67 results
Why Capterra is free
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP. Device Control & eDiscovery capabilities on Windows, macOS and Linux. Learn more about Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as PCI DSS, HIPAA, GDPR, CCPA etc. Learn more about Endpoint Protector
Data Loss Prevention - Industry-Leading Mac & Cross-Platform DLP solution for Enterprises, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to d...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc. Learn more about Prey
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Learn more about DriveStrike
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Learn more about DriveStrike
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices th...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
The industry's first and only comprehensive collaboration, chat, and social media security platform. Learn more about SafeGuard Cyber
SafeGuard Cyber is a cloud-based platform that empowers organizations to use social media and digital channels securely, compliantly, and at the scale of global business. With coverage across more than 50 channels, SafeGuard Cyber helps security, compliance, and marketing teams work better together to drive business forward. Learn more about SafeGuard Cyber
SafeGuard Cyber is a cloud-based platform that empowers organizations to use social media and digital channels securely, compliantly, and at the scale of global business. With coverage across more than...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications.
Cloud Platform is a set of modular cloud-based services that allow you to create anything from simple websites to complex applications....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability.
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botne...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Prevent data loss and corruption in virtual, physical, cloud and SaaS environments.
NAKIVO Backup & Replication helps prevent any potential data loss or corruption in virtual, physical, cloud and SaaS environments. Keep copies of your data on-site and off-site ¿ on tape or in the AWS/Azure clouds. Use the software to perform both full and incremental backup copy to tape. Combine several storage options to eliminate a single point of failure and ensure reliable data protection.
NAKIVO Backup & Replication helps prevent any potential data loss or corruption in virtual, physical, cloud and SaaS environments. Keep copies of your data on-site and off-site ¿ on tape or in the AWS/...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Employee Monitoring and Intelligent Data Loss Prevention (DLP) Software - Cloud, On-prem, Private Cloud, AWS deployment options
-Intelligent Data Loss Prevention: Employee monitoring, user behavior analytics, data loss prevention software in a single platform -Powerful and flexible policy and rules engine with web-based management dashboard -Out-of-the-box integration to leading SIEM platforms for real-time alerts/action -Extensive, customizable reporting -Cloud/private-cloud/on-prem deployment options for SMB & Enterprise -Meet compliance, monitoring, audit and forensics requirements for GDPR, HIPAA, PCI & more
-Intelligent Data Loss Prevention: Employee monitoring, user behavior analytics, data loss prevention software in a single platform -Powerful and flexible policy and rules engine with web-based managem...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
NeoCertified provides an essential component for your DLP strategy: a trusted secure email solution for businesses of all industries.
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives you the flexibility and assured protection that you're looking for in an encryption provider. An included Microsoft Outlook-integrated button, a 24/7 customer support team, and commercial-grade encryption -- NeoCertified 's the upgrade your DLP solution has needed. Receive a personalized quote.
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives you...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends Backup for all-in-one ease-of-use.
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully integrated backup, replication, deduplication, archive, and instant recovery. Run it on vSphere, Hyper-V, XenServer, or deploy it as a VM within the Azure or AWS cloud. Integrate with our cloud which is purpose-built for effortless, cost-efficient backup, offsite storage, long-term retention and DRaaS
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully int...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data Control is designed to assist in complying with data protection regulations, as well as discovering and protecting sensitive data.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investi...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Chimpa MDM is an EMM crossplatform solution that allows to manage, monitor and protect the mobile devices in schools and business.
Chimpa MDM is an EMM (Enterprise Mobility Management) solution that is able to guarantee the control of mobile devices, IFPs and VRs visors because: streamlines management of iOS, iPadOS, tvOS and Android devices with zero-touch deployments; is an Android Enterprise validated solution and it's also completely integrated with Apple services; supports BYOD, COBO, COPE, single purpose device managements (COSU); let IT Admins to manage privacy, policies, apps/content deployment with an easy UX.
Chimpa MDM is an EMM (Enterprise Mobility Management) solution that is able to guarantee the control of mobile devices, IFPs and VRs visors because: streamlines management of iOS, iPadOS, tvOS and Andr...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Behavioral, risk-adaptive security enables proactive threat response and dynamic monitoring and enforcement of data controls.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and dynamically apply monitoring and enforcement controls on web, cloud, email and endpoint. Integrated UAM facilitates real-time risk-scoring based on user activity and data sensitivity, and supports closed-loop investigation and forensics.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and dynamically...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) tes...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
FILERECOVERY® recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Easy to use.
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or others, FILERECOVERY will recover your lost data. Easy to use. Recovery is just a few mouse clicks away.
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or ot...
Most preferred CASB vendor for SMBs globally - Single Sign On, Data Loss Prevention, Identity Management, Shadow IT, Access Control,etc
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single Sign On, Data Loss Prevention, Shadow IT, Access Control, Identity Management and more. CloudCOdes is one of the most preferres CASB solution provider by SMBs globally.
