Data Security
1 Review
Deter leak of your sensitive information Data leakage identification platform for conducting significant contracts and sharing confidential documents. Every time the user sees information on the screen or prints it out, the system's algorithm displays a unique copy with invisible marks. Visually, the differences between the original and a copy areβ¦
Read more about this company1 Review
Trustifi is a cyber security firm featuring solutions delivered on software as a service platform. Trustifi leads the market with the easiest to use and deploy email security products providing both inbound and outbound email security from a single vendor. The most valuable asset to any organization, other than its employees, is the data contained inβ¦
Read more about this company1 Review
InfoWatch Traffic Monitor is a centralized solution for preventing confidential data leaks and thus eliminating financial losses.
1 Review
DeviceLock provides DLP solutions protecting organizations from data leak threats.
1 Review
1 Review
With Safe-Tβs Secure File Access (SFA), you can prevent data leakage and block threats like ransomware by transforming your standard network drive to a Zero Trust, access-controlled drive.
1 Review
Axiomatics Policy Server is a software for enterprise-wide externalized dynamic authorization, delivered with Attribute Based Access Control (ABAC).
1 Review
EnvKey is a software that prevent insecure sharing and config sprawl. Works as an end-to-end encrypted configuration and secrets management.
1 Review
Privakey Cloud uses the OpenID Connect framework and behaves much like a social login, making it easy to enable for websites, online services, and apps.
1 Review
DB Networks DBN-6300 deep protocol inspection β together with our patented machine learning and behavioral analysis technologies β non-intrusively discovers all of your databases, pinpoints compromised credentials, and protects your data by immediately identifying database attacks.
1 Review
1 Review
The intelligent software reduces your operational effort and finally makes data protection management transparent and easy to integrate into everyday work. In this way you increase the economic success of your company, protect the data of your stakeholders and identify relevant risks.
1 Review
SecretHub helps developers inject passwords and other secrets into applications at runtime, removing the limitations and risks of placing them in static configuration code.
1 Review
Lockr is the first hosted API & encryption key management for modern content management systems like Drupal and WordPress, providing an affordable and easy to deploy solution for all sites to properly manage secrets of all kinds, including API and encryption keys. Lockr's key management solution-as-a-service protects against critical vulnerabilitiesβ¦
Read more about this company1 Review
Absio moves data security to the top of the stack with application-level data security solutions and consulting services