102 results
Why Capterra is free
N-able Backup offers cloud-first data protection without the cost and complexity of traditional image backup. Learn more about Backup
N-able Backup is a cloud-first data protection service for servers, workstations, business documents, and Microsoft 365™, all managed from a single multitenant web-based dashboard. Microsoft 365 protection covers Exchange®, OneDrive®, and SharePoint®, all for one low per-user price. Cloud storage is included in your price -- keep data in region with 30 data centers worldwide. Automated recovery testing (with screenshot verification) is available. Learn more about Backup
N-able Backup is a cloud-first data protection service for servers, workstations, business documents, and Microsoft 365™, all managed from a single multitenant web-based dashboard. Microsoft 365...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP. Device Control & eDiscovery capabilities on Windows, macOS and Linux. Learn more about Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as PCI DSS, HIPAA, GDPR, CCPA etc. Learn more about Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Protects information breach, monitors data in motion and data at rest, controls communication channels and reports events. Learn more about SearchInform DLP
Prevents data breach during storage, use and transfer. Assists with fast automated relocation of processes outside the office and makes remote employees connect to internal assets maintaining security standards and ensuring as safe data transfer as within a corporate perimeter. Facilitates inventorying and detection of corporate fraud. Minimizes human error and HR risks. Operates as an early warning system alerting to possible threats. Instrumental in conducting investigation and compliance. Learn more about SearchInform DLP
Prevents data breach during storage, use and transfer. Assists with fast automated relocation of processes outside the office and makes remote employees connect to internal assets maintaining...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Nightfall DLP lets you discover, classify, and protect business-critical data in the cloud and remediate incidents in real-time. Learn more about Nightfall DLP
Nightfall DLP is the industry's first cloud-native data loss prevention solution. Nightfall is designed to effortlessly integrate with corporate SaaS and cloud infrastructure in order to address the problem of data spray across the cloud. With Nightfall you can discover, classify, and protect PII, PCI, PHI, and other business-critical data using high accuracy machine learning based detectors. Additionally, you'll be able to remediate data security incidents in real-time with automated workflows. Learn more about Nightfall DLP
Nightfall DLP is the industry's first cloud-native data loss prevention solution. Nightfall is designed to effortlessly integrate with corporate SaaS and cloud infrastructure in order to address the...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Employee Monitoring and Intelligent Data Loss Prevention (DLP) Software - Cloud, On-prem, Private Cloud, AWS deployment options Learn more about Teramind DLP
Intelligent Data Loss Prevention: Employee monitoring, user behavior analytics, data loss prevention software in a single platform Powerful and flexible policy and rules engine with web-based management dashboard Out-of-the-box integration to leading SIEM platforms for real-time alerts/action Extensive, customizable reporting Cloud/private-cloud/on-prem deployment options for SMB & Enterprise Meet compliance, monitoring, audit and forensics requirements for GDPR, HIPAA, PCI & more Learn more about Teramind DLP
Intelligent Data Loss Prevention: Employee monitoring, user behavior analytics, data loss prevention software in a single platform Powerful and flexible policy and rules engine with web-based...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Kasm Workspace is a secure virtualized workspace for interacting with sensitive data using restrictions that prevent data loss/sharing. Learn more about Kasm Workspaces
Kasm Workspaces is changing the way that businesses secure sensitive data using our Containerized Desktop Infrastructure (CDI) and browser-based rendering technology. Developed for secure collaboration on highly sensitive Government/Defense programs, our technology allows users to seamlessly interact with sensitive data through the web browser while also protecting the data from being taken or shared. Kasm is not just a service, but a highly configurable platform, with a robust developer API. Learn more about Kasm Workspaces
Kasm Workspaces is changing the way that businesses secure sensitive data using our Containerized Desktop Infrastructure (CDI) and browser-based rendering technology. Developed for secure...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Multilayered technology, machine learning, and human expertise combined with automated security management. Learn more about ESET Endpoint Security
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easytouse cloudbased console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption. Learn more about ESET Endpoint Security
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends Backup for all-in-one ease-of-use. Learn more about Unitrends Backup
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully integrated backup, replication, deduplication, archive, and instant recovery. Run it on vSphere, Hyper-V, XenServer, or deploy it as a VM within the Azure or AWS cloud. Integrate with our cloud which is purpose-built for effortless, cost-efficient backup, offsite storage, long-term retention and DRaaS Learn more about Unitrends Backup
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Learn more about DriveStrike
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Learn more about DriveStrike
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Start running backups and restores in less than 15 minutes to prevent data loss! Comet is a fast, secure all-in-one backup platform. Learn more about Comet Backup
Start running backups and restores in less than 15 minutes to prevent data loss! Comet is a fast, secure all-in-one backup platform for IT teams, enterprise & MSPs. You control your backup environment and storage destination (local, AWS, Google Cloud Storage, Azure, Backblaze, Wasabi, or other S3 storage providers). Our backup software supports businesses across 110 countries in 10 languages. No contracts. Support, updates, replication, and re-branding are all free. 30-day FREE trial! Learn more about Comet Backup
Start running backups and restores in less than 15 minutes to prevent data loss! Comet is a fast, secure all-in-one backup platform for IT teams, enterprise & MSPs. You control your backup...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Cloud-hosted GDPR compliant business backups. Secure and robust infrastructure with German servers. Learn more about euBackups
Cloud-hosted GDPR compliant business backups. Secure and robust infrastructure with German servers. 100% European hosted Central management console Zero Knowledge encryption Secure Key Management Increase or decrease storage or devices on a monthly basis Monthly or annual terms Free 14 day trial Unlimited bandwidth File sync Green hosting White labeling available Our hosted infrastructure is fully-compliant with EU data protection and GDPR guidelines. Learn more about euBackups
Cloud-hosted GDPR compliant business backups. Secure and robust infrastructure with German servers. 100% European hosted Central management console Zero Knowledge encryption Secure Key...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Complete threat protection and remediation solution, centrally managed from the cloud for organizations of all sizes.
