Header banner
Revain logoHome Page

Data Security

All results
wandera logo
Revainrating 5 out of 5

1 Review

The way enterprises work has changed. Data is stored beyond corporate walls, and limitless connections have given rise to remote working. The perimeter has been redefined. This evolving new environment requires a new security model that is cloud-centric. Wandera provides a unified cloud security solution to protect the modern workplace. We enable…

Read more about this company
pradeo security logo
Revainrating 5 out of 5

1 Review

Pradeo answers mobile security requirements with innovative solutions for mobile endpoint protection, in-app self-defense and application security testing to identify security flaws, set a robust security framework and automatically prevent attacks. Pradeo's next generation technology provides a reliable detection of threats, protecting against data…

Read more about this company
ukeysoft foneeraser logo
Revainrating 5 out of 5

1 Review

Mobile Data Security

lenses logo
Revainrating 5 out of 5

1 Review

Lenses.io delivers a developer workspace for building & operating real-time applications on any Apache Kafka. By enabling teams to monitor, investigate, secure and deploy on their data platform, organizations can shift their focus to data-driven business outcomes and help engineers get their weekends back.

clonetab logo
Revainrating 5 out of 5

1 Review

Clonetab provides cloning and refresh of Oracle E-Business Suite and Oracle Database.

rectify logo
Revainrating 5 out of 5

1 Review

Rectify leverages privacy-enabled artificial intelligenceTM to automate the removal of private information when data sharing occurs. We help organizations decrease the human involvement required to identify and remove consumer identities, trade secrets, IP and other private data in data sets that are being sent to third parties.

prey logo
Revainrating 5 out of 5

1 Review

Prey is a software and online platform for mobile device tracking, management, and data protection available for laptops, tablets, and mobiles. It offers a range of services for both personal and corporate use. The software and service are developed by the Chilean company Prey Inc., the successor of the funding company Fork Ltd. The Prey service is the…

Read more about this company
zanti logo
Revainrating 5 out of 5

1 Review

zANTITM is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.

fyde logo
Revainrating 5 out of 5

1 Review

Fyde replaces outdated and costly VPN, SWG and NAC point products with a quick to deploy, easy to manage, unified offering. Fyde helps companies mitigate security and compliance risk, increase user productivity and experience by enabling secure access to corporate applications like Jira, Confluence, Bitbucket, Gitlab, Kibana, MS RDP, SSH and cloud…

Read more about this company
promon shield logo
Revainrating 5 out of 5

1 Review

Promon SHIELD makes it possible to launch effective and secure apps on untrusted devices, without risking data leakage and damage to end-user trust.

sessioncloud logo
Revainrating 5 out of 5

1 Review

A range of mobile softphone application solutions from standalone apps to branded cloud softphones configured and managed from your own secure web portal. All softphone products come with Push Notifications for great battery life, Encryption and HD Voice and Video calling.

ghangorcloud logo
Revainrating 5 out of 5

1 Review

GhangorCloud is a leading provider of Cyber Security solutions enabling defense against most sophisticated Cyber Attacks on Information and Data Repositories and Applications.

gitguardian logo
Revainrating 5 out of 5

1 Review

GitGuardian is a cybersecurity startup solving the issue of secrets sprawling through source code, a widespread problem that leads to some credentials ending up in compromised places or even in the public space. The company solves this issue by automating secrets detection for Application Security and Data Loss Prevention purposes. GitGuardian helps…

Read more about this company
endpoint protector by cososys logo
Revainrating 5 out of 5

1 Review

Endpoint Protector is a leading endpoint centric Data Loss Prevention (DLP) solution. An advanced cross-platform DLP solution for macOS, Windows, and Linux computers as well as Thin Clients, that puts an end to unintentional data leaks, protects from malicious data theft and offers seamless control of portable storage devices. Endpoint Protector by…

Read more about this company
clawback logo
Revainrating 5 out of 5

1 Review

Affordable, flexible data leak monitoring focused on leaked code, configurations and credentials. Minimize the risk from these three common attack vectors. SaaS platform with no hardware or software deployment required. Most clients up and running in less than five minutes. Put ClawBack to work for you today!

evolution dlp logo
Revainrating 5 out of 5

1 Review

Evolution DLP features include: Automatic Encryption (Endpoint Security) Detects and automatically encrypts data moving out of the organization. Encryption protects all avenues of data loss including USB drives, external HDDs, optical media, smartphones, Internet, and email. Whitelist Protection (Cyberattack Prevention) An advanced API-level whitelist…

Read more about this company
hacker combat mydlp suite logo
Revainrating 5 out of 5

1 Review

MYDLP SUITE Data Loss Prevention software keeps your data safe. MYDLP SUITE Data Loss Prevention software secures your customers' data.

killerid logo
Revainrating 5 out of 5

1 Review

KillerID provides Custom Single-Sign-On (SSO) login for G Suite domains. It automates user license provisioning with company Human Resources integration. With KillerID, admin can restrict access via IP, session controls on mobile and desktop. KillerID is 100% based on Google Cloud Platform and passed Google's Security Scan.

aristotleinsight logo
Revainrating 5 out of 5

1 Review

AristotleInsight was built to collect, analyze and store the enormous amounts of UDAPE data necessary to document exactly what occurs at any given moment now or in the past

prosperoware confidentiality manager logo
Revainrating 5 out of 5

1 Review

Confidentiality Manager enables firms to implement β€˜need-to-know’ security and ethical walls without impacting workflow. Robust self-service, industry-leading notifications and acknowledgements, and multi-system design make it the best choice for firms concerned about meeting client security, regulatory, and ethical obligations across all systems where…

Read more about this company
Didn't find what you were looking for?
If you could not find on our platform the desired company or product for which you wanted to write a review, you can create a new page of the company or product and write the first review on it.