Introducing G2.ai, the future of software buying.Try now

Best Data-Centric Security Software

Lauren Worth
LW
Researched and written by Lauren Worth

Data-centric security software focuses on securing the data itself, rather than the infrastructure or application used to store or access that data. This approach differs from a traditional network (or perimeter-centric) security approach, which focuses on protecting the locations where data is accessed or stored, such as servers, networks, applications, and devices.

This software can be used to achieve a zero trust security model and safeguard data across complex IT environments, including cloud environments. Businesses use data-centric security solutions to protect data when it’s in transit, at rest, or in use.

Core capabilities of data-centric security software include the discovery of sensitive data, policy management, access control, encryption, data obfuscation processes such as data masking, and monitoring data access and usage for suspicious behaviors. Additionally, these tools facilitate the labeling, tagging, and tracking of sensitive data points as well as auditing for security and compliance assurance.

Certain functionalities of data-centric security tools may be similar to those of data governance software, mainly in terms of compliance and policy enforcement. While that is an important functionality, data-centric security tools are intended primarily for data lifecycle management rather than for data security. Sensitive data discovery software is a subset of a broader functionality offered by data-centric security software and specializes in discovering sensitive data.

To qualify for inclusion in the Data-Centric Security category, a product must:

Provide sensitive data discovery functionality
Support data classification with the tagging and auditing of sensitive information
Enforce access control policies for sensitive information
Offer encryption for data at rest and in transit
Monitor for abnormalities related to information access and user behavior

Best Data-Centric Security Software At A Glance

Leader:
Highest Performer:
Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
57 Listings in Data-Centric Security Available
(1,033)4.4 out of 5
Optimized for quick response
1st Easiest To Use in Data-Centric Security software
Save to My Lists
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate b

    Users
    • Project Manager
    • Assistant Manager
    Industries
    • Marketing and Advertising
    • Construction
    Market Segment
    • 43% Small-Business
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Egnyte Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    65
    File Sharing
    42
    Easy Sharing
    36
    Security
    31
    Easy Access
    26
    Cons
    File Management
    9
    Slow Processing
    9
    Slow Performance
    8
    Expensive
    6
    Limited Features
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Egnyte features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.9
    8.8
    Has the product been a good partner in doing business?
    Average: 9.4
    9.0
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Egnyte
    Company Website
    Year Founded
    2008
    HQ Location
    Mountain View, CA
    Twitter
    @Egnyte
    16,313 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,233 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate b

Users
  • Project Manager
  • Assistant Manager
Industries
  • Marketing and Advertising
  • Construction
Market Segment
  • 43% Small-Business
  • 39% Mid-Market
Egnyte Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
65
File Sharing
42
Easy Sharing
36
Security
31
Easy Access
26
Cons
File Management
9
Slow Processing
9
Slow Performance
8
Expensive
6
Limited Features
6
Egnyte features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.9
8.8
Has the product been a good partner in doing business?
Average: 9.4
9.0
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Egnyte
Company Website
Year Founded
2008
HQ Location
Mountain View, CA
Twitter
@Egnyte
16,313 Twitter followers
LinkedIn® Page
www.linkedin.com
1,233 employees on LinkedIn®
(46)4.5 out of 5
5th Easiest To Use in Data-Centric Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

    Users
    No information available
    Industries
    • Financial Services
    • Manufacturing
    Market Segment
    • 83% Enterprise
    • 28% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Varonis Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Detailed Analysis
    10
    Data Classification
    9
    Ease of Use
    9
    Data Discovery
    8
    Security
    8
    Cons
    Expensive
    4
    Limitations
    4
    Complexity
    3
    Inefficiency
    3
    Management Issues
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Varonis Data Security Platform features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.9
    9.4
    Has the product been a good partner in doing business?
    Average: 9.4
    8.3
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Varonis
    Company Website
    Year Founded
    2005
    HQ Location
    New York, US
    Twitter
    @varonis
    6,292 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,576 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Varonis is fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and de

Users
No information available
Industries
  • Financial Services
  • Manufacturing
Market Segment
  • 83% Enterprise
  • 28% Mid-Market
Varonis Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Detailed Analysis
10
Data Classification
9
Ease of Use
9
Data Discovery
8
Security
8
Cons
Expensive
4
Limitations
4
Complexity
3
Inefficiency
3
Management Issues
3
Varonis Data Security Platform features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.9
9.4
Has the product been a good partner in doing business?
Average: 9.4
8.3
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Varonis
Company Website
Year Founded
2005
HQ Location
New York, US
Twitter
@varonis
6,292 Twitter followers
LinkedIn® Page
www.linkedin.com
2,576 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureCircle delivers a SaaS-based cybersecurity service that extends Zero Trust security to data on the endpoint. At SecureCircle, we believe frictionless data security drives business value for our

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 62% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • CrowdStrike Falcon Data Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    5
    Ease of Use
    4
    Data Detection
    3
    Easy Integrations
    3
    Data Protection
    2
    Cons
    Expensive
    5
    Training Required
    3
    Dependency Issues
    1
    File Management
    1
    Inefficiency
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • CrowdStrike Falcon Data Protection features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.9
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.7
    Ease of Admin
    Average: 8.9
    0.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2011
    HQ Location
    Sunnyvale, CA
    Twitter
    @CrowdStrike
    107,168 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    10,347 employees on LinkedIn®
    Ownership
    NASDAQ: CRWD
Product Description
How are these determined?Information
This description is provided by the seller.

SecureCircle delivers a SaaS-based cybersecurity service that extends Zero Trust security to data on the endpoint. At SecureCircle, we believe frictionless data security drives business value for our

Users
No information available
Industries
No information available
Market Segment
  • 62% Enterprise
  • 31% Mid-Market
CrowdStrike Falcon Data Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
5
Ease of Use
4
Data Detection
3
Easy Integrations
3
Data Protection
2
Cons
Expensive
5
Training Required
3
Dependency Issues
1
File Management
1
Inefficiency
1
CrowdStrike Falcon Data Protection features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.9
9.3
Has the product been a good partner in doing business?
Average: 9.4
8.7
Ease of Admin
Average: 8.9
0.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Year Founded
2011
HQ Location
Sunnyvale, CA
Twitter
@CrowdStrike
107,168 Twitter followers
LinkedIn® Page
www.linkedin.com
10,347 employees on LinkedIn®
Ownership
NASDAQ: CRWD
(157)4.8 out of 5
2nd Easiest To Use in Data-Centric Security software
View top Consulting Services for BigID
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    BigID’s data intelligence platform enables organizations to know their enterprise data and take action for privacy, protection, and perspective. Customers deploy BigID to proactively discover, manage,

    Users
    • CEO
    • Founder
    Industries
    • Marketing and Advertising
    • Computer Software
    Market Segment
    • 81% Small-Business
    • 6% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • BigID Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    76
    Cookie Management
    35
    Setup Ease
    34
    Customization
    32
    Regulatory Compliance
    32
    Cons
    Limited Customization
    15
    Cookie Management
    11
    Difficult Customization
    9
    Banner Issues
    7
    Expensive
    5
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BigID features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 8.9
    9.5
    Has the product been a good partner in doing business?
    Average: 9.4
    9.5
    Ease of Admin
    Average: 8.9
    7.5
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    BigID
    Year Founded
    2016
    HQ Location
    New York, New York
    Twitter
    @bigidsecure
    2,698 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    706 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

BigID’s data intelligence platform enables organizations to know their enterprise data and take action for privacy, protection, and perspective. Customers deploy BigID to proactively discover, manage,

Users
  • CEO
  • Founder
Industries
  • Marketing and Advertising
  • Computer Software
Market Segment
  • 81% Small-Business
  • 6% Mid-Market
BigID Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
76
Cookie Management
35
Setup Ease
34
Customization
32
Regulatory Compliance
32
Cons
Limited Customization
15
Cookie Management
11
Difficult Customization
9
Banner Issues
7
Expensive
5
BigID features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 8.9
9.5
Has the product been a good partner in doing business?
Average: 9.4
9.5
Ease of Admin
Average: 8.9
7.5
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
BigID
Year Founded
2016
HQ Location
New York, New York
Twitter
@bigidsecure
2,698 Twitter followers
LinkedIn® Page
www.linkedin.com
706 employees on LinkedIn®
(30)3.9 out of 5
4th Easiest To Use in Data-Centric Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Sophos Intercept X Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    2
    Cybersecurity
    1
    Easy Installation
    1
    Easy Integrations
    1
    Efficiency
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sophos Intercept X features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 9.4
    8.7
    Ease of Admin
    Average: 8.9
    9.6
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sophos
    Year Founded
    1985
    HQ Location
    Oxfordshire
    Twitter
    @Sophos
    36,757 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    5,079 employees on LinkedIn®
    Ownership
    LSE:SOPH
Product Description
How are these determined?Information
This description is provided by the seller.

Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Mid-Market
  • 30% Small-Business
Sophos Intercept X Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
2
Cybersecurity
1
Easy Installation
1
Easy Integrations
1
Efficiency
1
Cons
This product has not yet received any negative sentiments.
Sophos Intercept X features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 9.4
8.7
Ease of Admin
Average: 8.9
9.6
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Sophos
Year Founded
1985
HQ Location
Oxfordshire
Twitter
@Sophos
36,757 Twitter followers
LinkedIn® Page
www.linkedin.com
5,079 employees on LinkedIn®
Ownership
LSE:SOPH
(82)4.5 out of 5
View top Consulting Services for Salesforce Shield
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Salesforce Shield Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    19
    Ease of Use
    15
    Privacy Management
    15
    Data Security
    11
    Access Control
    7
    Cons
    Learning Curve
    6
    Performance Issues
    5
    Access Control Issues
    4
    Complexity
    4
    Complexity Issues
    4
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Salesforce Shield features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.9
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.9
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    San Francisco, CA
    Twitter
    @salesforce
    583,254 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    86,777 employees on LinkedIn®
    Ownership
    NYSE:CRM
Product Description
How are these determined?Information
This description is provided by the seller.

Salesforce Shield is a suite of products that provides an extra level of security and protection above and beyond what’s already built into Salesforce. Salesforce Shield capabilities help improve data

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Mid-Market
  • 32% Enterprise
Salesforce Shield Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
19
Ease of Use
15
Privacy Management
15
Data Security
11
Access Control
7
Cons
Learning Curve
6
Performance Issues
5
Access Control Issues
4
Complexity
4
Complexity Issues
4
Salesforce Shield features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.9
9.3
Has the product been a good partner in doing business?
Average: 9.4
8.9
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Year Founded
1999
HQ Location
San Francisco, CA
Twitter
@salesforce
583,254 Twitter followers
LinkedIn® Page
www.linkedin.com
86,777 employees on LinkedIn®
Ownership
NYSE:CRM
(346)4.4 out of 5
Optimized for quick response
6th Easiest To Use in Data-Centric Security software
Save to My Lists
Entry Level Price:Starting at $119.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), inte

    Users
    • IT Manager
    Industries
    • Hospital & Health Care
    • Health, Wellness and Fitness
    Market Segment
    • 46% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Virtru Email Encryption Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    49
    Security
    47
    Encryption
    33
    Protection
    25
    Secure Sharing
    25
    Cons
    Email Issues
    33
    Email Encryption Issues
    25
    Access Issues
    14
    Encryption Issues
    13
    Technical Issues
    11
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virtru Email Encryption features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 9.4
    9.0
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Virtru
    Company Website
    Year Founded
    2012
    HQ Location
    Washington, DC
    Twitter
    @virtruprivacy
    1,789 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    196 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Secure data directly from your inbox with Virtru. Users can easily encrypt emails and attachments with just one click, protecting sensitive data such as personally identifiable information (PII), inte

Users
  • IT Manager
Industries
  • Hospital & Health Care
  • Health, Wellness and Fitness
Market Segment
  • 46% Mid-Market
  • 38% Small-Business
Virtru Email Encryption Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
49
Security
47
Encryption
33
Protection
25
Secure Sharing
25
Cons
Email Issues
33
Email Encryption Issues
25
Access Issues
14
Encryption Issues
13
Technical Issues
11
Virtru Email Encryption features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 9.4
9.0
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Virtru
Company Website
Year Founded
2012
HQ Location
Washington, DC
Twitter
@virtruprivacy
1,789 Twitter followers
LinkedIn® Page
www.linkedin.com
196 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ProLion offers powerful data protection solutions that safeguard critical storage and backup data, on premises or in the cloud. From ransomware protection that detects threats in real time to data tra

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Small-Business
    • 42% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ProLion Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    3
    Data Detection
    2
    Ease of Use
    2
    Efficiency Optimization
    2
    Reliability
    2
    Cons
    Complexity
    1
    Difficult Setup
    1
    Expensive
    1
    Limited Features
    1
    Service Reliability
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ProLion features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.9
    8.9
    Has the product been a good partner in doing business?
    Average: 9.4
    8.9
    Ease of Admin
    Average: 8.9
    0.8
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ProLion
    Year Founded
    2013
    HQ Location
    Wiener Neustadt, AT
    Twitter
    @ProLionOfficial
    250 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    76 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ProLion offers powerful data protection solutions that safeguard critical storage and backup data, on premises or in the cloud. From ransomware protection that detects threats in real time to data tra

Users
No information available
Industries
No information available
Market Segment
  • 58% Small-Business
  • 42% Mid-Market
ProLion Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
3
Data Detection
2
Ease of Use
2
Efficiency Optimization
2
Reliability
2
Cons
Complexity
1
Difficult Setup
1
Expensive
1
Limited Features
1
Service Reliability
1
ProLion features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.9
8.9
Has the product been a good partner in doing business?
Average: 9.4
8.9
Ease of Admin
Average: 8.9
0.8
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
ProLion
Year Founded
2013
HQ Location
Wiener Neustadt, AT
Twitter
@ProLionOfficial
250 Twitter followers
LinkedIn® Page
www.linkedin.com
76 employees on LinkedIn®
(27)4.9 out of 5
3rd Easiest To Use in Data-Centric Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Strac is a 1-stop shop for all things PII (Personally Identifiable Information). Strac is a Data Loss Prevention software that protects businesses from security and compliance risks by a) automaticall

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 52% Small-Business
    • 48% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Strac Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    19
    Data Security
    18
    Customer Support
    17
    Security
    17
    Ease of Use
    16
    Cons
    Limited Features
    3
    Authentication Issues
    1
    Inefficient Search Functionality
    1
    Limitations
    1
    Limited Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Strac features and usability ratings that predict user satisfaction
    9.7
    Ease of Use
    Average: 8.9
    9.9
    Has the product been a good partner in doing business?
    Average: 9.4
    9.6
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Strac
    Year Founded
    2021
    HQ Location
    Bellevue, Washington
    Twitter
    @securewithstrac
    82 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Strac is a 1-stop shop for all things PII (Personally Identifiable Information). Strac is a Data Loss Prevention software that protects businesses from security and compliance risks by a) automaticall

Users
No information available
Industries
  • Financial Services
Market Segment
  • 52% Small-Business
  • 48% Mid-Market
Strac Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
19
Data Security
18
Customer Support
17
Security
17
Ease of Use
16
Cons
Limited Features
3
Authentication Issues
1
Inefficient Search Functionality
1
Limitations
1
Limited Compatibility
1
Strac features and usability ratings that predict user satisfaction
9.7
Ease of Use
Average: 8.9
9.9
Has the product been a good partner in doing business?
Average: 9.4
9.6
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Strac
Year Founded
2021
HQ Location
Bellevue, Washington
Twitter
@securewithstrac
82 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protect your sensitive information. Learn how our solutions help you discover, classify, and protect sensitive information wherever it lives or travels.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 42% Enterprise
    • 19% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Microsoft Purview Information Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Easy Integrations
    1
    Features
    1
    Integrations
    1
    Integration Support
    1
    Platform Compatibility
    1
    Cons
    Difficult Setup
    1
    Expensive
    1
    Improvement Needed
    1
    Installation Issues
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Microsoft Purview Information Protection features and usability ratings that predict user satisfaction
    8.4
    Ease of Use
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 9.4
    8.2
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Microsoft
    Year Founded
    1975
    HQ Location
    Redmond, Washington
    Twitter
    @microsoft
    14,002,464 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    234,872 employees on LinkedIn®
    Ownership
    MSFT
Product Description
How are these determined?Information
This description is provided by the seller.