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single Sign ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions.
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data management solution that enables businesses to process and deliver real-time data through serialization, access control, and more.
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data, including data from enterprise databases via change data capture. It offers built-in validation, SQL-based stream processing such as filtering, transformations, aggregations, and enrichment, multi-source correlation, complex pattern matching, predictive analytics, and real-time dashboards with alerts.
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data, inclu...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databa...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Security management and operations platform with detection, analytics, and response capabilities.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smart...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
A data loss prevention solution that can control, block and monitor USB devices from having unauthorized access to sensitive data.
WITH DEVICE CONTROL PLUS, YOU CAN: Control, block, and monitor all USB and peripheral devices effortlessly. Eliminate data loss due to unauthorized data transfers. Implement file access control to prevent unprivileged access. Get your work done quickly by granting temporary access to third-party devices when required. Create a trusted device list, and authorize specific devices to access your computer safely.
WITH DEVICE CONTROL PLUS, YOU CAN: Control, block, and monitor all USB and peripheral devices effortlessly. Eliminate data loss due to unauthorized data transfers. Implement file access control t...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
User activity monitoring solution that allows you to capture video recording, identify users, and generate textual audit logs.
Provides 24x7 record & replay of all window sessions, whether they are remote access or console access. With support for Terminal Services, Citrix, Remote Desktop, PC-Anywhere, VMware, VNC and NetOP, ObserveIT is agnostic to protocol and to client application. ObserveIT captures textual meta-data during the recording. This detailed information on the state of the OS and the application in use allows you to find relevant user sessions without the need to replay the entire recording.
Provides 24x7 record & replay of all window sessions, whether they are remote access or console access. With support for Terminal Services, Citrix, Remote Desktop, PC-Anywhere, VMware, VNC and NetOP, O...
It defines and manages organization wide security policy, provides embedded enterprise data security and more.
It defines and manages organization wide security policy, provides embedded enterprise data security and more.
It defines and manages organization wide security policy, provides embedded enterprise data security and more....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data recovery solution that helps businesses retrieve media as well as documents from hard drives, USB flash disks, SD cards, and more.
Have you accidentally deleted or lost important files? Or does your external or internal drive no longer appear/respond? Our data recovery software can retrieve those priceless photos or videos and important business or school documents for you with a few simple steps.
Have you accidentally deleted or lost important files? Or does your external or internal drive no longer appear/respond? Our data recovery software can retrieve those priceless photos or videos and imp...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Tracking for your data to avoid data leaks and prevent others from using your source code
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it.
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source ...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Protect data within company boundaries and beyond
Beyond DLP is a unique and proactive Data Loss Prevention solution. It uses AI, behavior analysis, and deception techniques to secure all stages of digital data and protect against both internal and external threats. Even after data exfiltration, Beyond DLP provides security personnel with detailed forensic information on the breach. Additionally, the solution is quick to implement, requires no endpoint agent, and has zero impact on employee productivity.
Beyond DLP is a unique and proactive Data Loss Prevention solution. It uses AI, behavior analysis, and deception techniques to secure all stages of digital data and protect against both internal and ex...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
DataSecurity Plus offers data discovery and real-time server auditing, alerting, and reporting.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitors file integrity; streamlines compliance requirements; generates instant, user-defined email alerts; finds sensitive personal data (PII/ePHI) stored in files, folders, or shares; and automatically executes predefined responses when security threats such as ransomware attacks occur.
DataSecurity Plus is a data visibility and security solution that offers data discovery, file storage analysis, and real-time Windows file server auditing, alerting & reporting. Furthermore, it monitor...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost.
Provides both contextual and content-based control for maximum leakage prevention at minimum upfront and ownership cost....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
A data loss prevention solution with features to maintain document security and keep files in the system.
A data loss prevention solution with features to maintain document security and keep files in the system.
A data loss prevention solution with features to maintain document security and keep files in the system....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more.
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more.
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Prevent office or home applications against data leakage with tool that controls devices and blocks threat attacks.
Prevent office or home applications against data leakage with Runtime Application Self Protection (RASP) tool that controls devices and blocks threat attacks.
Prevent office or home applications against data leakage with Runtime Application Self Protection (RASP) tool that controls devices and blocks threat attacks....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Take critical information protection to the next level. Clearswift's Adaptive-DLP is data loss prevention redefined.
Clearswift's Adaptive Data Loss Prevention (A-DLP) technology protects organizations from advanced cyber threats and sensitive data loss, and ensures compliance with data protection regulations. The solution offers an automated, disruption-free and content-aware approach to protecting the unauthorized loss of sensitive data through email, the internet, including cloud collaboration applications, and removable devices. A-DLP includes real-time redaction, encryption, blocking or deleting.
