77 results
Why Capterra is free
Nightfall DLP lets you discover, classify, and protect business-critical data in the cloud and remediate incidents in real-time. Learn more about Nightfall DLP
Nightfall DLP is the industry's first cloud-native data loss prevention solution. Nightfall is designed to effortlessly integrate with corporate SaaS and cloud infrastructure in order to address the problem of data spray across the cloud. With Nightfall you can discover, classify, and protect PII, PCI, PHI, and other business-critical data using high accuracy machine learning based detectors. Additionally, you'll be able to remediate data security incidents in real-time with automated workflows. Learn more about Nightfall DLP
Nightfall DLP is the industry's first cloud-native data loss prevention solution. Nightfall is designed to effortlessly integrate with corporate SaaS and cloud infrastructure in order to address the pr...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends Backup for all-in-one ease-of-use. Learn more about Unitrends Backup
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully integrated backup, replication, deduplication, archive, and instant recovery. Run it on vSphere, Hyper-V, XenServer, or deploy it as a VM within the Azure or AWS cloud. Integrate with our cloud which is purpose-built for effortless, cost-efficient backup, offsite storage, long-term retention and DRaaS Learn more about Unitrends Backup
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully int...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP. Device Control & eDiscovery capabilities on Windows, macOS and Linux. Learn more about Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as PCI DSS, HIPAA, GDPR, CCPA etc. Learn more about Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to d...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Employee Monitoring and Intelligent Data Loss Prevention (DLP) Software - Cloud, On-prem, Private Cloud, AWS deployment options Learn more about Teramind DLP
Intelligent Data Loss Prevention: Employee monitoring, user behavior analytics, data loss prevention software in a single platform Powerful and flexible policy and rules engine with web-based management dashboard Out-of-the-box integration to leading SIEM platforms for real-time alerts/action Extensive, customizable reporting Cloud/private-cloud/on-prem deployment options for SMB & Enterprise Meet compliance, monitoring, audit and forensics requirements for GDPR, HIPAA, PCI & more Learn more about Teramind DLP
Intelligent Data Loss Prevention: Employee monitoring, user behavior analytics, data loss prevention software in a single platform Powerful and flexible policy and rules engine with web-based manageme...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Complete threat protection and remediation solution, centrally managed from the cloud for organizations of all sizes. Learn more about Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy to use for organizations of all sizes. Learn more about Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Prevent data loss and corruption in virtual, physical, cloud and SaaS environments.
NAKIVO Backup & Replication helps prevent any potential data loss or corruption in virtual, physical, cloud and SaaS environments. Keep copies of your data on-site and off-site ¿ on tape or in the AWS/Azure clouds. Use the software to perform both full and incremental backup copy to tape. Combine several storage options to eliminate a single point of failure and ensure reliable data protection.
NAKIVO Backup & Replication helps prevent any potential data loss or corruption in virtual, physical, cloud and SaaS environments. Keep copies of your data on-site and off-site ¿ on tape or in the AWS/...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
NeoCertified provides an essential component for your DLP strategy: a trusted secure email solution for businesses of all industries.
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives you the flexibility and assured protection that you're looking for in an encryption provider. An included Microsoft Outlook-integrated button, a 24/7 customer support team, and commercial-grade encryption -- NeoCertified 's the upgrade your DLP solution has needed. Receive a personalized quote.
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives you...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
SilverSky provides advanced email protection, compliance and information protection solutions to keep your company and users safe.
Content-aware policies normally reserved for standalone enterprise technology help companies of all sizes guard against insider threats. SilverSky protects small and mid-sized businesses with solutions to prevent targeted attacks, social engineering attacks and data exfiltration. With over 20 years of experience serving regulated industries, we have the experience and skills to ensure your email environment stays safe and compliant with the latest industry regulations.
Content-aware policies normally reserved for standalone enterprise technology help companies of all sizes guard against insider threats. SilverSky protects small and mid-sized businesses with solution...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices th...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data Control is designed to assist in complying with data protection regulations, as well as discovering and protecting sensitive data.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investi...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Behavioral, risk-adaptive security enables proactive threat response and dynamic monitoring and enforcement of data controls.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and dynamically apply monitoring and enforcement controls on web, cloud, email and endpoint. Integrated UAM facilitates real-time risk-scoring based on user activity and data sensitivity, and supports closed-loop investigation and forensics.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and dynamically...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Chimpa MDM is an EMM crossplatform solution that allows to manage, monitor and protect the mobile devices in schools and business.