Protect your sensitive information. Learn how our solutions help you discover, classify, and protect sensitive information wherever it lives or travels.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 42% Enterprise
  • 19% Mid-Market
Microsoft Purview Information Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Easy Integrations
1
Features
1
Integrations
1
Integration Support
1
Platform Compatibility
1
Cons
Difficult Setup
1
Expensive
1
Improvement Needed
1
Installation Issues
1
Learning Curve
1
Microsoft Purview Information Protection features and usability ratings that predict user satisfaction
8.4
Ease of Use
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 9.4
8.2
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Microsoft
Year Founded
1975
HQ Location
Redmond, Washington
Twitter
@microsoft
14,002,464 Twitter followers
LinkedIn® Page
www.linkedin.com
234,872 employees on LinkedIn®
Ownership
MSFT
(43)4.8 out of 5
Optimized for quick response
7th Easiest To Use in Data-Centric Security software
Save to My Lists
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid

    Users
    No information available
    Industries
    • Computer Software
    • Retail
    Market Segment
    • 58% Enterprise
    • 21% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Securiti Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Ease of Use
    5
    Problem Solving
    5
    Compliance Management
    4
    Customer Support
    4
    Cons
    Learning Curve
    4
    Complexity
    3
    Feature Complexity
    3
    Learning Difficulty
    3
    Complexity Issues
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Securiti features and usability ratings that predict user satisfaction
    9.1
    Ease of Use
    Average: 8.9
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.2
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Securiti
    Company Website
    Year Founded
    2019
    HQ Location
    San Jose, California
    Twitter
    @SecuritiAI
    633 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,049 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. It provides unified data intelligence, controls and orchestration across hybrid

Users
No information available
Industries
  • Computer Software
  • Retail
Market Segment
  • 58% Enterprise
  • 21% Small-Business
Securiti Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Ease of Use
5
Problem Solving
5
Compliance Management
4
Customer Support
4
Cons
Learning Curve
4
Complexity
3
Feature Complexity
3
Learning Difficulty
3
Complexity Issues
2
Securiti features and usability ratings that predict user satisfaction
9.1
Ease of Use
Average: 8.9
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.2
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Securiti
Company Website
Year Founded
2019
HQ Location
San Jose, California
Twitter
@SecuritiAI
633 Twitter followers
LinkedIn® Page
www.linkedin.com
1,049 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kiteworks’ mission is to empower organizations to effectively manage risk in every send, share, receive, and save of sensitive content. To this end, we created a platform that delivers content governa

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 54% Enterprise
    • 27% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kiteworks Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    9
    Secure Sharing
    6
    Security
    6
    Features
    5
    File Sharing
    5
    Cons
    Software Instability
    4
    Technical Issues
    4
    File Management
    3
    Complexity
    2
    Complex Usability
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kiteworks features and usability ratings that predict user satisfaction
    9.0
    Ease of Use
    Average: 8.9
    7.7
    Has the product been a good partner in doing business?
    Average: 9.4
    8.2
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kiteworks
    Year Founded
    1999
    HQ Location
    Palo Alto, CA
    Twitter
    @Kiteworks
    3,478 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    290 employees on LinkedIn®
    Phone
    650-485-4300
Product Description
How are these determined?Information
This description is provided by the seller.

Kiteworks’ mission is to empower organizations to effectively manage risk in every send, share, receive, and save of sensitive content. To this end, we created a platform that delivers content governa

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 54% Enterprise
  • 27% Small-Business
Kiteworks Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
9
Secure Sharing
6
Security
6
Features
5
File Sharing
5
Cons
Software Instability
4
Technical Issues
4
File Management
3
Complexity
2
Complex Usability
2
Kiteworks features and usability ratings that predict user satisfaction
9.0
Ease of Use
Average: 8.9
7.7
Has the product been a good partner in doing business?
Average: 9.4
8.2
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Kiteworks
Year Founded
1999
HQ Location
Palo Alto, CA
Twitter
@Kiteworks
3,478 Twitter followers
LinkedIn® Page
www.linkedin.com
290 employees on LinkedIn®
Phone
650-485-4300
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 61% Mid-Market
    • 27% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Satori Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    8
    Ease of Use
    8
    Security
    8
    Integrations
    7
    Easy Integrations
    6
    Cons
    Complexity
    2
    Difficult Setup
    2
    Improvement Needed
    2
    Installation Issues
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Satori Data Security Platform features and usability ratings that predict user satisfaction
    9.4
    Ease of Use
    Average: 8.9
    8.9
    Has the product been a good partner in doing business?
    Average: 9.4
    8.8
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Satori
    Company Website
    Year Founded
    2019
    HQ Location
    Rehovot, Israel
    Twitter
    @SatoriCyber
    303 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    132 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can

Users
  • Software Engineer
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 61% Mid-Market
  • 27% Enterprise
Satori Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
8
Ease of Use
8
Security
8
Integrations
7
Easy Integrations
6
Cons
Complexity
2
Difficult Setup
2
Improvement Needed
2
Installation Issues
2
Learning Curve
2
Satori Data Security Platform features and usability ratings that predict user satisfaction
9.4
Ease of Use
Average: 8.9
8.9
Has the product been a good partner in doing business?
Average: 9.4
8.8
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Satori
Company Website
Year Founded
2019
HQ Location
Rehovot, Israel
Twitter
@SatoriCyber
303 Twitter followers
LinkedIn® Page
www.linkedin.com
132 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fortra’s Data Classification Suite (DCS) can identify, classify, and secure your sensitive data across platforms, devices, and in the cloud. Fortra will help you build a data protection solution custo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 44% Enterprise
    • 39% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Fortra’s Data Classification Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Accessibility
    1
    Cloud Storage
    1
    Customer Support
    1
    Data Accuracy
    1
    Data Classification
    1
    Cons
    Compatibility Issues
    1
    Complex Implementation
    1
    Complexity
    1
    Dependency Issues
    1
    File Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fortra’s Data Classification Suite features and usability ratings that predict user satisfaction
    7.4
    Ease of Use
    Average: 8.9
    9.0
    Has the product been a good partner in doing business?
    Average: 9.4
    6.9
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Fortra’s Data Classification Suite (DCS) can identify, classify, and secure your sensitive data across platforms, devices, and in the cloud. Fortra will help you build a data protection solution custo

Users
No information available
Industries
No information available
Market Segment
  • 44% Enterprise
  • 39% Small-Business
Fortra’s Data Classification Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Accessibility
1
Cloud Storage
1
Customer Support
1
Data Accuracy
1
Data Classification
1
Cons
Compatibility Issues
1
Complex Implementation
1
Complexity
1
Dependency Issues
1
File Management
1
Fortra’s Data Classification Suite features and usability ratings that predict user satisfaction
7.4
Ease of Use
Average: 8.9
9.0
Has the product been a good partner in doing business?
Average: 9.4
6.9
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Fortra
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
(47)4.4 out of 5
Optimized for quick response
Save to My Lists
Entry Level Price:Starting at $119.00
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Virtru Secure Share is a cloud-native secure file transfer solution designed to simplify sharing sensitive documents. Advanced encryption, customizable access controls, and complete data visibility en

    Users
    No information available
    Industries
    • Hospital & Health Care
    • Financial Services
    Market Segment
    • 45% Mid-Market
    • 30% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Virtru Secure Share Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    33
    Secure Sharing
    30
    Ease of Use
    23
    Data Security
    21
    File Sharing
    16
    Cons
    Access Limitations
    7
    Upload Issues
    7
    Difficult Setup
    6
    Email Issues
    6
    Not User-Friendly
    6
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Virtru Secure Share features and usability ratings that predict user satisfaction
    8.7
    Ease of Use
    Average: 8.9
    8.7
    Has the product been a good partner in doing business?
    Average: 9.4
    8.9
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Virtru
    Company Website
    Year Founded
    2012
    HQ Location
    Washington, DC
    Twitter
    @virtruprivacy
    1,789 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    196 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Virtru Secure Share is a cloud-native secure file transfer solution designed to simplify sharing sensitive documents. Advanced encryption, customizable access controls, and complete data visibility en

Users
No information available
Industries
  • Hospital & Health Care
  • Financial Services
Market Segment
  • 45% Mid-Market
  • 30% Small-Business
Virtru Secure Share Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
33
Secure Sharing
30
Ease of Use
23
Data Security
21
File Sharing
16
Cons
Access Limitations
7
Upload Issues
7
Difficult Setup
6
Email Issues
6
Not User-Friendly
6
Virtru Secure Share features and usability ratings that predict user satisfaction
8.7
Ease of Use
Average: 8.9
8.7
Has the product been a good partner in doing business?
Average: 9.4
8.9
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Virtru
Company Website
Year Founded
2012
HQ Location
Washington, DC
Twitter
@virtruprivacy
1,789 Twitter followers
LinkedIn® Page
www.linkedin.com
196 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    LightBeam is an identity-centric data security solution that reduces breach risks, ransomware costs, and regulatory penalties by converging DSPM, privacy, and governance into a single AI-driven platfo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 42% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • LightBeam.ai Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Automated Classification
    4
    Automation
    4
    Security
    4
    Data Classification
    3
    Data Privacy
    3
    Cons
    Bug Issues
    1
    Bugs
    1
    Complex Configuration
    1
    Complexity
    1
    Complexity Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • LightBeam.ai features and usability ratings that predict user satisfaction
    9.3
    Ease of Use
    Average: 8.9
    8.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.3
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    San Jose, California
    Twitter
    @LightBeamAI
    93 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    75 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

LightBeam is an identity-centric data security solution that reduces breach risks, ransomware costs, and regulatory penalties by converging DSPM, privacy, and governance into a single AI-driven platfo

Users
No information available
Industries
No information available
Market Segment
  • 42% Small-Business
  • 33% Enterprise
LightBeam.ai Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Automated Classification
4
Automation
4
Security
4
Data Classification
3
Data Privacy
3
Cons
Bug Issues
1
Bugs
1
Complex Configuration
1
Complexity
1
Complexity Issues
1
LightBeam.ai features and usability ratings that predict user satisfaction
9.3
Ease of Use
Average: 8.9
8.3
Has the product been a good partner in doing business?
Average: 9.4
8.3
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
HQ Location
San Jose, California
Twitter
@LightBeamAI
93 Twitter followers
LinkedIn® Page
www.linkedin.com
75 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Data Detection and Response finds and follows your sensitive data anywhere it goes to protect it like never before. We reimagined data security for the cloud-first, hybrid work world. Cyberhaven p

    Users
    No information available
    Industries
    • Financial Services
    Market Segment
    • 56% Enterprise
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyberhaven Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    9
    Customer Support
    8
    Features
    8
    Security
    8
    Deployment Ease
    6
    Cons
    Complexity
    5
    Setup Difficulties
    5
    Improvement Needed
    3
    Policy Limitations
    3
    Unclear Guidance
    3
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyberhaven features and usability ratings that predict user satisfaction
    8.4
    Ease of Use
    Average: 8.9
    9.4
    Has the product been a good partner in doing business?
    Average: 9.4
    8.8
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2016
    HQ Location
    Palo Alto
    Twitter
    @CyberhavenInc
    719 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    212 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Data Detection and Response finds and follows your sensitive data anywhere it goes to protect it like never before. We reimagined data security for the cloud-first, hybrid work world. Cyberhaven p

Users
No information available
Industries
  • Financial Services
Market Segment
  • 56% Enterprise
  • 31% Mid-Market
Cyberhaven Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
9
Customer Support
8
Features
8
Security
8
Deployment Ease
6
Cons
Complexity
5
Setup Difficulties
5
Improvement Needed
3
Policy Limitations
3
Unclear Guidance
3
Cyberhaven features and usability ratings that predict user satisfaction
8.4
Ease of Use
Average: 8.9
9.4
Has the product been a good partner in doing business?
Average: 9.4
8.8
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Year Founded
2016
HQ Location
Palo Alto
Twitter
@CyberhavenInc
719 Twitter followers
LinkedIn® Page
www.linkedin.com
212 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ManageEngine DataSecurity Plus is a unified data visibility and security platform that specializes in file auditing, file analysis, data risk assessment, data leak prevention, and cloud protection. F

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 40% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ManageEngine DataSecurity Plus Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Helpful
    2
    Customer Support
    1
    Data Protection
    1
    Data Security
    1
    Implementation Ease
    1
    Cons
    Expensive
    2
    Data Security
    1
    Inadequate Security
    1
    Ineffective Blocking
    1
    Inefficiency
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ManageEngine DataSecurity Plus features and usability ratings that predict user satisfaction
    8.2
    Ease of Use
    Average: 8.9
    9.2
    Has the product been a good partner in doing business?
    Average: 9.4
    8.3
    Ease of Admin
    Average: 8.9
    3.3
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2002
    HQ Location
    Del Valle, Texas
    Twitter
    @manageengine
    7,677 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    464 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ManageEngine DataSecurity Plus is a unified data visibility and security platform that specializes in file auditing, file analysis, data risk assessment, data leak prevention, and cloud protection. F

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 40% Small-Business
ManageEngine DataSecurity Plus Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Helpful
2
Customer Support
1
Data Protection
1
Data Security
1
Implementation Ease
1
Cons
Expensive
2
Data Security
1
Inadequate Security
1
Ineffective Blocking
1
Inefficiency
1
ManageEngine DataSecurity Plus features and usability ratings that predict user satisfaction
8.2
Ease of Use
Average: 8.9
9.2
Has the product been a good partner in doing business?
Average: 9.4
8.3
Ease of Admin
Average: 8.9
3.3
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Year Founded
2002
HQ Location
Del Valle, Texas
Twitter
@manageengine
7,677 Twitter followers
LinkedIn® Page
www.linkedin.com
464 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Qohash offers data security solutions focusing on unstructured data risk management. Our platform, Qostodian, enables organizations to automatically monitor, identify, and address high-risk data effic

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 57% Mid-Market
    • 43% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Qostodian Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    5
    Ease of Use
    5
    Helpful
    5
    Features
    4
    Security
    4
    Cons
    Inadequate Reporting
    3
    False Positives
    2
    Inefficient Categorization
    2
    Insufficient Details
    2
    Lack of Automation
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Qostodian features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 8.9
    9.9
    Has the product been a good partner in doing business?
    Average: 9.4
    9.9
    Ease of Admin
    Average: 8.9
    6.2
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Qohash
    Company Website
    Year Founded
    2018
    HQ Location
    Québec, CA
    Twitter
    @Qohash
    129 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    63 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Qohash offers data security solutions focusing on unstructured data risk management. Our platform, Qostodian, enables organizations to automatically monitor, identify, and address high-risk data effic

Users
No information available
Industries
No information available
Market Segment
  • 57% Mid-Market
  • 43% Enterprise
Qostodian Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
5
Ease of Use
5
Helpful
5
Features
4
Security
4
Cons
Inadequate Reporting
3
False Positives
2
Inefficient Categorization
2
Insufficient Details
2
Lack of Automation
2
Qostodian features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 8.9
9.9
Has the product been a good partner in doing business?
Average: 9.4
9.9
Ease of Admin
Average: 8.9
6.2
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Qohash
Company Website
Year Founded
2018
HQ Location
Québec, CA
Twitter
@Qohash
129 Twitter followers
LinkedIn® Page
www.linkedin.com
63 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enterprise Recon by Ground Labs is a leading-edge data discovery and management solution that enables organizations to uncover and secure sensitive information across all environments, from on-premise

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 56% Enterprise
    • 39% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Enterprise Recon Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Management
    8
    Compliance
    7
    Data Discovery
    6
    Security
    6
    Compliance Management
    5
    Cons
    Expensive
    3
    Pricing Issues
    3
    Complex Usability
    1
    Cost
    1
    Cost Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Enterprise Recon features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.9
    9.3
    Has the product been a good partner in doing business?
    Average: 9.4
    8.6
    Ease of Admin
    Average: 8.9
    6.7
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    N/A
    Twitter
    @Groundlabs
    573 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    46 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enterprise Recon by Ground Labs is a leading-edge data discovery and management solution that enables organizations to uncover and secure sensitive information across all environments, from on-premise

Users
No information available
Industries
No information available
Market Segment
  • 56% Enterprise
  • 39% Mid-Market
Enterprise Recon Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Management
8
Compliance
7
Data Discovery
6
Security
6
Compliance Management
5
Cons
Expensive
3
Pricing Issues
3
Complex Usability
1
Cost
1
Cost Issues
1
Enterprise Recon features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.9
9.3
Has the product been a good partner in doing business?
Average: 9.4
8.6
Ease of Admin
Average: 8.9
6.7
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Year Founded
2007
HQ Location
N/A
Twitter
@Groundlabs
573 Twitter followers
LinkedIn® Page
www.linkedin.com
46 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QuSecure offers QuProtect (Web App Security + Network Security), the worlds first post quantum cryptographic (PQC) security solution that enables government and enterprise businesses to address their

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • QuProtect Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Encryption
    2
    Data Protection
    1
    Protection
    1
    Security
    1
    Cons
    Installation Issues
    2
    Compatibility Issues
    1
    Data Security
    1
    Difficult Setup
    1
    Inefficient Search Functionality
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • QuProtect features and usability ratings that predict user satisfaction
    7.9
    Ease of Use
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QuSecure
    Year Founded
    2019
    HQ Location
    San Mateo, US
    Twitter
    @qusecure
    360 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    71 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QuSecure offers QuProtect (Web App Security + Network Security), the worlds first post quantum cryptographic (PQC) security solution that enables government and enterprise businesses to address their

Users
No information available
Industries
No information available
Market Segment
  • 75% Mid-Market
  • 25% Enterprise
QuProtect Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Encryption
2
Data Protection
1
Protection
1
Security
1
Cons
Installation Issues
2
Compatibility Issues
1
Data Security
1
Difficult Setup
1
Inefficient Search Functionality
1
QuProtect features and usability ratings that predict user satisfaction
7.9
Ease of Use
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
QuSecure
Year Founded
2019
HQ Location
San Mateo, US
Twitter
@qusecure
360 Twitter followers
LinkedIn® Page
www.linkedin.com
71 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Seclore is committed to providing industry leading technology that helps organizations protect their most valuable assets and achieve compliance. Headquartered in California, Seclore has 2,000+ custom

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 53% Enterprise
    • 47% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Seclore Data-Centric Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    6
    Protection
    5
    Data Security
    4
    Customer Support
    3
    Data Protection
    3
    Cons
    Expensive
    3
    Not User-Friendly
    3
    User Accessibility
    2
    UX Improvement
    2
    Access Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Seclore Data-Centric Security Platform features and usability ratings that predict user satisfaction
    8.6
    Ease of Use
    Average: 8.9
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.6
    Ease of Admin
    Average: 8.9
    6.7
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Seclore
    Company Website
    Year Founded
    2011
    HQ Location
    Santa Clara, US
    Twitter
    @secloretech
    1,287 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    469 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Seclore is committed to providing industry leading technology that helps organizations protect their most valuable assets and achieve compliance. Headquartered in California, Seclore has 2,000+ custom

Users
No information available
Industries
No information available
Market Segment
  • 53% Enterprise
  • 47% Mid-Market
Seclore Data-Centric Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
6
Protection
5
Data Security
4
Customer Support
3
Data Protection
3
Cons
Expensive
3
Not User-Friendly
3
User Accessibility
2
UX Improvement
2
Access Issues
1
Seclore Data-Centric Security Platform features and usability ratings that predict user satisfaction
8.6
Ease of Use
Average: 8.9
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.6
Ease of Admin
Average: 8.9
6.7
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Seclore
Company Website
Year Founded
2011
HQ Location
Santa Clara, US
Twitter
@secloretech
1,287 Twitter followers
LinkedIn® Page
www.linkedin.com
469 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Ensure company and customer data is secure across your hybrid cloud. Protect your data at rest with hardware and software-based AES-256 bit encryption solutions. Maintain data encryption in transit fo

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Mid-Market
    • 20% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • ONTAP Data Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Protection
    3
    Data Protection
    2
    Data Security
    2
    Encryption
    2
    Malware Protection
    2
    Cons
    Complexity
    3
    Complexity Issues
    2
    Expensive
    2
    Complex Configuration
    1
    Complex Setup
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ONTAP Data Security features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    6.7
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetApp
    Year Founded
    1992
    HQ Location
    Sunnyvale, California
    Twitter
    @NetApp
    119,705 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,694 employees on LinkedIn®
    Ownership
    NASDAQ
Product Description
How are these determined?Information
This description is provided by the seller.

Ensure company and customer data is secure across your hybrid cloud. Protect your data at rest with hardware and software-based AES-256 bit encryption solutions. Maintain data encryption in transit fo

Users
No information available
Industries
No information available
Market Segment
  • 80% Mid-Market
  • 20% Enterprise
ONTAP Data Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Protection
3
Data Protection
2
Data Security
2
Encryption
2
Malware Protection
2
Cons
Complexity
3
Complexity Issues
2
Expensive
2
Complex Configuration
1
Complex Setup
1
ONTAP Data Security features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
6.7
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
NetApp
Year Founded
1992
HQ Location
Sunnyvale, California
Twitter
@NetApp
119,705 Twitter followers
LinkedIn® Page
www.linkedin.com
12,694 employees on LinkedIn®
Ownership
NASDAQ
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Stash Global Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Storage
    1
    Customer Support
    1
    Data Detection
    1
    Data Security
    1
    Data Transfer
    1
    Cons
    Integration Issues
    2
    Expensive
    1
    File Management
    1
    Inefficiency
    1
    Installation Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Stash Global features and usability ratings that predict user satisfaction
    7.2
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    8.3
    Ease of Admin
    Average: 8.9
    3.3
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Wilmington , US
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 67% Mid-Market
  • 33% Enterprise
Stash Global Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Storage
1
Customer Support
1
Data Detection
1
Data Security
1
Data Transfer
1
Cons
Integration Issues
2
Expensive
1
File Management
1
Inefficiency
1
Installation Issues
1
Stash Global features and usability ratings that predict user satisfaction
7.2
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
8.3
Ease of Admin
Average: 8.9
3.3
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Year Founded
2014
HQ Location
Wilmington , US
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Anonos Data Embassy platform is the only technology that eliminates the tradeoff between data protection and data utility. The patented software uniquely combines statutory pseudonymization, synth

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 25% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Anonos Data Embassy Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    3
    Encryption
    3
    Compliance
    1
    Cons
    Integration Issues
    2
    Compatibility Issues
    1
    Complexity
    1
    Expensive
    1
    Limited Features
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Anonos Data Embassy features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    10.0
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Anonos
    Year Founded
    2012
    HQ Location
    New York, US
    Twitter
    @anonos
    474 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    53 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Anonos Data Embassy platform is the only technology that eliminates the tradeoff between data protection and data utility. The patented software uniquely combines statutory pseudonymization, synth

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 25% Enterprise
Anonos Data Embassy Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
3
Encryption
3
Compliance
1
Cons
Integration Issues
2
Compatibility Issues
1
Complexity
1
Expensive
1
Limited Features
1
Anonos Data Embassy features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
10.0
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Anonos
Year Founded
2012
HQ Location
New York, US
Twitter
@anonos
474 Twitter followers
LinkedIn® Page
www.linkedin.com
53 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Fasoo Data Radar (FDR) is an advanced data discovery and classification solution designed to help organizations locate, analyze, and protect sensitive information across their infrastructure. FDR auto

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Fasoo Data Radar features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.9
    6.7
    Has the product been a good partner in doing business?
    Average: 9.4
    6.7
    Ease of Admin
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fasoo
    Year Founded
    2000
    HQ Location
    Bethesda, US
    Twitter
    @Fasoocom
    234 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
    Ownership
    150900 (KOSDAQ)
Product Description
How are these determined?Information
This description is provided by the seller.

Fasoo Data Radar (FDR) is an advanced data discovery and classification solution designed to help organizations locate, analyze, and protect sensitive information across their infrastructure. FDR auto

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
  • 50% Small-Business
Fasoo Data Radar features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.9
6.7
Has the product been a good partner in doing business?
Average: 9.4
6.7
Ease of Admin
Average: 8.9
0.0
No information available
Seller Details
Seller
Fasoo
Year Founded
2000
HQ Location
Bethesda, US
Twitter
@Fasoocom
234 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
Ownership
150900 (KOSDAQ)
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hidden risks expose your data. Imperva Discovery and Assessment discovers unknown databases, classifies sensitive data and detects database vulnerabilities.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Imperva Data Security Fabric features and usability ratings that predict user satisfaction
    8.9
    Ease of Use
    Average: 8.9
    8.3
    Has the product been a good partner in doing business?
    Average: 9.4
    10.0
    Ease of Admin
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Imperva
    Year Founded
    2002
    HQ Location
    Redwood Shores, CA
    Twitter
    @Imperva
    84,603 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,461 employees on LinkedIn®
    Ownership
    NASDAQ: IMPV
Product Description
How are these determined?Information
This description is provided by the seller.

Hidden risks expose your data. Imperva Discovery and Assessment discovers unknown databases, classifies sensitive data and detects database vulnerabilities.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Imperva Data Security Fabric features and usability ratings that predict user satisfaction
8.9
Ease of Use
Average: 8.9
8.3
Has the product been a good partner in doing business?
Average: 9.4
10.0
Ease of Admin
Average: 8.9
0.0
No information available
Seller Details
Seller
Imperva
Year Founded
2002
HQ Location
Redwood Shores, CA
Twitter
@Imperva
84,603 Twitter followers
LinkedIn® Page
www.linkedin.com
1,461 employees on LinkedIn®
Ownership
NASDAQ: IMPV
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Lepide Data Security Platform is a complete solution for organizations looking to protect their data, detect and react to threats, and meet compliance. Using Lepide DSP, organizations can determin

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Lepide Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Ease of Implementation
    1
    Ease of Use
    1
    Easy Integrations
    1
    Features
    1
    Cons
    Training Required
    2
    Complexity
    1
    Difficult Learning
    1
    Difficult Setup
    1
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Lepide Data Security Platform features and usability ratings that predict user satisfaction
    9.2
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    8.3
    Ease of Admin
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Lepide
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

The Lepide Data Security Platform is a complete solution for organizations looking to protect their data, detect and react to threats, and meet compliance. Using Lepide DSP, organizations can determin

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
Lepide Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Ease of Implementation
1
Ease of Use
1
Easy Integrations
1
Features
1
Cons
Training Required
2
Complexity
1
Difficult Learning
1
Difficult Setup
1
Learning Curve
1
Lepide Data Security Platform features and usability ratings that predict user satisfaction
9.2
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
8.3
Ease of Admin
Average: 8.9
0.0
No information available
Seller Details
Seller
Lepide
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    NC Protect delivers dynamic, attribute-based access control (ABAC) and data protection that adjusts with your users’ context to protect sensitive information against accidental and malicious data loss

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • NC Protect Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Data Protection
    1
    Monitoring
    1
    Protection
    1
    Security
    1
    Cons
    Complexity
    1
    Data Security
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NC Protect features and usability ratings that predict user satisfaction
    6.7
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    6.7
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    archTIS
    Year Founded
    2005
    HQ Location
    BARTON, AU
    LinkedIn® Page
    www.linkedin.com
    33 employees on LinkedIn®
    Ownership
    ASX: AR9
Product Description
How are these determined?Information
This description is provided by the seller.

NC Protect delivers dynamic, attribute-based access control (ABAC) and data protection that adjusts with your users’ context to protect sensitive information against accidental and malicious data loss

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
NC Protect Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Data Protection
1
Monitoring
1
Protection
1
Security
1
Cons
Complexity
1
Data Security
1
NC Protect features and usability ratings that predict user satisfaction
6.7
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
6.7
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
archTIS
Year Founded
2005
HQ Location
BARTON, AU
LinkedIn® Page
www.linkedin.com
33 employees on LinkedIn®
Ownership
ASX: AR9
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maintain continuous data availability for your business-critical applications.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • NetApp Data Protection features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    10.0
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NetApp
    Year Founded
    1992
    HQ Location
    Sunnyvale, California
    Twitter
    @NetApp
    119,705 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    12,694 employees on LinkedIn®
    Ownership
    NASDAQ
Product Description
How are these determined?Information
This description is provided by the seller.

Maintain continuous data availability for your business-critical applications.

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 50% Small-Business
NetApp Data Protection features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
10.0
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
NetApp
Year Founded
1992
HQ Location
Sunnyvale, California
Twitter
@NetApp
119,705 Twitter followers
LinkedIn® Page
www.linkedin.com
12,694 employees on LinkedIn®
Ownership
NASDAQ
(17)4.4 out of 5
View top Consulting Services for Sensitive Data Protection
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Automatically discover and redact sensitive data everywhere

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 35% Mid-Market
    • 24% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sensitive Data Protection features and usability ratings that predict user satisfaction
    8.5
    Ease of Use
    Average: 8.9
    8.9
    Has the product been a good partner in doing business?
    Average: 9.4
    9.4
    Ease of Admin
    Average: 8.9
    10.0
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Google
    Year Founded
    1998
    HQ Location
    Mountain View, CA
    Twitter
    @google
    32,750,646 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    310,860 employees on LinkedIn®
    Ownership
    NASDAQ:GOOG
Product Description
How are these determined?Information
This description is provided by the seller.

Automatically discover and redact sensitive data everywhere

Users
No information available
Industries
No information available
Market Segment
  • 35% Mid-Market
  • 24% Small-Business
Sensitive Data Protection features and usability ratings that predict user satisfaction
8.5
Ease of Use
Average: 8.9
8.9
Has the product been a good partner in doing business?
Average: 9.4
9.4
Ease of Admin
Average: 8.9
10.0
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Google
Year Founded
1998
HQ Location
Mountain View, CA
Twitter
@google
32,750,646 Twitter followers
LinkedIn® Page
www.linkedin.com
310,860 employees on LinkedIn®
Ownership
NASDAQ:GOOG
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Adaptive Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Automation
    1
    Customization Features
    1
    Data Protection
    1
    Ease
    1
    Cons
    Data Privacy
    1
    Expensive
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adaptive features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Atlanta, US
    LinkedIn® Page
    www.linkedin.com
    15 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Adaptive is a cloud security company with a modern approach to data protection with its unique control plane that safeguards data and brokers’ access to human and non-human identities. The Adaptive ar

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Adaptive Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Automation
1
Customization Features
1
Data Protection
1
Ease
1
Cons
Data Privacy
1
Expensive
1
Adaptive features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
0.0
No information available
0.0
No information available
Seller Details
HQ Location
Atlanta, US
LinkedIn® Page
www.linkedin.com
15 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Dasera secures sensitive data by finding, flagging, and fixing data risks automatically and continuously. This enables security teams to proactively prevent breaches and data teams to have high-qual

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Dasera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Data Security
    1
    Easy Integrations
    1
    Security
    1
    Cons
    Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Dasera features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Dasera
    Year Founded
    2019
    HQ Location
    Mountain View, California
    Twitter
    @DaseraInc
    117 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Dasera secures sensitive data by finding, flagging, and fixing data risks automatically and continuously. This enables security teams to proactively prevent breaches and data teams to have high-qual

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Dasera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Data Security
1
Easy Integrations
1
Security
1
Cons
Complexity
1
Dasera features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Dasera
Year Founded
2019
HQ Location
Mountain View, California
Twitter
@DaseraInc
117 Twitter followers
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Symmetry Systems DataGuard is a Data Security Posture Management solution for modern hybrid-cloud environments. It is designed to help CISO’s and senior IT and business decision makers develop a compl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 80% Enterprise
    • 20% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DataGuard Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    3
    Protection
    3
    Security
    3
    Reliability
    2
    Backup Ease
    1
    Cons
    Complex Configuration
    1
    Complexity
    1
    Expensive
    1
    Feature Complexity
    1
    Poor Customer Support
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DataGuard features and usability ratings that predict user satisfaction
    9.7
    Ease of Use
    Average: 8.9
    9.6
    Has the product been a good partner in doing business?
    Average: 9.4
    9.2
    Ease of Admin
    Average: 8.9
    3.3
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    San Francisco, US
    LinkedIn® Page
    www.linkedin.com
    44 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Symmetry Systems DataGuard is a Data Security Posture Management solution for modern hybrid-cloud environments. It is designed to help CISO’s and senior IT and business decision makers develop a compl

Users
No information available
Industries
No information available
Market Segment
  • 80% Enterprise
  • 20% Mid-Market
DataGuard Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
3
Protection
3
Security
3
Reliability
2
Backup Ease
1
Cons
Complex Configuration
1
Complexity
1
Expensive
1
Feature Complexity
1
Poor Customer Support
1
DataGuard features and usability ratings that predict user satisfaction
9.7
Ease of Use
Average: 8.9
9.6
Has the product been a good partner in doing business?
Average: 9.4
9.2
Ease of Admin
Average: 8.9
3.3
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Year Founded
2019
HQ Location
San Francisco, US
LinkedIn® Page
www.linkedin.com
44 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Data Rover plays a key role in business asset protection and corporate data management policy definition. Data Rover provides precise information on access privileges to files/folders on corporate st

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Data Rover EP Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    4
    Access Control
    3
    Email Security
    2
    Features
    2
    Compliance
    1
    Cons
    Access Control
    2
    Access Management
    1
    Complexity
    1
    Difficult Setup
    1
    File Management
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Data Rover EP features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Bexhill-on-Sea, GB
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Data Rover plays a key role in business asset protection and corporate data management policy definition. Data Rover provides precise information on access privileges to files/folders on corporate st

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Data Rover EP Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
4
Access Control
3
Email Security
2
Features
2
Compliance
1
Cons
Access Control
2
Access Management
1
Complexity
1
Difficult Setup
1
File Management
1
Data Rover EP features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2015
HQ Location
Bexhill-on-Sea, GB
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DryvIQ is the smarter way to get your content business-ready—and make your data work for you, not against you. With our platform, insights are instant, compliance is effortless, and every decision is

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 38% Mid-Market
    • 38% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DryvIQ Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Transfer
    2
    Ease of Use
    2
    Analytics
    1
    Automation
    1
    Data Discovery
    1
    Cons
    Navigation Issues
    2
    Poor Interface Design
    2
    Poor Navigation
    2
    Difficult Interface
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DryvIQ features and usability ratings that predict user satisfaction
    8.8
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    9.3
    Ease of Admin
    Average: 8.9
    5.8
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DryvIQ
    Year Founded
    2012
    HQ Location
    Ann Arbor,MI
    Twitter
    @dryviq
    1,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    43 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DryvIQ is the smarter way to get your content business-ready—and make your data work for you, not against you. With our platform, insights are instant, compliance is effortless, and every decision is

Users
No information available
Industries
No information available
Market Segment
  • 38% Mid-Market
  • 38% Small-Business
DryvIQ Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Transfer
2
Ease of Use
2
Analytics
1
Automation
1
Data Discovery
1
Cons
Navigation Issues
2
Poor Interface Design
2
Poor Navigation
2
Difficult Interface
1
Difficult Learning
1
DryvIQ features and usability ratings that predict user satisfaction
8.8
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
9.3
Ease of Admin
Average: 8.9
5.8
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
DryvIQ
Year Founded
2012
HQ Location
Ann Arbor,MI
Twitter
@dryviq
1,662 Twitter followers
LinkedIn® Page
www.linkedin.com
43 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Entro Security is the first and #1 Non-human identity management platform . NHIM refers to managing and securing digital identities such as API keys, tokens and encryption keys . Non- Human identit

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Entro Security features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    8.3
    Ease of Admin
    Average: 8.9
    3.3
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Cambridge, US
    LinkedIn® Page
    www.linkedin.com
    42 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Entro Security is the first and #1 Non-human identity management platform . NHIM refers to managing and securing digital identities such as API keys, tokens and encryption keys . Non- Human identit

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Entro Security features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
8.3
Ease of Admin
Average: 8.9
3.3
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Year Founded
2022
HQ Location
Cambridge, US
LinkedIn® Page
www.linkedin.com
42 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Kogni is a global leader in the data and privacy security market. Kogni continuously discovers, classifies and protects sensitive data across organizations, regardless of source or location of data. K

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Kogni Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Classification
    1
    Cons
    Performance Issues
    1
    Slow Data Transfer
    1
    Slow Performance
    1
    Slow Speed
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Kogni features and usability ratings that predict user satisfaction
    6.7
    Ease of Use
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Kogni
    Year Founded
    2017
    HQ Location
    Chandler, US
    Twitter
    @kogni_io
    1,428 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    3 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Kogni is a global leader in the data and privacy security market. Kogni continuously discovers, classifies and protects sensitive data across organizations, regardless of source or location of data. K

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Kogni Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Classification
1
Cons
Performance Issues
1
Slow Data Transfer
1
Slow Performance
1
Slow Speed
1
Kogni features and usability ratings that predict user satisfaction
6.7
Ease of Use
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Kogni
Year Founded
2017
HQ Location
Chandler, US
Twitter
@kogni_io
1,428 Twitter followers
LinkedIn® Page
www.linkedin.com
3 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privacera, based in Fremont, CA, was founded in 2016 by the creators of Apache Ranger™ and Apache Atlas. Delivering trusted and timely access to data consumers, Privacera provides data privacy, securi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Privacera Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    API Integration
    1
    Cloud Computing
    1
    Compliance
    1
    Compliance Management
    1
    Cons
    Complex Coding
    1
    Complex Implementation
    1
    Complexity
    1
    Complexity Issues
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privacera Data Security Platform features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Hayward, CA
    Twitter
    @privacera
    495 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privacera, based in Fremont, CA, was founded in 2016 by the creators of Apache Ranger™ and Apache Atlas. Delivering trusted and timely access to data consumers, Privacera provides data privacy, securi

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Privacera Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
API Integration
1
Cloud Computing
1
Compliance
1
Compliance Management
1
Cons
Complex Coding
1
Complex Implementation
1
Complexity
1
Complexity Issues
1
Difficult Learning
1
Privacera Data Security Platform features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
HQ Location
Hayward, CA
Twitter
@privacera
495 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protect sensitive data and increase security, privacy, and compliance across the enterprise.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ServiceNow Vault features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2004
    HQ Location
    Santa Clara, CA
    Twitter
    @servicenow
    51,662 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    32,224 employees on LinkedIn®
    Ownership
    NYSE:NOW
Product Description
How are these determined?Information
This description is provided by the seller.

Protect sensitive data and increase security, privacy, and compliance across the enterprise.