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy to use for organizations of all sizes.
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Hybrid platform that helps firms manage backup, recovery and replication of data across virtual, physical and cloud-based environments.
Built to create backups of vSphere and Hyper-V virtual machines. Offers image-based VM replication, instant VM and file-level recovery.
Built to create backups of vSphere and Hyper-V virtual machines. Offers image-based VM replication, instant VM and file-level recovery.

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Prevent data loss and corruption in virtual, physical, cloud and SaaS environments.
NAKIVO Backup & Replication helps prevent any potential data loss or corruption in virtual, physical, cloud and SaaS environments. Keep copies of your data on-site and off-site ¿ on tape or in the AWS/Azure clouds. Use the software to perform both full and incremental backup copy to tape. Combine several storage options to eliminate a single point of failure and ensure reliable data protection.
NAKIVO Backup & Replication helps prevent any potential data loss or corruption in virtual, physical, cloud and SaaS environments. Keep copies of your data on-site and off-site ¿ on tape or in the...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
NeoCertified provides an essential component for your DLP strategy: a trusted secure email solution for businesses of all industries.
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives you the flexibility and assured protection that you're looking for in an encryption provider. An included Microsoft Outlook-integrated button, a 24/7 customer support team, and commercial-grade encryption -- NeoCertified 's the upgrade your DLP solution has needed. Receive a personalized quote.
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Monitor and analyze your employees company-wide whether they are in the office or working remotely.
Veriato Cerebral Employee Monitoring software provides unmatched visibility into the online and communications activity of your employees and contractors. Cerebral (previously Veriato 360) is the system of record, presenting detailed, accurate, and actionable data for use in incident response, high-risk insider monitoring, and productivity reporting. Cerebral can be deployed On-prem, in the Cloud or through an MSP provider.
Veriato Cerebral Employee Monitoring software provides unmatched visibility into the online and communications activity of your employees and contractors. Cerebral (previously Veriato 360) is the...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Comprehensive enterprise backup solution for all workloads, combining data protection for backups, replicas, storage snapshots and CDP.
Comprehensive enterprise backup solution for all workloads, combining data protection for backups, replicas, storage snapshots and CDP replicas under one control panel. Veeam provides backup, restore and replication for virtual machines and cloud-based workloads, as well as physical servers and workstations. VMware, Hyper-V, AWS, Azure, Windows, Linux, Nutanix AHV and Google GCP are supported. Veeam also delivers multiple integrations with leading storage vendors and service providers.
Comprehensive enterprise backup solution for all workloads, combining data protection for backups, replicas, storage snapshots and CDP replicas under one control panel. Veeam provides backup,...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Secure your team's remote access to cloud resources, servers, or corporate databases in 10 minutes. $2.9/user/mo. Try 14 days free!
GoodAccess is a cloud VPN that enables secure remote access to company networks, business systems, and cloud resources using zero-trust principles. We believe that if a business wants to empower its users with secure “anywhere, anytime” access, they should be able to do this with no hassle. This is why we invest our passion and expertise in developing an affordable service that is easy to use, deployed in 10 minutes, and agile by design.
GoodAccess is a cloud VPN that enables secure remote access to company networks, business systems, and cloud resources using zero-trust principles. We believe that if a business wants to empower its...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
SilverSky provides advanced email protection, compliance and information protection solutions to keep your company and users safe.