Chimpa MDM is an EMM (Enterprise Mobility Management) solution that is able to guarantee the control of mobile devices, IFPs and VRs visors because: streamlines management of iOS, iPadOS, tvOS and Android devices with zero-touch deployments; is an Android Enterprise validated solution and it's also completely integrated with Apple services; supports BYOD, COBO, COPE, single purpose device managements (COSU); let IT Admins to manage privacy, policies, apps/content deployment with an easy UX.
Chimpa MDM is an EMM (Enterprise Mobility Management) solution that is able to guarantee the control of mobile devices, IFPs and VRs visors because: streamlines management of iOS, iPadOS, tvOS and Andr...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) tes...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
FILERECOVERY® recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Easy to use.
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or others, FILERECOVERY will recover your lost data. Easy to use. Recovery is just a few mouse clicks away.
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or ot...
Most preferred CASB vendor for SMBs globally - Single Sign On, Data Loss Prevention, Identity Management, Shadow IT, Access Control,etc
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single Sign On, Data Loss Prevention, Shadow IT, Access Control, Identity Management and more. CloudCOdes is one of the most preferres CASB solution provider by SMBs globally.
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single Sign ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data management solution that enables businesses to process and deliver real-time data through serialization, access control, and more.
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data, including data from enterprise databases via change data capture. It offers built-in validation, SQL-based stream processing such as filtering, transformations, aggregations, and enrichment, multi-source correlation, complex pattern matching, predictive analytics, and real-time dashboards with alerts.
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data, inclu...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databa...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Security management and operations platform with detection, analytics, and response capabilities.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smart...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Cloud data management providing instant data warehousing, replication, integration, and backup and recovery for 100+ data sources.
Sesame Software's Relational Junction Data Management Suite provides an instant data warehouse in just minutes, and enables secure and efficient data integration between cloud and on-premise applications for robust reporting and analytics. With patented scalability and multithreaded technology, Relational Junction combines data warehousing, replication, integration, and compliance capabilities into a powerful, flexible solution. Connect to 100+ data sources!
Sesame Software's Relational Junction Data Management Suite provides an instant data warehouse in just minutes, and enables secure and efficient data integration between cloud and on-premise applicatio...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
A data loss prevention solution that can control, block and monitor USB devices from having unauthorized access to sensitive data.
WITH DEVICE CONTROL PLUS, YOU CAN: Control, block, and monitor all USB and peripheral devices effortlessly. Eliminate data loss due to unauthorized data transfers. Implement file access control to prevent unprivileged access. Get your work done quickly by granting temporary access to third-party devices when required. Create a trusted device list, and authorize specific devices to access your computer safely.
WITH DEVICE CONTROL PLUS, YOU CAN: Control, block, and monitor all USB and peripheral devices effortlessly. Eliminate data loss due to unauthorized data transfers. Implement file access control t...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Secure your Team's cloud infrastructure, databases, and servers with our affordable Dedicated IP VPN for Teams. Try 14 days for Free.
Perfect for small-medium teams to SECURE their cloud infrastructure, databases, and servers with our affordable Dedicated IP VPN. Say goodbye to manual whitelisting. Phone & Desktop apps. Easy-to-use access control and monitoring. Great price-point! $19/mo per 10 users and 1 Dedicated VPN gateway. Try the 14 days Free Full version - No credit card required.
Perfect for small-medium teams to SECURE their cloud infrastructure, databases, and servers with our affordable Dedicated IP VPN. Say goodbye to manual whitelisting. Phone & Desktop apps. Easy-to-use a...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
User activity monitoring solution that allows you to capture video recording, identify users, and generate textual audit logs.
Provides 24x7 record & replay of all window sessions, whether they are remote access or console access. With support for Terminal Services, Citrix, Remote Desktop, PC-Anywhere, VMware, VNC and NetOP, ObserveIT is agnostic to protocol and to client application. ObserveIT captures textual meta-data during the recording. This detailed information on the state of the OS and the application in use allows you to find relevant user sessions without the need to replay the entire recording.
Provides 24x7 record & replay of all window sessions, whether they are remote access or console access. With support for Terminal Services, Citrix, Remote Desktop, PC-Anywhere, VMware, VNC and NetOP, O...
It defines and manages organization wide security policy, provides embedded enterprise data security and more.
It defines and manages organization wide security policy, provides embedded enterprise data security and more.
It defines and manages organization wide security policy, provides embedded enterprise data security and more....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
All-in-One Solution for Sophisticated Content Analysis and Migration
FileFacets is an online data analytics and content migration tool that automates the categorization of data, the attribution of file metadata, and the migration of unstructured content from multiple sources into Enterprise Content Management systems (ECMs).
FileFacets is an online data analytics and content migration tool that automates the categorization of data, the attribution of file metadata, and the migration of unstructured content from multiple so...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data recovery solution that helps businesses retrieve media as well as documents from hard drives, USB flash disks, SD cards, and more.
Have you accidentally deleted or lost important files? Or does your external or internal drive no longer appear/respond? Our data recovery software can retrieve those priceless photos or videos and important business or school documents for you with a few simple steps.
Have you accidentally deleted or lost important files? Or does your external or internal drive no longer appear/respond? Our data recovery software can retrieve those priceless photos or videos and imp...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Tracking for your data to avoid data leaks and prevent others from using your source code
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it.
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Protect data within company boundaries and beyond
Beyond DLP is a unique and proactive Data Loss Prevention solution. It uses AI, behavior analysis, and deception techniques to secure all stages of digital data and protect against both internal and external threats. Even after data exfiltration, Beyond DLP provides security personnel with detailed forensic information on the breach. Additionally, the solution is quick to implement, requires no endpoint agent, and has zero impact on employee productivity.
Beyond DLP is a unique and proactive Data Loss Prevention solution. It uses AI, behavior analysis, and deception techniques to secure all stages of digital data and protect against both internal and ex...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitor...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
The industry's first and only comprehensive collaboration, chat, and social media security platform.
SafeGuard Cyber is a cloud-based platform that empowers organizations to use social media and digital channels securely, compliantly, and at the scale of global business. With coverage across more than 50 channels, SafeGuard Cyber helps security, compliance, and marketing teams work better together to drive business forward.
SafeGuard Cyber is a cloud-based platform that empowers organizations to use social media and digital channels securely, compliantly, and at the scale of global business. With coverage across more than...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
A data loss prevention solution with features to maintain document security and keep files in the system.
A data loss prevention solution with features to maintain document security and keep files in the system.
A data loss prevention solution with features to maintain document security and keep files in the system....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more.
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more.
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Prevent office or home applications against data leakage with tool that controls devices and blocks threat attacks.
Prevent office or home applications against data leakage with Runtime Application Self Protection (RASP) tool that controls devices and blocks threat attacks.
Prevent office or home applications against data leakage with Runtime Application Self Protection (RASP) tool that controls devices and blocks threat attacks....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Take critical information protection to the next level. Clearswift's Adaptive-DLP is data loss prevention redefined.
Clearswift's Adaptive Data Loss Prevention (A-DLP) technology protects organizations from advanced cyber threats and sensitive data loss, and ensures compliance with data protection regulations. The solution offers an automated, disruption-free and content-aware approach to protecting the unauthorized loss of sensitive data through email, the internet, including cloud collaboration applications, and removable devices. A-DLP includes real-time redaction, encryption, blocking or deleting.
Clearswift's Adaptive Data Loss Prevention (A-DLP) technology protects organizations from advanced cyber threats and sensitive data loss, and ensures compliance with data protection regulations. The so...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data.
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data.
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
MyDLP

MyDLP

(0 reviews)
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage.
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage.
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data protection tool that helps enterprises screen online content and reveal sensitive data through safeguarding confidential data.
Data protection tool that helps enterprises screen online content and reveal sensitive data through safeguarding confidential data.
Data protection tool that helps enterprises screen online content and reveal sensitive data through safeguarding confidential data....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite
EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite
EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite...
Enterprise DLP solution with a lot of functionality for user monitoring and analysis.
Enterprise DLP solution with a lot of functionality for user monitoring and analysis.
Enterprise DLP solution with a lot of functionality for user monitoring and analysis....
Stellar Phoenix Mailbox Exchange Recovery efficiently repairs corrupt Exchange Database (EDB) files.
Stellar Phoenix Mailbox Exchange Recovery software repairs severely corrupt or damaged Microsoft Exchange Server Database (EDB) files efficiently and swiftly. With this powerful software, you can recover all the components of an EDB file including contacts, calendars, emails, attachments journals, and tasks.The software scans corrupt EDB files, repairs them and shows the preview of all recoverable mailbox items. Users can then select the required mailbox items and save it in several formats.
Stellar Phoenix Mailbox Exchange Recovery software repairs severely corrupt or damaged Microsoft Exchange Server Database (EDB) files efficiently and swiftly. With this powerful software, you can recov...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
O365 Manager Plus is the one-stop Office 365 solution with reporting, auditing, monitoring, management, alerting, and delegation capabi
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive for Business, and other Office 365 services from one place. Comply with industrial mandates with detailed audit reports. Create custom roles for cross-tenant and domain-based delegation.Monitor the Office 365 setup 24X7 and receive real-time emailnotifications when service degradation occurs.
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive f...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting