Alternatives to Lepide Data Security Platform

Compare Lepide Data Security Platform alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Lepide Data Security Platform in 2024. Compare features, ratings, user reviews, pricing, and more from Lepide Data Security Platform competitors and alternatives in order to make an informed decision for your business.

  • 1
    Satori

    Satori

    Satori

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.
    Compare vs. Lepide Data Security Platform View Software
    Visit Website
  • 2
    DATPROF

    DATPROF

    DATPROF

    Test Data Management solutions like data masking, synthetic data generation, data subsetting, data discovery, database virtualization, data automation are our core business. We see and understand the struggles of software development teams with test data. Personally Identifiable Information? Too large environments? Long waiting times for a test data refresh? We envision to solve these issues: - Obfuscating, generating or masking databases and flat files; - Extracting or filtering specific data content with data subsetting; - Discovering, profiling and analysing solutions for understanding your test data, - Automating, integrating and orchestrating test data provisioning into your CI/CD pipelines and - Cloning, snapshotting and timetraveling throug your test data with database virtualization. We improve and innovate our test data software with the latest technologies every single day to support medium to large size organizations in their Test Data Management.
  • 3
    IRI Voracity

    IRI Voracity

    IRI, The CoSort Company

    Voracity is the only high-performance, all-in-one data management platform accelerating AND consolidating the key activities of data discovery, integration, migration, governance, and analytics. Voracity helps you control your data in every stage of the lifecycle, and extract maximum value from it. Only in Voracity can you: 1) CLASSIFY, profile and diagram enterprise data sources 2) Speed or LEAVE legacy sort and ETL tools 3) MIGRATE data to modernize and WRANGLE data to analyze 4) FIND PII everywhere and consistently MASK it for referential integrity 5) Score re-ID risk and ANONYMIZE quasi-identifiers 6) Create and manage DB subsets or intelligently synthesize TEST data 7) Package, protect and provision BIG data 8) Validate, scrub, enrich and unify data to improve its QUALITY 9) Manage metadata and MASTER data. Use Voracity to comply with data privacy laws, de-muck and govern the data lake, improve the reliability of your analytics, and create safe, smart test data
  • 4
    Sonrai Security

    Sonrai Security

    Sonraí Security

    Identity and Data Protection for AWS, Azure, Google Cloud, and Kubernetes. Sonrai’s public cloud security platform provides a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and 3rd party data stores. Uncover all identity and data relationships between administrators, roles, compute instances, serverless functions, and containers across multi-cloud accounts and 3rd-party data stores. Inside the platform, our critical resource monitor continuously monitors your critical data sitting inside object stores (e.g. AWS S3, Azure Blob) and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are monitored across multiple cloud providers and 3rd party data stores. Resolutions are coordinated with relevant DevSecOps teams.
  • 5
    SentinelOne Singularity
    One intelligent platform. Unprecedented speed. Infinite scale. Singularity™ enables unfettered visibility, industry-leading detection, and autonomous response. Discover the power of AI-powered, enterprise-wide cybersecurity. The world’s leading enterprises use the Singularity platform to prevent, detect, and respond to cyber attacks at machine-speed, greater scale, and higher accuracy across endpoint, cloud, and identity. SentinelOne delivers cutting-edge security with this platform by offering protection against malware, exploits, and scripts. SentinelOne cloud-based platform has been perfected to be innovative compliant with security industry standards, and high-performance whether the work environment is Windows, Mac or Linux. Thanks to constant updating, threat hunting, and behavior AI, the platform is ready for any threat.
    Starting Price: $45 per user per year
  • 6
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
  • 7
    PK Protect
    PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. The platform integrates with various systems to provide a unified approach to managing data security across cloud, on-premises, and hybrid environments. By offering real-time visibility and proactive threat detection, PK Protect helps organizations maintain control over their sensitive data and reduce security vulnerabilities.
  • 8
    Egnyte

    Egnyte

    Egnyte

    Egnyte provides a unified content security and governance solution for collaboration, data security, compliance, and threat detection for multicloud businesses. More than 16,000 organizations trust Egnyte to reduce risks and IT complexity, prevent ransomware and IP theft, and boost employee productivity on any app, any cloud, anywhere.
  • 9
    Seclore Data-Centric Security Platform
    Integrate and automate best-of-breed data security solutions. Take control of your destiny. With Seclore’s Data-Centric Security Platform you can unify best-of-breed Data-Centric Security solutions into a cohesive, automated framework without added integration costs. While DLP, Classification, and Rights Management each have their strengths, together they ensure documents are properly protected and tracked wherever they travel. And let’s not forget your existing Enterprise systems! EFSS, eMail, ECM, Directories, and SIEM can be easily added to the framework to further automate the process. Seamlessly unite best-in-class DLP, Data Classification, Rights Management and SIEM systems into an automated process for superior information security without added integration costs. The Seclore Unified Policy Manager enables you to orchestrate identity management, policy management, connectivity, encryption, and the collection of document usage insights.
  • 10
    OpenText Voltage SecureData
    Secure sensitive data wherever it flows—on premises, in the cloud, and in big data analytic platforms. Voltage encryption delivers data privacy protection, neutralizes data breach, and drives business value through secure data use. Data protection builds customer trust and enables compliance to global regulations, including GDPR, CCPA, and HIPAA. Privacy regulations recommend encryption, pseudonymization, and anonymization to protect personal data. Voltage SecureData enables enterprises to de-identify sensitive structured data and support the use of data in its protect state to safely drive business value. Ensure that applications operate on secure data flowing through the enterprise with no gaps, no decryption, and no performance overhead. SecureData supports the broadest range of platforms and encrypts data in any language. Structured Data Manager integrates SecureData so that businesses can easily and continuously protect data throughout the lifecycle, from discovery to encryption.
  • 11
    SISA Radar

    SISA Radar

    SISA Information Security

    Helping organizations improve data protection with data discovery, file analysis and classification. Secure your entire data ecosystem with SISA Radar data discovery and data classification. Organize and classify sensitive data based on the criticality and business needs. Gain contextual information to improve sensitive data management. Gain visibility into structured, semi-structured and unstructured sensitive data. Protect data from unauthorized access. Meet compliance standards of PCI DSS, GDPR, CCPA, POPIA, PDPA, APRA and other privacy regulations Create and customize your own data classification scheme. Embrace a scalable and future-proof approach to next-gen data security. A single platform to discover, identify and contextualize sensitive data. A proprietary data discovery algorithm for faster detection and lower false positives.
  • 12
    Cyberhaven

    Cyberhaven

    Cyberhaven

    Cyberhaven’s Dynamic Data Tracing technology is a transformative approach to preventing IP theft and other insider threats. Automatically track and analyze the entire journey of your data from its creation through every user interaction. Continuous risk assessment proactively finds unsafe behaviors and practices before they lead to a breach. Full-context data tracing makes policies simpler and more effective with far fewer false positives and user disruptions. In-context user education and coaching drives better behavior and adherence to security best practices. Whether due to malicious actions or a moment of carelessness, data loss can have devastating financial and reputational impacts. Automatically classify sensitive data based on data origin, its creator, and content. Find data even if you didn’t know where to look. Proactively find and mitigate risks whether due to malicious insiders, unsafe behavior, or simple user mistakes.
  • 13
    Digital Guardian
    No-compromise data protection means the flexibility to adapt to your needs. Digital Guardian is unique among DLP solutions in its ability to support both a use case-based approach (known data types or user groups) or a data risk discovery approach (identifying unknown use cases). Our risk discovery approach enables you to gain visibility by showing you where sensitive data is located, how it flows in the organization, and where it is put at risk, all without policies. Powered by AWS, Digital Guardian delivers simplified deployment, low overhead, and elastic scalability for increased return on your security spend. Coverage for your Windows, macOS, or Linux operating systems and all your applications, both browser based and native. Our “unknown risk” approach enables you to see where sensitive data is located, how it flows, and where it is put at risk - all without policies. Only Digital Guardian provides content, user, and context-based data discovery and classification.
  • 14
    SearchInform FileAuditor
    SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for automated audit of information storages, search for access violations and tracking changes made to critical data. The system protects confidential documents from careless and deliberate malicious actions of employees and puts things in order in file storages. The system performs: •Classification of vulnerable data Finds files in a document flow that contain critical information, and adds a special mark to each file, indicating the type of info it contains: personal data, trade secret, credit card numbers, etc. •Access rights audit Controls access rights to information (full access, editing, reading, writing, reading and changing, etc.). Finds confidential files stored in violation of established security rules . •Monitoring and blocking user actions Audits user operations with the file system. •Critical documents archiving Makes shadow copies of critical files.
  • 15
    NextLabs

    NextLabs

    NextLabs

    NextLabs CloudAz is a zero trust policy platform that enforces security policies consistently across the enterprise and beyond. It’s powered by a patented dynamic authorization policy engine and is the backbone of NextLabs’ Data Centric Security Suite consisting of Entitlement Management, Data Access Security, and Digital Rights Management (DRM) products. CloudAz integrates automated data classification, attribute-based access control (ABAC), data masking & segregation, digital rights (DRM) protection, and audit capabilities into one powerful platform that enables you to better align policies with rapidly changing business requirements while keeping up with the increasing cybersecurity challenge. The platform can be delivered either on-premises or in the cloud.
  • 16
    QOMPLX

    QOMPLX

    QOMPLX

    QOMPLX Identity Threat Detection and Response (ITDR) continuously validates to prevent network takeovers. QOMPLX ITDR uncovers existing Active Directory (AD) misconfigurations and detects attacks in real time. Identity security is essential to network operations. Verify identity in real-time. We verify everyone to prevent privilege escalation and lateral movement. We integrate with your current security stack and use it to augment our analytics resulting in comprehensive visibility. Understand the priority and severity of threats so resources can spend time where it matters most. Real-time detection and prevention stop attackers from bypassing security measures. From Active Directory (AD) security to red teaming and more, our experts are here to support your needs. QOMPLX enables clients to holistically manage and reduce cybersecurity risks. Our analysts will implement our SaaS solutions and monitor your environment.
  • 17
    ALTR

    ALTR

    ALTR

    Easily and simply control your sensitive data in Snowflake today so you can get more value from it in minutes instead of months. With ALTR you can automatically discover and classify sensitive data with a checkbox on import. Add controls like data masking with a drop-down menu. Set alerts and limits on data access by user, amount, and IP address from a single screen. No on-prem hassles or added costs, no proxies to break with a platform change and no managed services disguised as SaaS. ALTR was born in the cloud and natively integrates with platforms like Snowflake. With ALTR’s complete data control, you can visualize data usage, detect anomalies and alert on them, block threats in real time, and tokenize critical data. Safeguarding all your data. Because ALTR is built for the cloud, there’s no large up-front commitment—you can start for free and only upgrade as needed.
    Starting Price: $10 per user per month
  • 18
    ManageEngine AD360
    AD360 is an integrated identity and access management (IAM) solution for managing user identities, governing access to resources, enforcing security, and ensuring compliance. From user provisioning, self-service password management, and Active Directory change monitoring, to single sign-on (SSO) for enterprise applications, AD360 helps you perform all your IAM tasks with a simple, easy-to-use interface. AD360 provides all these functionalities for Windows Active Directory, Exchange Servers, and Office 365. With AD360, you can just choose the modules you need and start addressing IAM challenges across on-premises, cloud, and hybrid environments from within a single console. Easily provision, modify, and deprovision accounts and mailboxes for multiple users at once across AD, Exchange servers, Office 365 services, and G Suite from a single console. Use customizable user creation templates and import data from CSV to bulk provision user accounts.
  • 19
    Commvault Intelligent Data Services
    An integrated family of solutions for actionable insights, combining Commvault Data Governance, Commvault File Storage Optimization, and Commvault eDiscovery & Compliance. We’re creating more data than ever before — we should know all about it. Drive proactive and automated actions to respond faster, prevent data theft or breach, eliminate data sprawl, and make data-driven decisions for your org. Increase storage efficiency, enable faster responses to compliance requests, and reduce your data risks with analytics, reporting, and search across production and backup data sources. Advanced “4D” technology delivering a centralized and dynamic multi-dimensional index of metadata, content, classifications, and AI applied insights. Gain visibility into production and backup data with a single unified index across on-premises, remote, cloud, and backup data sources. Customizable dashboards enable you to search, filter, and drill down to the relevant details.
  • 20
    MAKVES DCAP
    MAKVES DCAP is a comprehensive data-centric audit and protection solution designed to safeguard corporate information by controlling access to critical data, and ensuring compliance with regulations like GDPR, FZ-152, and PCI DSS. This system helps businesses by monitoring user access to files, tracking sensitive information, and identifying risks such as excessive access rights and unauthorized activity. MAKVES DCAP offers a centralized platform for auditing IT assets across various environments, including Active Directory, cloud storage, email servers, and more. It also automates data classification, behavioral analysis, and policy enforcement to prevent data breaches. With a focus on protecting unstructured data, the solution provides real-time recommendations and remediation tools directly in the system interface. Forms a transparent matrix of access to company information resources.
  • 21
    Falcon Identity Threat Detection
    Falcon Identity Threat Detection lets you see all Service and Privileged accounts on your network and cloud with full credential profiles and weak authentication discovery across every domain. Analyze every domain in your organization for potential vulnerability from stale credentials, and weak or stale passwords, see all service connections and weak authentication protocols in use. Falcon Identity Threat Detection monitors the domain controllers on-premises or in the cloud (via API) to see all authentication traffic. It creates a baseline for all entities and compares behavior against unusual lateral movement, Golden Ticket attacks, Mimikatz traffic patterns and other related threats. It can help you see Escalation of Privilege and anomalous Service Account activity. Falcon Identity Threat Detection reduces the time to detect by viewing live authentication traffic, which expedites finding and resolving incidents.
  • 22
    Polar Security

    Polar Security

    Polar Security

    Automate data discovery, protection & governance in your cloud workload and SaaS applications. Automatically pinpoint all your exposed sensitive data in cloud workloads and SaaS applications, allowing you to shrink the data attack surface. Identify and classify sensitive data such as PII, PHI, PCI, and custom company IP to prevent sensitive data exposure. Get actionable insights on how to protect your cloud data and ensure compliance, in real-time. Enforce data access policies to achieve least privileged access, maintain a strong security posture, and remain resilient to cyber-threats.
  • 23
    Netwrix GroupID
    The user accounts and groups in your Active Directory and Microsoft Entra ID (formerly Azure AD) provide access to your sensitive data and systems. But trying to manage groups and users manually is a huge burden on your precious IT resources and often leads to errors that create security vulnerabilities. Netwrix GroupID automates and delegates group and user management to ensure your directories remain current, empowering you to enhance security while increasing IT productivity. Create queries that dynamically determine group membership based on users’ current attributes. In addition, ensure any attribute change to a parent group is automatically reflected in its child groups. Automatically provision and deprovision user accounts by syncing data from an authoritative source such as your HRIS platform. Sync changes to groups and users across identity stores in near real time — without any third-party connector.
  • 24
    Secuvy AI
    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 25
    DataGuard

    DataGuard

    DataGuard

    Use our AI-powered platform to get certified fast. And go beyond: Understand, identify and manage the security and compliance risks that matter most. We're helping customers address these challenges by building a security posture that integrates with their overall objectives, with a unique iterative and risk-based approach. Either taking the fast track to obtaining certifications or effectively reducing downtimes from cyberattacks right at the same time - we empower businesses to achieve robust digital security and compliance management with 40% less effort and an efficient budget spend. Our AI-powered platform automates repetitive tasks, simplifies compliance with complex regulations and frameworks, and helps to mitigate risks before they disrupt businesses. If needed, our in-house experts offer additional support, advising organizations on all their security and compliance challenges now and in future.
  • 26
    Dell EMC PowerProtect Data Manager
    Protect data and deliver governance control for modern cloud workloads across your evolving physical, virtual and cloud environments. Address ever-changing growth and IT complexity by leveraging Dell EMC’s software defined data protection platform. PowerProtect Data Manager delivers next generation data protection that enables faster IT transformation, while giving you the assurance that you can easily safeguard and quickly unlock your data’s value. Dell EMC PowerProtect Data Manager provides software defined data protection, automated discovery, deduplication, operational agility, self-service and IT governance for physical, virtual and cloud environments. PowerProtect Data Manager offers efficient data protection capabilities leveraging the latest evolution of Dell EMC trusted protection storage architecture.
  • 27
    Microsoft Entra Identity Protection
    Identity Protection uses the learnings Microsoft has acquired from their position in organizations with Microsoft Entra ID, the consumer space with Microsoft Accounts, and in gaming with Xbox to protect your users. Microsoft analyses trillions of signals per day to identify and protect customers from threats. The signals generated by and fed to identity protection can be further fed into tools like conditional access to make access decisions, or fed back to a security information and event management (SIEM) tool for further investigation. The risk signals can trigger remediation efforts such as requiring to perform multifactor authentication, reset their password using self-service password reset, or block access until an administrator takes action. Identity Protection allows organizations to accomplish three key tasks. Automate the detection and remediation of identity-based risks. Investigate risks using data in the portal. Export risk detection data to other tools.
  • 28
    Proofpoint Identity Threat Defense
    In an ever-changing hybrid world, your organization depends on its employees, their virtual identities, and the endpoints they operate on to build and protect its assets. Threat actors have found unique ways to move laterally across your cloud environments by exploiting such identities. You need an innovative and agentless identity threat detection and response solution to discover and remediate modern identity vulnerabilities—a key part of today’s attack chain. Proofpoint Identity Threat Defense, previously Illusive, gives you comprehensive prevention and visibility across all your identities so you can remediate identity vulnerabilities before they become real risks. You can also detect any lateral movements in your environments and activate deception to ensure threat actors are stopped in action before they gain access to your corporate assets. It doesn’t get better than knowing you can prevent modern identity risks and stop real-time identity threats in action, all in one place.
  • 29
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 30
    Oort