Content-aware policies normally reserved for standalone enterprise technology help companies of all sizes guard against insider threats. SilverSky protects small and mid-sized businesses with solutions to prevent targeted attacks, social engineering attacks and data exfiltration. With over 20 years of experience serving regulated industries, we have the experience and skills to ensure your email environment stays safe and compliant with the latest industry regulations.
Content-aware policies normally reserved for standalone enterprise technology help companies of all sizes guard against insider threats. SilverSky protects small and mid-sized businesses with...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Device control software. Block USB removable storage devices and other peripherals to secure sensitive data against theft and misuse.
AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol includes device control features for a variety of peripheral devices including USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, and MP3s. File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users.
AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol includes device...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Keepit is a software company specialized in Cloud-to-Cloud data backup and recovery.
Keepit is the industry leader in cloud-to-cloud backup that provides complete coverage across all Microsoft 365 workloads: Teams, Exchange, OneDrive, SharePoint, Groups, and Public Folders. Keepit´s architecture runs on a secure, private infrastructure offering data immutability and plural full instances of your data. With Keepit, you can manage your data independent from your SaaS provider´s status.
Keepit is the industry leader in cloud-to-cloud backup that provides complete coverage across all Microsoft 365 workloads: Teams, Exchange, OneDrive, SharePoint, Groups, and Public Folders. ...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
BetterCloud is the mission control center for discovering, managing, and securing SaaS applications, data, and users.
BetterCloud is the leading SaaS Management Platform (SMP) that enables IT professionals to discover, manage, and secure their cloud applications in a best-of-breed world. The driving force behind our work is to ensure organizations get the transformative value and benefits of adopting SaaS applications, while ensuring IT has complete control over their environment and can serve as an enabler for the business.
BetterCloud is the leading SaaS Management Platform (SMP) that enables IT professionals to discover, manage, and secure their cloud applications in a best-of-breed world. The driving force behind our...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Data Control is designed to assist in complying with data protection regulations, as well as discovering and protecting sensitive data.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting &...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Behavioral, risk-adaptive security enables proactive threat response and dynamic monitoring and enforcement of data controls.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and dynamically apply monitoring and enforcement controls on web, cloud, email and endpoint. Integrated UAM facilitates real-time risk-scoring based on user activity and data sensitivity, and supports closed-loop investigation and forensics.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Chimpa UEM is an EMM crossplatform solution that allows to manage, monitor and protect the mobile devices in schools and business.
Chimpa UEM is an EMM (Enterprise Mobility Management) solution that is able to guarantee the control of mobile devices, IFPs and VRs visors because: streamlines management of iOS, iPadOS, tvOS and Android devices with zero-touch deployments; is an Android Enterprise validated solution and it's also completely integrated with Apple services; supports BYOD, COBO, COPE, single purpose device managements (COSU); let IT Admins to manage privacy, policies, apps/content deployment with an easy UX.
Chimpa UEM is an EMM (Enterprise Mobility Management) solution that is able to guarantee the control of mobile devices, IFPs and VRs visors because: streamlines management of iOS, iPadOS, tvOS and...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR)...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
INKY is powered by computer vision, and machine learning making it the most effective solution in the fight against phishing.
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques and a unique banner technology to identify and block sophisticated phishing emails that legacy email systems cannot detect. INKY works with Microsoft O365, Exchange, and Google Workspace and on all mobile devices.
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Scalable data warehousing, replication, integration, & data backup platform. Quickly connect any data source to any data warehouse!
Sesame Software's data management platform, Relational Junction, connects any data source to any data warehouse in just minutes. Relational Junction enables secure & efficient data integration & replication between 100+ cloud, hybrid, & on-premise data sources/applications. Our patented scalability & multithreaded technology quickly connects all of your critical business information in one place for a 360-degree view of your data. This unified view allows for robust reporting & analytics.
Sesame Software's data management platform, Relational Junction, connects any data source to any data warehouse in just minutes. Relational Junction enables secure & efficient data integration &...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Enterprise cross platform file replication software that syncs & mirrors files between different sites, OSs, clouds, VMs and servers.
Enterprise cross platform file replication software that syncs & mirrors files between different sites, different systems, different storage and different clouds. EnduraData software runs on VMs as well as on physical machines. EDpCloud is used for automatic secure file transfer, data delivery,continuous backup, server backup, data protection and workflow automation. EDpCloud replicates only file changes(deltas) in real time, on a scheduled basis or on demand. Multiple operating systems support,
Enterprise cross platform file replication software that syncs & mirrors files between different sites, different systems, different storage and different clouds. EnduraData software runs on VMs as...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
FILERECOVERY® recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Easy to use.
