enhancements including single file recovery to restore specific files or directories from VMware and Microsoft Hyper-V agentless backups. Enhancements to vStor, our software-defined backup appliance, including appliance configuration via the HTML5 interface, replication management, and S3 Object Lock for protecting cloud backups against early deletion and ransomware. More cloud storage backup and archive targets including Backblaze B2 Cloud Storage with S3 Object Lock, and Amazon S3 Glacier and Glacier Deep Archive support.
  • 28
    Commvault Intelligent Data Services
    An integrated family of solutions for actionable insights, combining Commvault Data Governance, Commvault File Storage Optimization, and Commvault eDiscovery & Compliance. We’re creating more data than ever before — we should know all about it. Drive proactive and automated actions to respond faster, prevent data theft or breach, eliminate data sprawl, and make data-driven decisions for your org. Increase storage efficiency, enable faster responses to compliance requests, and reduce your data risks with analytics, reporting, and search across production and backup data sources. Advanced “4D” technology delivering a centralized and dynamic multi-dimensional index of metadata, content, classifications, and AI applied insights. Gain visibility into production and backup data with a single unified index across on-premises, remote, cloud, and backup data sources. Customizable dashboards enable you to search, filter, and drill down to the relevant details.
  • 29
    Asigra

    Asigra

    Asigra

    Asigra helps IT teams increase their data recovery confidence through our unsurpassed reliability, security, manageability, and affordability in data protection software. Asigra's Enterprise Backup and Disaster Recovery (BDR) software platform was designed for Managed Service Providers (MSPs) to host and operate their own Backup as a Service solution. The easy to manage platform offers users the ability to white-label it to match your brand, while its breakthrough Hybrid Cloud Backup architecture combines a Cloud optimized scale-out architecture, a Cloud backup and recovery software platform, and a Cloud API and management system to help IT Teams seamlessly and efficiently manage, scale and deliver data protection services.
  • 30
    IBM Security Guardium
    Wide visibility, compliance and protection throughout the data security lifecycle. IBM Security® Guardium® is a family of data security software in the IBM Security portfolio that protects sensitive on-premises and cloud data. Guardium is a modern, scalable data security platform that is ready to meet the demands of today’s progressing environments. It protects sensitive and regulated data across multiple cloud environments while managing compliance obligations, discovering where sensitive data lives, encrypting and monitoring what’s important and reducing your risk while responding to threats.
  • 31
    Security Auditor

    Security Auditor

    Core Security (Fortra)

    Simplified security policy management and file integrity monitoring software. Security Auditor centralizes security administration across your cloud, on premise, or hybrid environment. Our agentless technology allows you to quickly enforce security policy adherence and mitigate the risks of security misconfiguration, a leading cause of data breaches. Security Auditor automatically protects new systems as they come online and continuously monitors those systems, identifying any configuration settings that don’t match your requirements. You'll be notified of any policy exceptions and can make changes yourself from an easy-to-use, web-based console, which simplifies tasks and compliance reporting requirements. Or if you prefer more automation, you can run the FixIt function and let Security Auditor do the work for you. Security Auditor simplifies the identification and security configuration for your elastic cloud infrastructure.
  • 32
    Mamori Server

    Mamori Server

    Mamori.io

    Mamori Server is an all-in-one data security solution that integrates ZTNA, 2FA, DAM, PAM, SQL Firewall and data privacy solutions. It uses Zero Trust security to protect business data, which prevents cyber attacks and data theft, helps meet compliance and cyber insurance requirements, and simplify DevOps & access to resources. Mamori Server is extremely simple to deploy. No agents required. No changes to servers, directories, or databases required. Mamori Server can be deployed in the cloud or on-premise, and can be self-hosted or as a managed cloud service. For businesses with under 20 staff, Mamori Server can be used for free.
  • 33
    Normalyze

    Normalyze

    Normalyze

    Our agentless data discovery and scanning platform is easy to connect to any cloud account (AWS, Azure and GCP). There is nothing for you to deploy or manage. We support all native cloud data stores, structured or unstructured, across all three clouds. Normalyze scans both structured and unstructured data within your cloud accounts and only collects metadata to add to the Normalyze graph. No sensitive data is collected at any point during scanning. Display a graph of access and trust relationships that includes deep context with fine-grained process names, data store fingerprints, IAM roles and policies in real-time. Quickly locate all data stores containing sensitive data, find all-access paths, and score potential breach paths based on sensitivity, volume, and permissions to show all breaches waiting to happen. Categorize and identify sensitive data-based industry profiles such as PCI, HIPAA, GDPR, etc.
    Starting Price: $14,995 per year
  • 34
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 35
    IBM DataPower Gateway
    IBM® DataPower® Gateway helps you meet the security and integration needs of your digital business in a single multichannel gateway. It provides high security, control, integration and optimized access to a full range of mobile, web, app programming interface (API), service-oriented architecture (SOA), B2B and cloud workloads. DataPower Gateway offers content introspection at wire speeds, service request and response monitoring to support a centralized management and control platform. DataPower appliances deliver a robust XML firewall for the enterprise, using sophisticated checks. The DataPower appliance enables the classification of data requests based on service and application-level information. Enterprise-grade security with the highest level of security assurance certification for critical enterprise apps.
  • 36
    SecureCircle

    SecureCircle

    SecureCircle

    SecureCircle's Zero Trust data protection eliminates data breaches and insider threats by protecting all data outside of SaaS applications. SecureCircle's Data Access Security Broker (DASB) protects and monitors data, including data egressing from enterprise cloud services and managed repositories to enforce access controls on data regardless of location, including cloud and endpoint devices. SecureCircle protects data transparently and persistently at scale delivering the world's only Zero Trust data protection. Most modern SaaS applications allow end users to pull data out of the browser onto the device. More often than not, end users leverage these features for productive reasons. The challenge most businesses face with modern SaaS applications is identifying the difference between productive activity and a security threat. With SecureCircle, all data is kept secure as it comes out of SaaS applications, which allows users to leverage data that comes out of these applications.
  • 37
    ShardSecure

    ShardSecure

    ShardSecure

    We desensitize sensitive data in multi-cloud, hybrid-cloud, and private cloud environments while reducing management complexity and improving business continuity. Securely adopt the cloud without losing control of your data knowing your data is unintelligible and of no value to unauthorized users – anywhere it is stored. Backups are popular targets for attackers and ransomware. Improve your backup data resiliency and protect against attacks. We preserve the integrity of your microsharded data and roll back attempts at file tampering, including files encrypted by malware while your operations continue unaffected. Confidently address data privacy and security requirements to enable your data analysis projects. Secure your source code and other intellectual property from data breaches and supply chain attacks.
  • 38
    Trellix Complete Data Protection
    Comprehensive endpoint encryption. Available in two suites, Trellix Complete Data Protection keeps data safe with enterprise-grade drive encryption, access control, and user behavior monitoring. Manage Apple FileVault on macOS and Microsoft BitLocker on Windows PCs via Trellix ePolicy Orchestrator. Secure network file shares and protect removable media such as USB flash drives and data in cloud storage services. Trellix Complete Data Protection—Advanced features data loss prevention, full-disk encryption, device control, and protection for cloud storage. Render data unreadable in the event of device loss or theft. Our enterprise-grade endpoint encryption solution is FIPS 140-2 and Common Criteria EAL2+ certified. Control the specific file types and folders to encrypt or block. Encrypt files to cloud storage services such as Box, Dropbox, Google Drive, and Microsoft OneDrive.
  • 39
    Huawei Data Security Center
    Data Security Center (DSC) helps you effortlessly identify, mask, and protect sensitive data in structured and unstructured datasets. DSC displays high, medium, and low risks in data collection, transmission, storage, exchange, usage and deletion. You can efficiently locate the risks and take immediate actions to ensure data security. DSC precisely and efficiently identifies sensitive data sources based on the expert expertise and Natural Language Processing (NLP). DSC provides one-stop protection for both structured and unstructured data from a wide range of sources, such as Object Storage Service, databases, and big data sources. DSC leverages preset and user-defined masking algorithms to limit exposure of sensitive data, preventing unauthorized access to sensitive data. DSC provides sensitive data discovery, classification, and protection during all phases of data lifecycle management.
  • 40
    Commvault Complete Data Protection
    A unified solution combining Commvault Backup & Recovery with Commvault Disaster Recovery to deliver enterprise-grade data protection that is powerful and easy to use. Ensure data availability and business continuity across your on-prem and cloud environments using a single extensible platform. Comprehensive workload coverage (files, apps, databases, virtual, containers, cloud) from a single extensible platform and user interface. Rapid, granular recovery of data and applications. Easily back up, recover, and move data and workloads to/from/within/between clouds. Fast VM, application, and storage snapshot replication with flexible RPO/RTO. Reduce costs with minimal infrastructure requirements in the cloud or on-premises
  • 41
    Smartcrypt
    Companies that use PKWARE’s Smartcrypt to protect data within the organization can also use Smartcrypt to share encrypted files with individuals and groups outside the company. The free Smartcrypt Reader is available for download by anyone, and can be used to decrypt and open files that have been secured using Smartcrypt. Smartcrypt Reader is available for Windows and Mac platforms. Unlike other approaches that require senders to share encryption passphrases with recipients or deal with complex PKI workflows, the Smartcrypt Reader can automatically retrieve encryption keys for authorized users—even external users—eliminating one of the biggest security challenges in external data exchange. When a Smartcrypt user needs to share sensitive data with someone outside the company, the Smartcrypt user creates (or selects) a Smartkey that is associated with the recipient’s email address. Files can then be encrypted using that Smartkey and shared via email, cloud storage, or any other medium.
  • 42
    FileAudit

    FileAudit

    IS Decisions

    Proactively track, audit, report, alert on and respond to, all access to files and folders on Windows Servers and in the cloud. Monitor, in real time, access to sensitive files stored on both Windows Servers and in the cloud. Powerful filtering helps you find the answers you need quickly; tracking IP address and machine name pinpoints the exact access. Set up email alerts and a triggered response for access events (access denied - file deletion - a specific user, machine or IP address - time of access) and mass access events such as the copy, deletion or movement of bulk files. Review a searchable, secure and always-available audit trail. Analyze the access to and usage of files stored both on-premises and in the cloud. Schedule centralized reports according to multiple criteria.
    Starting Price: $826 one-time payment
  • 43
    iland Secure Cloud Object Storage
    iland has redefined what customers can expect from object storage. Managed through the Secure Cloud Console, iland Secure Cloud Object Storage provides a cost-effective solution for the long-term storage and protection of older backups, “cold” application data, or tape replacement. iland Secure Cloud Object Storage offers industry-specific security and compliance, all-inclusive, pay for what you consume pricing, and our recognized iland experts and customer support every step along the way. In addition, iland Object Storage is fully-integrated into your other iland services, such as disaster recovery and backup, giving you the ability to manage all your services from a single, unified platform. With immediate search and restore functionality – remove the need for legacy tape based solutions.
  • 44
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 45
    Rewind Backups
    Rewind is the leading provider of cloud backups for SaaS applications that helps businesses back up and restore their cloud data. Rewind provides solutions that are pivotal to the growth and utility of the cloud that supports the backbone of the way millions of businesses work and store their data. Rewind has been supporting over 100,000 businesses worldwide with automated backups, on-demand data recovery and exceptional customer support since 2017 from their head office in Ottawa, Canada. As of March 2022, Rewind Backups are available for Shopify, GitHub, Trello, Microsoft 365, BigCommerce, and QuickBooks Online–with a dozen other platforms currently in beta.
  • 46
    Netwrix Data Security Platform
    Enterprise security can no longer rely on point IT security solutions. Organizations are focusing on their most critical assets — customer and enterprise data. Netwrix helps you implement a data-centric approach to security. It identifies sensitive content in unstructured and structured, on-premises or cloud data, and enables you to reduce risks and detect suspicious user behavior in time to stop a breach. Classify and tag both unstructured and structured data regardless of its location so you can prioritize the security of sensitive information. Apply security policies consistently across multiple data repositories. See which pieces of sensitive data are most at risk so you can prioritize remediation of those risks. Netwrix helps you identify sensitive information that is exposed to a large number of users without a business need or that is stored in an unsecure location. Establish strict accountability over the use of privileged accounts.
  • 47
    Own Data

    Own Data

    Own Data

    The Own Data platform makes owning your SaaS data simple. It empowers you to ensure the availability, compliance, and security of mission-critical data and unlocks new ways to use that data to transform your business. SaaS applications make data safer, more secure, and more accessible. However, they have not made it more valuable for you. Your business is more complicated than ever and it turns out managing and getting insights from your data is anything but simple. You are beholden to what your SaaS provider allows you to do with your own data. Understand data exposure risks and proactively strengthen your Salesforce security posture. Protect your data with automated backups, proactive notifications of loss or corruption, and easy-to-use recovery tools. Quickly seed quality data into any sandbox or sub-prod environment for development, training, or testing purposes. Archive obsolete data from production environments to prevent overage costs, improve performance, and ensure compliance.
    Starting Price: $2.90 per month
  • 48
    Netwrix Data Classification
    Does your organization’s ever-growing data give you a headache? Netwrix Data Classification solves your data-related challenges, such as mitigating the risk of data breaches, realizing the full value of your content, increasing employee productivity and passing compliance audits with less effort. Find sensitive content, such as financial data, medical records and other PII, both on premises and in the cloud. Automatically quarantine critical or sensitive data stored in unsecure locations or accessible by large groups of users to minimize its exposure until you can make a thoughtful remediation decision. Gain a better understanding of data patterns specific to your organization. With compound term processing and statistical analysis, you’ll get more relevant results than by relying on keywords and semantic analysis. Kick off your discovery in minutes with out-of-the-box rules that identify data protected by GDPR, PCI DSS, HIPAA and other regulations.
  • 49
    IBM Security Guardium Insights
    Many cloud data sources come with security controls that only monitor that individual source. This fragments visibility, putting data privacy, security, and compliance at risk. With Guardium Insights, adapt and scale as multicloud environments change and grow by centralizing data security, reducing time to compliance, and understanding risky user behaviors across data sources to support a zero trust approach. Built on containerized architecture, Guardium Insights is a lightweight-but-powerful platform that can flexibly deploy wherever an organization needs - aligning to data security goals without hindering business objectives in the cloud. Automated compliance audit and reporting processes can help reduce hours spent preparing for and performing an audit by 75%. 34% of organizations use two cloud sources. 11% use more than three. Guardium Insights, deployed in Kubernetes containers, can scale and adapt to match that growth.
  • 50
    Defendify

    Defendify

    Defendify

    Founded in 2017, Defendify is pioneering All-In-One Cybersecurity® for organizations with growing security needs, backed by experts offering ongoing guidance and support. Delivering multiple layers of protection, Defendify provides an easy-to-use platform designed to strengthen cybersecurity across people, process, and technology, continuously. Defendify streamlines cybersecurity assessments, testing, policies, training, detection, response, and containment in one consolidated and cost-effective cybersecurity solution. 3 layers, 13 solutions, 1 platform, including: • Managed Detection & Response • Cyber Incident Response Plan • Cybersecurity Threat Alerts • Phishing Simulations • Cybersecurity Awareness Training • Cybersecurity Awareness Videos • Cybersecurity Awareness Posters & Graphics • Technology Acceptable Use Policy • Cybersecurity Risk Assessments • Penetration Testing • Vulnerability Scanning • Compromised Password Scanning • Website Security Scanning