    Oort

    Oort

    Oort’s Identity Security Checks discover vulnerabilities across your entire user population (or a segment of it). Trigger notifications related to behavioral anomalies or best practices or policies not being followed. Easily identify inactive, overactive, overprivileged, or unusual behavior to reduce the attack surface and prevent problems before they happen. Drill down into any of your workforce identities and their corresponding activities with a comprehensive view of each user. By compiling data across sources (e.g. IdP, HRIS, etc.), know who the user is, what their existing access policy allows them to do, and their behavior over time using (or not using) that access. Respond to identity threats the right way, by kicking off reviews and remediation in the workflow tools you already use. Open tickets, ask managers, and proactively reach out to users who will be impacted by the response. Delegate IAM hygiene across the business to enforce the least privilege.
  • 31
    Getvisibility

    Getvisibility

    Getvisibility

    Getvisibility's customizable AI revolutionizes the DSPM landscape. With cutting-edge algorithms and user-friendly interfaces, it empowers businesses to unlock unprecedented insights, optimize performance, and detect anomalies in real time. Experience the power of tailored solutions that elevate your DSPM capabilities to new heights. Using AI and machine learning, Getvisibility provides the fastest and most accurate data discovery and classification platform. Our AI Models are trained on Industry-specific knowledge allowing you to quickly and accurately classify all of your data. Getvisibilities OCR capabilities enable organizations to see within pictures and images. Through our cutting-edge AI models, developed specifically for your security needs, our platform empowers your organization to swiftly identify your most sensitive data. With our advanced algorithms, Getvisibility enables the precise identification of protected surfaces, including personally identifiable information (PII).
  • 32
    PHEMI Health DataLab
    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden. PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools.
  • 33
    Gurucul

    Gurucul

    Gurucul

    Data science driven security controls to automate advanced threat detection, remediation and response. Gurucul’s Unified Security and Risk Analytics platform answers the question: Is anomalous behavior risky? This is our competitive advantage and why we’re different than everyone else in this space. We don’t waste your time with alerts on anomalous activity that isn’t risky. We use context to determine whether behavior is risky. Context is critical. Telling you what’s happening is not helpful. Telling you when something bad is happening is the Gurucul difference. That’s information you can act on. We put your data to work. We are the only security analytics company that can consume all your data out-of-the-box. We can ingest data from any source – SIEMs, CRMs, electronic medical records, identity and access management systems, end points – you name it, we ingest it into our enterprise risk engine.
  • 34
    Authomize

    Authomize

    Authomize

    Authomize continuously detects all effective relationships between both human and machine identities to company assets throughout all your organization’s environments (IaaS, PaaS, SaaS, Data, On-prem), down to the most granular company asset and normalized consistently across apps. Authomize offers a continuously updated inventory of your identities, assets and access policies, blocking unintended access with guardrails and alerting on anomalies and various risks. Authomize’s AI-driven engine harnesses its comprehensive and granular visibility over all of an organization’s environments to construct an optimal set of access policies for any identity-asset relationship. This SmartGroup technology performs continuous access modeling, self-correcting as it incorporates new inputs such as actual usage, activities and decisions you take to create an optimal and accurate permission structure.
  • 35
    Kogni