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or others, FILERECOVERY will recover your lost data. Easy to use. Recovery is just a few mouse clicks away.
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Most preferred CASB vendor for SMBs globally - Single Sign On, Data Loss Prevention, Identity Management, Shadow IT, Access Control,etc
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single Sign On, Data Loss Prevention, Shadow IT, Access Control, Identity Management and more. CloudCOdes is one of the most preferres CASB solution provider by SMBs globally.
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Data management solution that enables businesses to process and deliver real-time data through serialization, access control, and more.
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data, including data from enterprise databases via change data capture. It offers built-in validation, SQL-based stream processing such as filtering, transformations, aggregations, and enrichment, multi-source correlation, complex pattern matching, predictive analytics, and real-time dashboards with alerts.
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data,...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Relational Database Administration for Multiple Platforms
Manage and secure multiple relational database platforms from a single user interface Manage multiple platforms (Oracle, SQL Server, Db2, Sybase) from one UI Proactively manage space, data and performance with built-in analytics Easily find and fix performance issues using intelligent diagnostics Move schema and table data across different platforms with ease Protect data security with view, grant and revoke of permissions
Manage and secure multiple relational database platforms from a single user interface Manage multiple platforms (Oracle, SQL Server, Db2, Sybase) from one UI Proactively manage space, data and...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
For on-premises, SaaS, and cloud-native data, Metallic gives you the best choice for your hybrid cloud data protection journey.
Metallic, from Commvault, offers award-winning data protection without the complexity. For small & medium-sized business, with fast-growing environments, looking to secure an enterprise-grade solution to protect their data. Built on Microsoft Azure, Metallic offers coverage across apps, endpoints, on-premise, & cloud environments - proven to safeguard critical business data from deletion, corruption, & attack. Stay secure, stay compliant, stay recoverable with Metallic backup & recovery.
Metallic, from Commvault, offers award-winning data protection without the complexity. For small & medium-sized business, with fast-growing environments, looking to secure an enterprise-grade...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Netskope is the leading cloud access security broker. With Netskope, IT can protect data and ensure compliance.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can direct usage, protect sensitive data, and ensure compliance in real-time, on any device, including native apps on mobile devices and whether on-premises or remote, and with the broadest range of deployment options in the market. With Netskope, the business can move fast, with confidence.
Netskope is the leading cloud access security broker. Only Netskope gives IT the ability to find, understand, and secure sanctioned and unsanctioned cloud apps. With Netskope, organizations can...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Exabeam is SIEM that helps security operations and insider threat teams work smarter.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations no longer have to live with missed distributed attacks, unknown threats, and manual investigations and remediation. With the modular Exabeam Security Management Platform, analysts can use behavioral analytics to detect attacks, automate investigation and incident response, and reduce storage costs.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
A data security product that allows users to detect, protect, and correct data in the cloud.
A data security product that allows users to detect, protect, and correct data in the cloud.
A data security product that allows users to detect, protect, and correct data in the cloud.

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
A data loss prevention solution that can control, block and monitor USB devices from having unauthorized access to sensitive data.
WITH DEVICE CONTROL PLUS, YOU CAN: Control, block, and monitor all USB and peripheral devices effortlessly. Eliminate data loss due to unauthorized data transfers. Implement file access control to prevent unprivileged access. Get your work done quickly by granting temporary access to third-party devices when required. Create a trusted device list, and authorize specific devices to access your computer safely.
WITH DEVICE CONTROL PLUS, YOU CAN: Control, block, and monitor all USB and peripheral devices effortlessly. Eliminate data loss due to unauthorized data transfers. Implement file access control...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Protect data within company boundaries and beyond
Beyond DLP is a unique and proactive Data Loss Prevention solution. It uses AI, behavior analysis, and deception techniques to secure all stages of digital data and protect against both internal and external threats. Even after data exfiltration, Beyond DLP provides security personnel with detailed forensic information on the breach. Additionally, the solution is quick to implement, requires no endpoint agent, and has zero impact on employee productivity.
Beyond DLP is a unique and proactive Data Loss Prevention solution. It uses AI, behavior analysis, and deception techniques to secure all stages of digital data and protect against both internal and...

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Compliant, easy to use, and instant access cloud storage solution.
Compliant, easy to use, and instant access cloud storage solution.
Compliant, easy to use, and instant access cloud storage solution.

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
The industry's first and only comprehensive collaboration, chat, and social media security platform.
SafeGuard Cyber is a digital risk protection platform purpose-built for collaboration, mobile chat, and social media applications.
SafeGuard Cyber is a digital risk protection platform purpose-built for collaboration, mobile chat, and social media applications.

Features

  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking