88 results
Why Capterra is free
Complete threat protection and remediation solution, centrally managed from the cloud for organizations of all sizes. Learn more about Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy to use for organizations of all sizes. Learn more about Malwarebytes Endpoint Protection
Malwarebytes Endpoint Protection provides complete malware protection and remediation with precise threat detection, proactive threat blocking, and thorough remediation, driven from the cloud and easy ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Nightfall DLP lets you discover, classify, and protect business-critical data in the cloud and remediate incidents in real-time. Learn more about Nightfall DLP
Nightfall DLP is the industry's first cloud-native data loss prevention solution. Nightfall is designed to effortlessly integrate with corporate SaaS and cloud infrastructure in order to address the problem of data spray across the cloud. With Nightfall you can discover, classify, and protect PII, PCI, PHI, and other business-critical data using high accuracy machine learning based detectors. Additionally, you'll be able to remediate data security incidents in real-time with automated workflows. Learn more about Nightfall DLP
Nightfall DLP is the industry's first cloud-native data loss prevention solution. Nightfall is designed to effortlessly integrate with corporate SaaS and cloud infrastructure in order to address the pr...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP. Device Control & eDiscovery capabilities on Windows, macOS and Linux. Learn more about Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as PCI DSS, HIPAA, GDPR, CCPA etc. Learn more about Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to d...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Kasm Server is a secure virtualized workspace that provides secure browser-based access to desktops, applications, and web services. Learn more about Kasm
Kasm is changing the way that businesses deliver digital workspaces using our Containerized Desktop Infrastructure (CDI) technology to dramatically increase speed, responsiveness, and flexibility. We use a modern DevSecOps approach for programmatic delivery of services that include virtualized desktop infrastructure (VDI), application streaming, and browser isolation in a solution that is highly scalable, customizable, and easy to maintain. Learn more about Kasm
Kasm is changing the way that businesses deliver digital workspaces using our Containerized Desktop Infrastructure (CDI) technology to dramatically increase speed, responsiveness, and flexibility. We ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Employee Monitoring and Intelligent Data Loss Prevention (DLP) Software - Cloud, On-prem, Private Cloud, AWS deployment options Learn more about Teramind DLP
Intelligent Data Loss Prevention: Employee monitoring, user behavior analytics, data loss prevention software in a single platform Powerful and flexible policy and rules engine with web-based management dashboard Out-of-the-box integration to leading SIEM platforms for real-time alerts/action Extensive, customizable reporting Cloud/private-cloud/on-prem deployment options for SMB & Enterprise Meet compliance, monitoring, audit and forensics requirements for GDPR, HIPAA, PCI & more Learn more about Teramind DLP
Intelligent Data Loss Prevention: Employee monitoring, user behavior analytics, data loss prevention software in a single platform Powerful and flexible policy and rules engine with web-based manageme...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications....
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Keep your endpoints secure from ransomware and zeroday threats with an easytouse cloudbased console. ESET PROTECT Advanced bundle includes Endpoint Protection, File Server Security, Cloud Sandbox and Full Disk Encryption.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Hybrid platform that helps firms manage backup, recovery and replication of data across virtual, physical and cloud-based environments.
Built to create backups of vSphere and Hyper-V virtual machines. Offers image-based VM replication, instant VM and file-level recovery.
Built to create backups of vSphere and Hyper-V virtual machines. Offers image-based VM replication, instant VM and file-level recovery....
On-premise and cloud-based software that provides data backup and recovery solutions for Hyper-V, VMware, and AWS EC2 environments.
NAKIVO Backup & Replication is an all-in-one solution that provides businesses of all sizes with cross-platform data protection and site recovery. Protect VMware, Hyper-V, Nutanix AHV VMs, AWS EC2 instances, physical Windows and Linux servers, Windows Workstations, as well as Microsoft Office 365 application data from a single pane of glass. Build a powerful 5-in-1 VM data protection appliance by installing the solution on a NAS device.
NAKIVO Backup & Replication is an all-in-one solution that provides businesses of all sizes with cross-platform data protection and site recovery. Protect VMware, Hyper-V, Nutanix AHV VMs, AWS EC2 inst...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Secure email encryption for businesses of all industries, including healthcare, finance, legal, education, and non-profit.
Our Secure Email Solution is perfect for businesses of all sizes looking to protect both customer and employee personal information, while meeting federal and state-wide email compliance obligations, such as HIPAA / FINRA / FERPA / SEC & SOX. Whether you need to send sensitive emails from your phone, laptop, or tablet, we've got you covered. NeoCertified gives you the flexibility and assured protection that you're looking for. You can even start your free 7-day trial today!
Our Secure Email Solution is perfect for businesses of all sizes looking to protect both customer and employee personal information, while meeting federal and state-wide email compliance obligations, s...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends Backup for all-in-one ease-of-use.
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully integrated backup, replication, deduplication, archive, and instant recovery. Run it on vSphere, Hyper-V, XenServer, or deploy it as a VM within the Azure or AWS cloud. Integrate with our cloud which is purpose-built for effortless, cost-efficient backup, offsite storage, long-term retention and DRaaS
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully int...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
SilverSky provides advanced email protection, compliance and information protection solutions to keep your company and users safe.
Email is the most vulnerable target for cyber threats. And cyber criminals know it. SilverSky protects small and mid-sized businesses with solutions to prevent targeted attacks, social engineering attacks and data exfiltration. With over 20 years of experience serving regulated industries, we have the expertise and skills to ensure your email environment stays safe and compliant with the latest industry regulations.
Email is the most vulnerable target for cyber threats. And cyber criminals know it. SilverSky protects small and mid-sized businesses with solutions to prevent targeted attacks, social engineering att...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities....
Cloud-based cloud security platform that provides application security, behavioral analytics, vulnerability management, and more.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network, Zscaler is transforming enterprise security.
Built 100% in the cloud, the Zscaler global cloud delivers the entire gateway security stack as a service. By securely connecting users to their applications, regardless of device, location, or network...
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage.
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices th...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Device control software. Block USB removable storage devices and other peripherals to secure sensitive data against theft and misuse.
AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol includes device control features for a variety of peripheral devices including USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, and MP3s. File operations alerts and permissions can be configured to alert IT administrators to suspicious file operations and proactively prevent data transfers to unauthorized users.
AccessPatrol is a device control software that provides a proactive solution for securing company endpoints against data breaches caused by illicit data transfers. AccessPatrol includes device control...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Integrated Endpoint Protection Platform, 100% Attestation and Threat Hunting & Investigation Services.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investi...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Behavioral, risk-adaptive security enables proactive threat response and dynamic monitoring and enforcement of data controls.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and dynamically apply monitoring and enforcement controls on web, cloud, email and endpoint. Integrated UAM facilitates real-time risk-scoring based on user activity and data sensitivity, and supports closed-loop investigation and forensics.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and dynamically...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Chimpa MDM is an EMM crossplatform solution that allows to manage, monitor and protect the mobile devices in schools and business.
Chimpa MDM is an EMM (Enterprise Mobility Management) solution that is able to guarantee the control of mobile devices, IFPs and VRs visors because: streamlines management of iOS, iPadOS, tvOS and Android devices with zero-touch deployments; is an Android Enterprise validated solution and it's also completely integrated with Apple services; supports BYOD, COBO, COPE, single purpose device managements (COSU); let IT Admins to manage privacy, policies, apps/content deployment with an easy UX.
Chimpa MDM is an EMM (Enterprise Mobility Management) solution that is able to guarantee the control of mobile devices, IFPs and VRs visors because: streamlines management of iOS, iPadOS, tvOS and Andr...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) tes...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
INKY is powered by computer vision, and machine learning making it the most effective solution in the fight against phishing.
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques and a unique banner technology to identify and block sophisticated phishing emails that legacy email systems cannot detect. INKY works with Microsoft O365, Exchange, and Google Workspace and on all mobile devices.
INKY is powered by unique computer vision, artificial intelligence, and machine learning, making it the most effective solution in the fight against phishing. INKY uses advanced detection techniques an...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Secure your team's remote access to cloud resources, servers, or corporate databases in 10 minutes. $2/user/mo. Try 14 days free!
GoodAccess is the only affordable cloud-based network & security service for business teams. Secure your team's remote access to cloud resources, servers, or corporate databases in 10 minutes. - VPN gateway with team's dedicated IP in 33+ locations worldwide. - Easy whitelisting: 1 static IP shared by 100+ team users. - Phone & desktop app. - Access control. - Access logs and more! Try 14 days free* *No credit card. Fully working version with a real dedicated IP and all features.
GoodAccess is the only affordable cloud-based network & security service for business teams. Secure your team's remote access to cloud resources, servers, or corporate databases in 10 minutes. - VPN g...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive...
FILERECOVERY® recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Easy to use.
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or others, FILERECOVERY will recover your lost data. Easy to use. Recovery is just a few mouse clicks away.
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or ot...
Most preferred CASB vendor for SMBs globally - Single Sign On, Data Loss Prevention, Identity Management, Shadow IT, Access Control,etc
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single Sign On, Data Loss Prevention, Shadow IT, Access Control, Identity Management and more. CloudCOdes is one of the most preferres CASB solution provider by SMBs globally.
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single Sign ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Modern MSP Backup Software: Your Mission Control to Protect Data
Comet Backup provides fast, lightweight backup software for MSPs supporting customers in over 110 countries, in 10 languages. Protect client data with an all-in-one, re-brandable platform to manage backups and recovery. Simple, per device monthly pricing. Only pay for what you use. No contracts, easy deployment and free 30-day trial. Our integration partners include: Amazon AWS, Google Cloud Storage, Microsoft Azure, Backblaze B2, Wasabi, Let’sEncrypt, OpenStack and more.
Comet Backup provides fast, lightweight backup software for MSPs supporting customers in over 110 countries, in 10 languages. Protect client data with an all-in-one, re-brandable platform to manage ba...
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Data management solution that enables businesses to process and deliver real-time data through serialization, access control, and more.
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data, including data from enterprise databases via change data capture. It offers built-in validation, SQL-based stream processing such as filtering, transformations, aggregations, and enrichment, multi-source correlation, complex pattern matching, predictive analytics, and real-time dashboards with alerts.
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data, inclu...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databa...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Relational Database Administration for Multiple Platforms
Manage and secure multiple relational database platforms from a single user interface Manage multiple platforms (Oracle, SQL Server, Db2, Sybase) from one UI Proactively manage space, data and performance with built-in analytics Easily find and fix performance issues using intelligent diagnostics Move schema and table data across different platforms with ease Protect data security with view, grant and revoke of permissions
Manage and secure multiple relational database platforms from a single user interface Manage multiple platforms (Oracle, SQL Server, Db2, Sybase) from one UI Proactively manage space, data and performa...
Exabeam is SIEM that helps security operations and insider threat teams work smarter.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations no longer have to live with missed distributed attacks, unknown threats, and manual investigations and remediation. With the modular Exabeam Security Management Platform, analysts can use behavioral analytics to detect attacks, automate investigation and incident response, and reduce storage costs.
Exabeam is SIEM that helps security operations and insider threat teams work smarter, allowing them to detect, investigate, and respond to cyberattacks in 51 percent less time. Security organizations n...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Cloud data management providing instant data warehousing, replication, integration, and backup and recovery for 100+ data sources.
Sesame Software's Relational Junction Data Management Suite provides an instant data warehouse in just minutes, and enables secure and efficient data integration between cloud and on-premise applications for robust reporting and analytics. With patented scalability and multithreaded technology, Relational Junction combines data warehousing, replication, integration, and compliance capabilities into a powerful, flexible solution. Connect to 100+ data sources!
Sesame Software's Relational Junction Data Management Suite provides an instant data warehouse in just minutes, and enables secure and efficient data integration between cloud and on-premise applicatio...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
A data security product that allows users to detect, protect, and correct data in the cloud.
A data security product that allows users to detect, protect, and correct data in the cloud.
A data security product that allows users to detect, protect, and correct data in the cloud....
A data loss prevention solution that can control, block and monitor USB devices from having unauthorized access to sensitive data.
WITH DEVICE CONTROL PLUS, YOU CAN: Control, block, and monitor all USB and peripheral devices effortlessly. Eliminate data loss due to unauthorized data transfers. Implement file access control to prevent unprivileged access. Get your work done quickly by granting temporary access to third-party devices when required. Create a trusted device list, and authorize specific devices to access your computer safely.
WITH DEVICE CONTROL PLUS, YOU CAN: Control, block, and monitor all USB and peripheral devices effortlessly. Eliminate data loss due to unauthorized data transfers. Implement file access control t...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Protect data within company boundaries and beyond
Beyond DLP is a unique and proactive Data Loss Prevention solution. It uses AI, behavior analysis, and deception techniques to secure all stages of digital data and protect against both internal and external threats. Even after data exfiltration, Beyond DLP provides security personnel with detailed forensic information on the breach. Additionally, the solution is quick to implement, requires no endpoint agent, and has zero impact on employee productivity.
Beyond DLP is a unique and proactive Data Loss Prevention solution. It uses AI, behavior analysis, and deception techniques to secure all stages of digital data and protect against both internal and ex...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
User activity monitoring solution that allows you to capture video recording, identify users, and generate textual audit logs.
Provides 24x7 record & replay of all window sessions, whether they are remote access or console access. With support for Terminal Services, Citrix, Remote Desktop, PC-Anywhere, VMware, VNC and NetOP, ObserveIT is agnostic to protocol and to client application. ObserveIT captures textual meta-data during the recording. This detailed information on the state of the OS and the application in use allows you to find relevant user sessions without the need to replay the entire recording.
Provides 24x7 record & replay of all window sessions, whether they are remote access or console access. With support for Terminal Services, Citrix, Remote Desktop, PC-Anywhere, VMware, VNC and NetOP, O...
It defines and manages organization wide security policy, provides embedded enterprise data security and more.
It defines and manages organization wide security policy, provides embedded enterprise data security and more.
It defines and manages organization wide security policy, provides embedded enterprise data security and more....
All-in-One Solution for Sophisticated Content Analysis and Migration
FileFacets is an online data analytics and content migration tool that automates the categorization of data, the attribution of file metadata, and the migration of unstructured content from multiple sources into Enterprise Content Management systems (ECMs).
FileFacets is an online data analytics and content migration tool that automates the categorization of data, the attribution of file metadata, and the migration of unstructured content from multiple so...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Enterprise DLP solution with a lot of functionality for user monitoring and analysis.
Enterprise DLP solution with a lot of functionality for user monitoring and analysis.
Enterprise DLP solution with a lot of functionality for user monitoring and analysis....
Data recovery solution that helps businesses retrieve media as well as documents from hard drives, USB flash disks, SD cards, and more.
Have you accidentally deleted or lost important files? Or does your external or internal drive no longer appear/respond? Our data recovery software can retrieve those priceless photos or videos and important business or school documents for you with a few simple steps.
Have you accidentally deleted or lost important files? Or does your external or internal drive no longer appear/respond? Our data recovery software can retrieve those priceless photos or videos and imp...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Tracking for your data to avoid data leaks and prevent others from using your source code
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it.
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Somansa provides total data loss prevention to monitor, prevent, and discover sensitive data in emails, cloud, social media, and USBs.
Founded in 1997 with its America headquarter office in San Jose, California, Somansa is a global leader in Data Loss Prevention security to protect sensitive data and help meet regulatory compliance requirements. Somansa provides its worldwide customers in Financial, Healthcare, Manufacturing, Telecom/Media, and Government with a total DLP solution to Monitor, Prevent, and Discover sensitive data in motion, Emails, Cloud and at rest, USBs, Printing, etc.
Founded in 1997 with its America headquarter office in San Jose, California, Somansa is a global leader in Data Loss Prevention security to protect sensitive data and help meet regulatory compliance re...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitor...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Compliant, easy to use, and instant access cloud storage solution.
Compliant, easy to use, and instant access cloud storage solution.
Compliant, easy to use, and instant access cloud storage solution....
The industry's first and only comprehensive collaboration, chat, and social media security platform.
SafeGuard Cyber is a digital risk protection platform purpose-built for collaboration, mobile chat, and social media applications.
SafeGuard Cyber is a digital risk protection platform purpose-built for collaboration, mobile chat, and social media applications....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking
A data loss prevention solution with features to maintain document security and keep files in the system.
A data loss prevention solution with features to maintain document security and keep files in the system.
A data loss prevention solution with features to maintain document security and keep files in the system....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Tracking