    Kogni

    Kogni

    Kogni's Discover feature enables enterprises to locate and detect all sensitive and critical information. Discover sensitive data from any source, in any format and in any type. Employ Kogni’s expert sensitive data discovery software to automate data discovery and classification. Our ease of implementation allows for seamless integration with your enterprise’s data warehouse. Accelerate compliance with international data regulations and industry standards with Kogni’s sensitive data discovery tool. Minimize the risk of data leak and the cost of non-compliance with data protection and privacy regulations like HIPAA, GDPR, CCPA, PCI, and PII amongst others. Scans and pin-points sensitive data from 10+ data sources. Produces a comprehensive sensitive information dashboard with an array of special features. Custom-build your sensitive data classification groups as per your company’s needs. Supports a wide range of data types and formats.
  • 36
    Code42 Incydr
    Incydr gives you the visibility, context and control needed to stop data leak and IP theft. Detect file exfiltration via web browsers, USB, cloud apps, email, file link sharing, Airdrop, and more. See how files are moved and shared across your entire organization, without the need for policies, proxies, or plugins. Incydr automatically identifies when files move outside your trusted environment, allowing you to easily detect when files are sent to personal accounts and unmanaged devices. Incydr prioritizes file activity based on 120+ contextual Incydr Risk Indicators (IRIs). This prioritization works on day 1 without any configuration. Incydr’s risk-scoring logic is use case-driven and transparent to administrators. Incydr uses Watchlists to programmatically protect data from employees who are most likely to leak or steal files, such as departing employees. Incydr delivers a complete range of technical and administrative response controls to support the full spectrum of insider events.
  • 37
    Stealthbits Privileged Activity Manager
    Stealthbits Privileged Activity Manager enables secure, task-based administrative access delivered just-in-time and with just-enough privilege. Reduce opportunity for lateral movement attacks through privileged account reduction. With Stealthbits Privileged Activity Manager (SbPAM), organizations are empowered to reduce their risk footprint through a task-based approach to Privileged Access Management. SbPAM provides Administrators the exact level of privileges needed, exactly when they’re needed, for only as long as they’re needed, and returns the environment to a no-access-by-default state, immediately upon completion. Use SbPAM “Activity Tokens” to provide temporary permission and access that are auto-provisioned when needed and de-provisioned when not, reducing your attack surface and potential for lateral movement attacks. Built-in access certification facilities allow unique ability to approve or deny who should and should not have access to SbPAM and privileged activities.
  • 38
    Inrupt Enterprise Solid Server
    Inrupt's Enterprise Solid Server is a powerful platform designed to enable organizations to securely manage and host personal data stores, known as Pods, for their customers or citizens. The server allows users to store data in an interoperable format, ensuring it can be reused across various applications and services with customer consent. Inrupt Enterprise Solid Server provides high performance and scalability, whether deployed on cloud or on-premise environments. It supports advanced privacy compliance, enabling users to manage access to their data and ensuring compliance with global privacy regulations. With features like microservices architecture, Inrupt Enterprise Solid Server is highly reliable and supports dynamic scaling for enterprise-level deployments. Includes tools for logging, auditing, and real-time security monitoring. Data can come from multiple approved sources. It's reusable across apps and services.
  • 39
    VeriClouds

    VeriClouds

    VeriClouds

    VeriClouds CredVerify is the only service designed to detect, verify and remediate the use of weak or stolen credentials throughout the entire user lifecycle, from registration to authentication and password reset. It takes seconds to detect, offers immediate response, and has over 90% coverage. Rest assured you will be protected by the highest standards in security, and know that part of VeriClouds’ service policy is hard dedication in complying with key security points. Automates the detection of unauthorized login attempts and integrates with real-time policy enforcement measures. Significantly minimizes the threat from the number one cause of data breaches, a weak or stolen password. Reduces the likelihood of an account takeover or credential stuffing attack from being successful. CredVerify can be consumed as a service in the VeriClouds cloud, or it can be deployed in a customer’s cloud environment with just a few lines of code.
  • 40
    Traced Security

    Traced Security

    Traced Security

    SaaS platforms are increasingly targeted by cybercriminals, resulting in severe data breaches. Understanding and mitigating these threats is essential for maintaining security. Complex SaaS environments obscure security threats. Achieving full visibility is crucial for identifying and addressing potential vulnerabilities effectively. Inadequate SaaS security can lead to non-compliance with regulations. Ensuring compliance is vital to avoid penalties and maintain trust. Weak data governance in SaaS can result in unauthorized access and data loss. Robust data protection measures are necessary to secure sensitive information. Achieve comprehensive insights, user behavior, data exposure, SaaS risks, and compliance with Cybenta AI. Enhance your SaaS security by prioritizing and addressing vulnerabilities with AI-driven analytics and automated remediation. Streamline the management and governance of apps and identities through automation and orchestration.
  • 41
    Plurilock AI Cloud

    Plurilock AI Cloud

    Plurilock Security

    Plurilock AI Cloud is a cloud-native single sign-on (SSO), passwordless (FIDO2/webauthn), and cloud access security broker (CASB) platform designed specifically for cloud-centric companies relying on an army of SaaS applications to succeed. With Plurilock AI Cloud, companies enable their employees to sign on once to access all of their applications, and gain extensive, granular control over application and workflow access by device, location, time of day, software versions, groups, and organizational units. Plurilock AI Cloud is part of the Plurilock AI platform, which grows as companies do, with simple expansion paths to full, endpoint-based DLP, and then to true continuous, real-time authentication and user/entity behavior analytics (UEBA) for real-time biometric identity threat detection and response (ITDR). Plurilock AI Cloud is rated top in the industry in customer satisfaction, based on the feedback of actual customers.
  • 42
    Microsoft Purview
    Microsoft Purview is a unified data governance service that helps you manage and govern your on-premises, multicloud, and software-as-a-service (SaaS) data. Easily create a holistic, up-to-date map of your data landscape with automated data discovery, sensitive data classification, and end-to-end data lineage. Empower data consumers to find valuable, trustworthy data. Automated data discovery, lineage identification, and data classification across on-premises, multicloud, and SaaS sources. Unified map of your data assets and their relationships for more effective governance. Semantic search enables data discovery using business or technical terms. Insight into the location and movement of sensitive data across your hybrid data landscape. Establish the foundation for effective data usage and governance with Purview Data Map. Automate and manage metadata from hybrid sources. Classify data using built-in and custom classifiers and Microsoft Information Protection sensitivity labels.
  • 43
    LightBeam.ai

    LightBeam.ai

    LightBeam.ai

    Discover within minutes if sensitive information lurks in places you never expected (screenshots, logs, tickets, messages, tables). With one click, LightBeam can easily generate executive or delta reports to gain valuable insights into your sensitive data. Automate DSRs leveraging LightBeam's unique PII/PHI graphs comprehensively created from your data infrastructure. Build trust with your users by empowering them to exercise control over their data collection. Continuously monitor how sensitive data is collected, used, shared, and maintained with appropriate safeguards within your organization.
  • 44
    SlashID

    SlashID

    SlashID

    Identity is the most common vector for lateral movement and data breaches. SlashID helps you build a secure, compliant, and scalable identity infrastructure. Manage the creation, rotation and deletion of identities and secrets in a single place. Complete inventory of all your identities and secrets, multi-cloud. Detect initial access, privilege escalation, and lateral movement across your IdPs and cloud environments. Add authentication, authorization, conditional access, and tokenization to your services. Detect leaked key materials in real-time and prevent data breaches by rotating them. Automatically block, suspend, rotate or enforce MFA on a detection to reduce the impact of an attack. Add MFA and conditional access to your applications. Add authentication, authorization, credential tokenization, and conditional access to your APIs and workloads.
  • 45
    StealthAUDIT
    StealthAUDIT automates the collection and analysis of the data you need to answer the most difficult questions you face in the management and security of dozens of critical IT assets, including data, directories, and systems. All organizations, regardless of size, require tools to help them manage and secure the various technology resources that power their businesses. However, no organization has the ability to afford, efficiently operate, or maintain separate point products for every technology they leverage. What they need are solutions that are flexible enough to bend to their unique requirements, while also providing the extensibility to deliver a common set of capabilities across multiple platforms within their IT ecosystem. StealthAUDIT contains over 40 built-in data collection modules covering both on-premises and cloud-based platforms from Operating Systems to Office 365.
    Starting Price: $10.00/one-time/user
  • 46
    Plurilock DEFEND