Clearswift's Adaptive Data Loss Prevention (A-DLP) technology protects organizations from advanced cyber threats and sensitive data loss, and ensures compliance with data protection regulations. The so...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data.
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data.
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
MyDLP

MyDLP

(0 reviews)
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage.
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage.
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data protection tool that helps enterprises screen online content and reveal sensitive data through safeguarding confidential data.
Data protection tool that helps enterprises screen online content and reveal sensitive data through safeguarding confidential data.
Data protection tool that helps enterprises screen online content and reveal sensitive data through safeguarding confidential data....
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite
EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite
EncryptRIGHT is multi-purpose data encryption, tokenization and key management software suite...
Enterprise DLP solution with a lot of functionality for user monitoring and analysis.
Enterprise DLP solution with a lot of functionality for user monitoring and analysis.
Enterprise DLP solution with a lot of functionality for user monitoring and analysis....
Stellar Phoenix Mailbox Exchange Recovery efficiently repairs corrupt Exchange Database (EDB) files.
Stellar Phoenix Mailbox Exchange Recovery software repairs severely corrupt or damaged Microsoft Exchange Server Database (EDB) files efficiently and swiftly. With this powerful software, you can recover all the components of an EDB file including contacts, calendars, emails, attachments journals, and tasks.The software scans corrupt EDB files, repairs them and shows the preview of all recoverable mailbox items. Users can then select the required mailbox items and save it in several formats.
Stellar Phoenix Mailbox Exchange Recovery software repairs severely corrupt or damaged Microsoft Exchange Server Database (EDB) files efficiently and swiftly. With this powerful software, you can recov...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
O365 Manager Plus is the one-stop Office 365 solution with reporting, auditing, monitoring, management, alerting, and delegation capabi
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive for Business, and other Office 365 services from one place. Comply with industrial mandates with detailed audit reports. Create custom roles for cross-tenant and domain-based delegation.Monitor the Office 365 setup 24X7 and receive real-time emailnotifications when service degradation occurs.
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive f...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs.
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-leve...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Data protection solution that applies encryption, tokenization, and anonymization policies to ensure secure storage of sensitive data.
Data protection solution that applies encryption, tokenization, and anonymization policies to ensure secure storage of sensitive data and documents.
Data protection solution that applies encryption, tokenization, and anonymization policies to ensure secure storage of sensitive data and documents....
NIST based DLP and DCAP solution available in the cloud. Use to comply with HIPAA, GDPR and CCPA.
NIST based DLP and DCAP solution available in the cloud. Use to comply with HIPAA, GDPR and CCPA.
NIST based DLP and DCAP solution available in the cloud. Use to comply with HIPAA, GDPR and CCPA....
Comprehensive data protection suite that includes leading data discovery and classification that powers world-class data protection
Dathena's Guardian Suite allows users to address important data loss issues efficiently by helping organisations perform data discovery and classification according to document type and confidentiality, labelling documents as such and integrating seamlessly with third-party DLP tools and other risk management solutions (IRM, RMS etc.). Separately, Dathena Guardian Suite also helps companies reduce data management costs by identifying duplicates throughout all information repositories.
Dathena's Guardian Suite allows users to address important data loss issues efficiently by helping organisations perform data discovery and classification according to document type and confidentiality...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
Automatic, SaaS backup, and on-demand restore
Quit playing lost and found with your data. Achieve data protection greatness with AvePoints full-fidelity backup and recovery, automatic and on-demand backups, and top-notch Microsoft Azure Encryption.
Quit playing lost and found with your data. Achieve data protection greatness with AvePoints full-fidelity backup and recovery, automatic and on-demand backups, and top-notch Microsoft Azure Encryption...
Protect sensitive data and intervene to prevent data loss. Detect sophisticated threats from internal or external actors.
Protect sensitive data and intervene to prevent data loss. Detect sophisticated threats from internal or external actors to reduce risk of data loss. Accelerate forensic investigations, and reduce false positives, ensuring that resources are spent on alerts most likely to be fraudulent.
Protect sensitive data and intervene to prevent data loss. Detect sophisticated threats from internal or external actors to reduce risk of data loss. Accelerate forensic investigations, and reduce fals...
  • Whitelisting/Blacklisting
  • Policy Management
  • Web Threat Management
  • Incident Management
  • Sensitive Data Identification
  • Compliance Reporting
iBoysoft Mac Data Recovery is a user-friendly data recovery tool capable of recovering photos, videos, documents, music, documents.
iBoysoft Mac Data Recovery is a user-friendly data recovery tool capable of recovering photos, videos, documents, music, documents.
iBoysoft Mac Data Recovery is a user-friendly data recovery tool capable of recovering photos, videos, documents, music, documents....