Filter Results (50)
- Cloud, SaaS, Web (30)
- Installed - Mac (14)
- Installed - Windows (25)
- Mobile - Android Native (3)
- Mobile - iOS Native (4)
- Access Control (5)
- Behavioral Analytics (6)
- Compliance Reporting (23)
- Encryption (6)
- Incident Management (16)
- Policy Management (13)
- Real Time Monitoring (6)
- Sensitive Data Identification (22)
- Web Threat Management (8)
- Whitelisting/Blacklisting (17)
Remote wipe, lock, and locate for all operating systems. DriveStrike is a data & device protection solution for devices that are lost, stolen, missing, or retired. It empowers you to protect devices that have escaped your control, to prevent data compromise. From personal accounts to Fortune 500 organizations in healthcare, legal, financial services, government, e-commerce, and entertainment, DriveStrike prevents data breaches to secure confidentiality, compliance, and competitive advantage. Learn more about DriveStrike Computer & mobile remote wipe, lock, and locate for all operating systems and hardware. Learn more about DriveStrike
Endpoint Protector is a Data Loss Prevention solution for Enterprise and Small-Medium businesses, available as hardware and virtual appliance, or as cloud infrastructure. Endpoint Protector puts an end to data leaks and data theft and offers seamless control of portable storage devices. It's content filtering capabilities for data at rest and in motion range from file type to predefined content based on dictionaries, regular expressions or regulations such as GDPR, PCI DSS, CCPA, HIPAA etc. Learn more about Endpoint Protector Data Loss Prevention. Device Control and eDiscovery capabilities on Windows, macOS and Linux Learn more about Endpoint Protector
If managing backups is just one of your countless responsibilities in IT, then consider Unitrends for all-in-one ease-of-use. Unitrends Backup Software is a prepackaged virtual appliance with fully integrated backup, replication, deduplication, archive, and instant recovery. Run it on vSphere, Hyper-V, XenServer, or deploy it as a VM within the Azure or AWS cloud. Integrate with our cloud which is purpose-built for effortless, cost-efficient backup, offsite storage, long-term retention and DRaaS Learn more about Unitrends Backup If managing backups is just one of your countless responsibilities in IT, then consider Unitrends Backup for all-in-one ease-of-use. Learn more about Unitrends Backup
WITH DEVICE CONTROL PLUS, YOU CAN: Control, block, and monitor all USB and peripheral devices effortlessly. Eliminate data loss due to unauthorized data transfers. Implement file access control to prevent unprivileged access. Get your work done quickly by granting temporary access to third-party devices when required. Create a trusted device list, and authorize specific devices to access your computer safely. Learn more about ManageEngine Device Control Plus A data loss prevention solution that can control, block and monitor USB devices from having unauthorized access to sensitive data. Learn more about ManageEngine Device Control Plus
Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware using anti-spyware, anti-phishing, web control, anti-spam, and botnet protection with remote management capability. Endpoint security tool that eliminates various types of threats, including viruses, malware, ransomware, rootkits, worms and spyware.
NeoCertified's secure email solution is an essential piece for your DLP strategy for businesses looking to protect confidential information, while meeting compliance obligations. NeoCertified gives you the flexibility and assured protection that you're looking for in an encryption provider. An included Microsoft Outlook-integrated button, a 24/7 customer support team, and commercial-grade encryption -- NeoCertified 's the upgrade your DLP solution has needed. Receive a personalized quote. NeoCertified provides an essential component for your DLP strategy: a trusted secure email solution for businesses of all industries.
DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies. DLP app that protects intellectual property or financial data from unexpected disappearance via virtual data protection policies.
Symantec Data Loss Prevention (DLP) provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities. Provides a comprehensive approach to information protection that embraces todays cloud- and mobile-centered realities.
Prey is a software and online platform for mobile device tracking, management, and protection available for laptops, tablets, and mobiles. The software and service are developed by the Chilean company Prey Inc. Prey is a mobile security, management and data protection platform for both enterprises and personal use, developed by Prey Inc.
Ensures surveillance covering all popular data transfer and communication channels, including email, social media, messengers, apps (Skype), upload to external storages and sending files to a printer. Protects data at rest, in use and in transit, controls remote access, enables data encryption and provides you with a toolset for independent investigation and reports demonstrating weak spots in your company. Comprehensive solution for protecting businesses from corporate fraud, employee negligence, sabotage, insider activity and data misuse.
Panda Adaptive Defense 360 is an advanced cybersecurity suite that integrates Endpoint Protection and Endpoint Detection and Response (EDR) solutions, with 100% Attestation and Threat Hunting & Investigation Services, all delivered via a single lightweight agent. The combination of these solutions, modules and services provides a highly detailed visibility of all endpoint activity, n absolute control of all running processes, and the reduction of the attack surface. Data Control is designed to assist in complying with data protection regulations, as well as discovering and protecting sensitive data.