    Plurilock DEFEND

    Plurilock Security

    Plurilock DEFEND provides true real-time authentication for the duration of an active computing sessions using behavioral biometrics and the computing devices your employees already use. DEFEND relies on a lightweight endpoint agent and proprietary machine learning techniques to confirm or reject user's identity with very high accuracy based on their console input stream, without authentication steps that are evident to the user. By integrating with SIEM/SOAR, DEFEND can be used to triage and respond to SOC alerts with high-confidence identity threat intelligence. By integrating with login and application workflows, DEFEND provides just-in-time biometric identity behind the scenes, enabling login workflows to be skipped when biometric identity is already in a confirmed state. DEFEND supports Windows endpoints, Mac OS endpoints, and IGEL and Amazon Workspaces thin and VDI clients.
    Starting Price: $9 per user per month
  • 47
    Dasera

    Dasera

    Dasera

    Dasera is a Data Security Posture Management (DSPM) platform providing automated security and governance controls for structured and unstructured data across cloud and on-prem environments. Uniquely, Dasera monitors data in use while offering continuous visibility and automated remediation, preventing data breaches across the entire data lifecycle. Dasera provides continuous visibility, risk detection, and mitigation to align with business goals while ensuring seamless integration, unmatched security, and regulatory compliance. Through its deep understanding of the four data variables - data infrastructure, data attributes, data users, and data usage - Dasera promotes a secure data-driven growth strategy that minimizes risk and maximizes value, giving businesses a competitive edge in today's rapidly evolving digital landscape.
    Starting Price: 3 data stores at $20,000
  • 48
    Privacera

    Privacera

    Privacera

    At the intersection of data governance, privacy, and security, Privacera’s unified data access governance platform maximizes the value of data by providing secure data access control and governance across hybrid- and multi-cloud environments. The hybrid platform centralizes access and natively enforces policies across multiple cloud services—AWS, Azure, Google Cloud, Databricks, Snowflake, Starburst and more—to democratize trusted data enterprise-wide without compromising compliance with regulations such as GDPR, CCPA, LGPD, or HIPAA. Trusted by Fortune 500 customers across finance, insurance, retail, healthcare, media, public and the federal sector, Privacera is the industry’s leading data access governance platform that delivers unmatched scalability, elasticity, and performance. Headquartered in Fremont, California, Privacera was founded in 2016 to manage cloud data privacy and security by the creators of Apache Ranger™ and Apache Atlas™.
  • 49
    AuthMind

    AuthMind

    AuthMind

    Prevent your next identity-related cyberattack with the AuthMind platform. It works anywhere and deploys in minutes. As we use a growing number of applications and systems, spanning different environments (cloud, SaaS apps, on-premises, etc.), it’s clear that keeping them secure is more challenging than ever. Traditional security tools are prone to misconfiguration and human error that often leave the organization exposed to risk. The answer is to look beyond an organization’s identity infrastructure. AuthMind is the only ITDR solution that provides you with end-to-end visibility into user activity across the integrated application landscape. By continuously mapping all access flows across all applications, AuthMind uniquely detects and remediates previously hidden security gaps such as shadow access, exposed assets, compromised identities, unknown SaaS apps, shadow accesses, lack of MFA, and much more. AuthMind works in any cloud or network.
  • 50
    Verosint

    Verosint

    Verosint

    User credentials are the highly-coveted targets of bad actors. That’s why companies are turning to Verosint to help deliver trusted online experiences while detecting and preventing account takeover, new account fraud, and account sharing attempts. If account security isn't properly strengthened, your digital business is at risk. Confidently interact with customers no matter what device they’re using and ensure that only legitimate users gain access. Verosint helps your customers enjoy a seamless, low-friction transaction path while stopping suspicious users before they log in or create a new account. Our patent-pending technology leverages machine learning to analyze events, risk signals, and historical activity transforming millions of data points into actionable insights. Cloud-native and built to scale, Verosint works in the background to assess risk and orchestrate account security and fraud controls so quickly, you’ll never know we were there.
    Starting Price: $279 one-time payment