Elevate to new levels of security with Forcepoint Dynamic Data Protection by mitigating risk to critical data and assets. Leverage behavioral analytics to proactively respond to threats and dynamically apply monitoring and enforcement controls on web, cloud, email and endpoint. Integrated UAM facilitates real-time risk-scoring based on user activity and data sensitivity, and supports closed-loop investigation and forensics. Behavioral, risk-adaptive security enables proactive threat response and dynamic monitoring and enforcement of data controls.
Commvault Orchestrate provides automated service delivery technology that enables users to provision, sync and validate data in any environment for important IT needs such as disaster recovery (DR) testing, Dev/Test operations and workload migrations. Orchestrate allows customers to extend the value of their data sitting in secondary storage, meaning operations that were previously manual can now be orchestrated and automated, saving customers valuable time and money. Web-based tool that allows provisioning, syncing and migrating data across environments and manage organizational needs.
FILERECOVERY recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Whether you need to recover files from a hard rive, flash drive, GoPro camera or others, FILERECOVERY will recover your lost data. Easy to use. Recovery is just a few mouse clicks away. FILERECOVERY® recovers deleted and lost files from all types of media, including hard drives, flash drives and more. Easy to use.
Bridging the SECURITY gap between the enterprise and cloud with seamlessly integrated CASB solutions agile enough to suit all industry verticals. One integrated for multiple solutions like Single Sign On, Data Loss Prevention, Shadow IT, Access Control, Identity Management and more. CloudCOdes is one of the most preferres CASB solution provider by SMBs globally. Most preferred CASB vendor for SMBs globally - Single Sign On, Data Loss Prevention, Identity Management, Shadow IT, Access Control,etc
Optimal mix of UEBA, Insider threat detection and response with machine learning and a policy engine, DLP with content inspection and automated response actions. Machine learning & policy engine provide threat detection & response. Also used for threat hunting & automated security training.
Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications. Designed for SMBs and with service providers in mind Cross Platform Hybrid Solution Archive, Backup, or Duplicate Data Central management and Endpoint Protection Protects Physical and Virtual environments Affordable and Flexible licensing model Disk, Tape and Cloud support Backup and disaster recovery protection for servers, desktops, notebooks, and business-critical applications.
Striim combines real-time data integration, stream analytics, and visualization in a single platform. It continuously ingests a wide variety of semi-structured, unstructured, and structured data, including data from enterprise databases via change data capture. It offers built-in validation, SQL-based stream processing such as filtering, transformations, aggregations, and enrichment, multi-source correlation, complex pattern matching, predictive analytics, and real-time dashboards with alerts. Data management solution that enables businesses to process and deliver real-time data through serialization, access control, and more.
Centrally managed system that scans for sensitive data such as social security numbers for data at rest. DataSense can take an inventory of the sensitive data that is lurking in your network and databases, and alert you which servers are the culprits. There is no need to install endpoints as DataSense's architecture allows for central management without the pain of trying to install agents for reporting. Centrally managed system that scans for sensitive data such as social security numbers for data at rest.
Exabeam Security Management Platform (SMP) empowers enterprises to detect, investigate, and respond to cyberattacks more efficiently so their security operations and insider threat teams can work smarternot harder. Equipped with the Exabeam Security Management Platform, analysts can collect unlimited log data, use behavioral analytics to detect attacks, and automate incident responsesboth on-premises or in the cloud. Security management and operations platform with detection, analytics, and response capabilities.
Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration. Data protection system for Windows, Mac, or Linux. Analyzes inbound and outbound data and stops malware penetration.
All-in-one Visual Search + DRM + DLP solution for image and video, based on Digital Watermarking. Designed for Brands, Corporate, Media and businesses relying on visual content. Protects and monitors visual content via a patented invisible watermark, reporting on its location, whether print or online. From identifying the source of damaging product leaks to shutting down illegal counterfeiters, to market intelligence and earned media, every usage of your visuals is identified and reported. Protects and monitors visual content via a patented invisible watermark, reporting on its location, whether print or online.
Provides 24x7 record & replay of all window sessions, whether they are remote access or console access. With support for Terminal Services, Citrix, Remote Desktop, PC-Anywhere, VMware, VNC and NetOP, ObserveIT is agnostic to protocol and to client application. ObserveIT captures textual meta-data during the recording. This detailed information on the state of the OS and the application in use allows you to find relevant user sessions without the need to replay the entire recording. User activity monitoring solution that allows you to capture video recording, identify users, and generate textual audit logs.
Have you accidentally deleted or lost important files? Or does your external or internal drive no longer appear/respond? Our data recovery software can retrieve those priceless photos or videos and important business or school documents for you with a few simple steps. Our data recovery software can retrieve photos or videos and important business or school documents for you with a few simple steps.
Nowadays source code becomes the most valuable asset of the companies worldwide. Companies sign NDAs with their employees, but it doesn't work, as it's very hard to know who and how using your source code. There is no reason to trust your employees unless you check them. Hivecode helps companies to keep an eye on their digital assets and track web applications and software usage. No longer worries about copying web design of your web site, you will know in seconds about it. Tracking for your data to avoid data leaks and prevent others from using your source code
Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more. Data management platform that helps collect, manage and protect customer data through multi-factor authentication, encryption & more.
Prevent office or home applications against data leakage with Runtime Application Self Protection (RASP) tool that controls devices and blocks threat attacks. Prevent office or home applications against data leakage with tool that controls devices and blocks threat attacks.
Clearswift's Adaptive Data Loss Prevention (A-DLP) technology protects organizations from advanced cyber threats and sensitive data loss, and ensures compliance with data protection regulations. The solution offers an automated, disruption-free and content-aware approach to protecting the unauthorized loss of sensitive data through email, the internet, including cloud collaboration applications, and removable devices. A-DLP includes real-time redaction, encryption, blocking or deleting. Take critical information protection to the next level. Clearswift's Adaptive-DLP is data loss prevention redefined.
DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data. DLP system that controls enterprises online communication, stops HTTP, HTTPS and FTP policies entering, and detects sensitive data.
System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage. System that protects office applications from internal or external data loss, detects private data, and alerts about possible leakage.
Data protection tool that helps enterprises screen online content and reveal sensitive data through safeguarding confidential data. Data protection tool that helps enterprises screen online content and reveal sensitive data through safeguarding confidential data.
Stellar Phoenix Mailbox Exchange Recovery software repairs severely corrupt or damaged Microsoft Exchange Server Database (EDB) files efficiently and swiftly. With this powerful software, you can recover all the components of an EDB file including contacts, calendars, emails, attachments journals, and tasks.The software scans corrupt EDB files, repairs them and shows the preview of all recoverable mailbox items. Users can then select the required mailbox items and save it in several formats. Stellar Phoenix Mailbox Exchange Recovery efficiently repairs corrupt Exchange Database (EDB) files.
O365 Manager Plus is a reporting, auditing, monitoring, management, and alerting solution for Office 365. With this solution, easily administer Exchange Online, Azure AD, Skype for Business, OneDrive for Business, and other Office 365 services from one place. Comply with industrial mandates with detailed audit reports. Create custom roles for cross-tenant and domain-based delegation.Monitor the Office 365 setup 24X7 and receive real-time emailnotifications when service degradation occurs. O365 Manager Plus is the one-stop Office 365 solution with reporting, auditing, monitoring, management, alerting, and delegation capabi
Humming Heads Evolution DLP (data loss prevention) includes: 1. Automatic Encryption: Detects and automatically encrypts data moving out of the organization. 2. Whitelist Protection: Advanced API-level whitelist protects computers from malware, targeted attacks, and phishing. 3. Write Control: Shuts off outbound transfers and writes of all files, by all programs, through all pathways unless permitted. 4. Operation History: Records every detailed user and program action on all PCs. Humming Heads Evolution DLP provides strong encryption, detailed forensic tools, kernel-level whitelisting, and robust write controls.
Data protection solution that applies encryption, tokenization, and anonymization policies to ensure secure storage of sensitive data and documents. Data protection solution that applies encryption, tokenization, and anonymization policies to ensure secure storage of sensitive data.
Dathena's Guardian Suite allows users to address important data loss issues efficiently by helping organisations perform data discovery and classification according to document type and confidentiality, labelling documents as such and integrating seamlessly with third-party DLP tools and other risk management solutions (IRM, RMS etc.). Separately, Dathena Guardian Suite also helps companies reduce data management costs by identifying duplicates throughout all information repositories. Comprehensive data protection suite that includes leading data discovery and classification that powers world-class data protection
Quit playing lost and found with your data. Achieve data protection greatness with AvePoints full-fidelity backup and recovery, automatic and on-demand backups, and top-notch Microsoft Azure Encryption. Automatic, SaaS backup, and on-demand restore
iBoysoft Mac Data Recovery is a user-friendly data recovery tool capable of recovering photos, videos, documents, music, documents. iBoysoft Mac Data Recovery is a user-friendly data recovery tool capable of recovering photos, videos, documents, music, documents.
Founded in 1997 with its America headquarter office in San Jose, California, Somansa is a global leader in Data Loss Prevention security to protect sensitive data and help meet regulatory compliance requirements. Somansa provides its worldwide customers in Financial, Healthcare, Manufacturing, Telecom/Media, and Government with a total DLP solution to Monitor, Prevent, and Discover sensitive data in motion, Emails, Cloud and at rest, USBs, Printing, etc. Somansa provides total data loss prevention to monitor, prevent, and discover sensitive data in emails, cloud, social media, and USBs.
Data protection tool that provides SMBs with document creation & management, order processing, event management and privacy breakdown. Data protection tool that provides SMBs with document creation & management, order processing, event management and privacy breakdown.
Arcserve Continuous Availability synchronizes the data on your Windows and Linux systems with a second physical or virtual system that you provision locally, at a remote location, or in the cloud. Once synchronized, byte-level changes are continuously replicated from your production system to the replica system, providing constant protection to keep data and information accurate, and systems operational Business continuity solution that protects and your data in both physical and virtual environments.