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ServiceNow Vault features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2004
HQ Location
Santa Clara, CA
Twitter
@servicenow
51,662 Twitter followers
LinkedIn® Page
www.linkedin.com
32,224 employees on LinkedIn®
Ownership
NYSE:NOW
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ShardSecure offers a Virtual Appliance that can be deployed in the Cloud or On-premises that uses Microshard technology to ensure data security and privacy. The appliance ingests data via iSCSI, S3 Co

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ShardSecure Engine features and usability ratings that predict user satisfaction
    10.0
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    10.0
    Ease of Admin
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    New York, New York
    LinkedIn® Page
    www.linkedin.com
    16 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ShardSecure offers a Virtual Appliance that can be deployed in the Cloud or On-premises that uses Microshard technology to ensure data security and privacy. The appliance ingests data via iSCSI, S3 Co

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
ShardSecure Engine features and usability ratings that predict user satisfaction
10.0
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
10.0
Ease of Admin
Average: 8.9
0.0
No information available
Seller Details
HQ Location
New York, New York
LinkedIn® Page
www.linkedin.com
16 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Leading Kubernetes Data Protection and Mobility Trusted by the world’s largest organizations, Veeam Kasten delivers secure, Kubernetes-native data protection and application mobility for the most

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 36% Enterprise
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Veeam Kasten for Kubernetes Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Backup
    1
    Performance
    1
    Cons
    Expensive
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Veeam Kasten for Kubernetes features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.9
    8.8
    Has the product been a good partner in doing business?
    Average: 9.4
    9.2
    Ease of Admin
    Average: 8.9
    3.3
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Veeam
    Year Founded
    2006
    HQ Location
    Columbus, OH
    Twitter
    @veeam
    51,963 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    6,186 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Leading Kubernetes Data Protection and Mobility Trusted by the world’s largest organizations, Veeam Kasten delivers secure, Kubernetes-native data protection and application mobility for the most

Users
No information available
Industries
No information available
Market Segment
  • 36% Enterprise
  • 36% Small-Business
Veeam Kasten for Kubernetes Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Backup
1
Performance
1
Cons
Expensive
1
Integration Issues
1
Veeam Kasten for Kubernetes features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.9
8.8
Has the product been a good partner in doing business?
Average: 9.4
9.2
Ease of Admin
Average: 8.9
3.3
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Veeam
Year Founded
2006
HQ Location
Columbus, OH
Twitter
@veeam
51,963 Twitter followers
LinkedIn® Page
www.linkedin.com
6,186 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Bonfy delivers adaptive content security tailored to your business, ensuring your GenAI initiatives stay secure and compliant. Powered by AI and self-learning algorithms—not legacy pattern-matching—Bo

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Adaptive Content Security features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Bonfy.AI
Product Description
How are these determined?Information
This description is provided by the seller.

Bonfy delivers adaptive content security tailored to your business, ensuring your GenAI initiatives stay secure and compliant. Powered by AI and self-learning algorithms—not legacy pattern-matching—Bo

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Adaptive Content Security features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Bonfy.AI
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Data Protection That Just Works Breakthrough encryption-in-use technology Search and analyze data without decrypting it. Fine-grained programmable access controls Grant field-level permissions

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Blind Insight Data Protection Suite features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Santa Monica, US
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Data Protection That Just Works Breakthrough encryption-in-use technology Search and analyze data without decrypting it. Fine-grained programmable access controls Grant field-level permissions

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Blind Insight Data Protection Suite features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2022
HQ Location
Santa Monica, US
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
0 ratings
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Borneo is an end-to-end Cloud Data Risk Remediation and Privacy Automation Platform. Borneo’s unique approach starts with real-time data discovery to give you complete visibility about your data footp

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Borneo features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Borneo
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Borneo is an end-to-end Cloud Data Risk Remediation and Privacy Automation Platform. Borneo’s unique approach starts with real-time data discovery to give you complete visibility about your data footp

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Borneo features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Borneo
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Calamu Protect features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Calamu
    LinkedIn® Page
    www.linkedin.com
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Calamu Protect features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Calamu
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A modern approach to security IT security teams are faced with the challenge of securing data spread across various environments, including data centers, private clouds, and SaaS applications. What w

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cloud Data Protection features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Fortra
    Company Website
    Year Founded
    1982
    HQ Location
    Eden Prairie, Minnesota
    Twitter
    @fortraofficial
    2,461 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,643 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A modern approach to security IT security teams are faced with the challenge of securing data spread across various environments, including data centers, private clouds, and SaaS applications. What w

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Cloud Data Protection features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Fortra
Company Website
Year Founded
1982
HQ Location
Eden Prairie, Minnesota
Twitter
@fortraofficial
2,461 Twitter followers
LinkedIn® Page
www.linkedin.com
1,643 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    We proactively embed security into the sensitive information within your vast unstructured data—the lifeblood of your operations. These are documents your teams create, store, and share every day. By

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Confidencial.io features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2021
    HQ Location
    Menlo Park, US
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

We proactively embed security into the sensitive information within your vast unstructured data—the lifeblood of your operations. These are documents your teams create, store, and share every day. By

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Confidencial.io features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2021
HQ Location
Menlo Park, US
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Cyera is the cloud data security company that gives businesses context and control over their cloud data. Our mission is to empower security teams to enable innovation, securely. As the industry’s mos

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Cyera Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    1
    Ease of Use
    1
    Protection
    1
    Quick Process
    1
    Cons
    Cloud Dependency Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Cyera features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.9
    10.0
    Has the product been a good partner in doing business?
    Average: 9.4
    8.3
    Ease of Admin
    Average: 8.9
    3.3
    What is your organization's estimated ROI on the product (payback period in months)?
    Average: 10
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Cyera
    Twitter
    @GetEasyAudit
    17 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Cyera is the cloud data security company that gives businesses context and control over their cloud data. Our mission is to empower security teams to enable innovation, securely. As the industry’s mos

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Cyera Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
1
Ease of Use
1
Protection
1
Quick Process
1
Cons
Cloud Dependency Issues
1
Cyera features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.9
10.0
Has the product been a good partner in doing business?
Average: 9.4
8.3
Ease of Admin
Average: 8.9
3.3
What is your organization's estimated ROI on the product (payback period in months)?
Average: 10
Seller Details
Seller
Cyera
Twitter
@GetEasyAudit
17 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforc

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DTEX inTERCEPT features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Saratoga, California
    Twitter
    @DtexSystems
    1,521 Twitter followers
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

DTEX InTERCEPT™ consolidates Data Loss Prevention, User Activity Monitoring, and User Behavior Analytics in one lightweight platform to enable organizations to achieve a trusted and protected workforc

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DTEX inTERCEPT features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Company Website
HQ Location
Saratoga, California
Twitter
@DtexSystems
1,521 Twitter followers
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    e-Safe implements multi-level encryption to protect sensitive data from access by unauthorised users, both internal and external, while still allowing staff to work and collaborate productively.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • e-Safe Compliance Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compliance
    1
    Compliance Management
    1
    Configuration
    1
    Configuration Ease
    1
    Data Protection
    1
    Cons
    Complexity
    1
    Dashboard Issues
    1
    Learning Curve
    1
    Poor Interface Design
    1
    Software Complexity
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • e-Safe Compliance features and usability ratings that predict user satisfaction
    8.3
    Ease of Use
    Average: 8.9
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

e-Safe implements multi-level encryption to protect sensitive data from access by unauthorised users, both internal and external, while still allowing staff to work and collaborate productively.

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
e-Safe Compliance Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compliance
1
Compliance Management
1
Configuration
1
Configuration Ease
1
Data Protection
1
Cons
Complexity
1
Dashboard Issues
1
Learning Curve
1
Poor Interface Design
1
Software Complexity
1
e-Safe Compliance features and usability ratings that predict user satisfaction
8.3
Ease of Use
Average: 8.9
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Forcepoint Data Security Posture Management (DSPM) reduces the risk of data breaches and non-compliance with privacy regulations by tackling the challenge of data proliferation across cloud platforms

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Forcepoint DSPM features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Austin, TX
    Twitter
    @Forcepointsec
    66,473 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,784 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Forcepoint Data Security Posture Management (DSPM) reduces the risk of data breaches and non-compliance with privacy regulations by tackling the challenge of data proliferation across cloud platforms

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Forcepoint DSPM features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1994
HQ Location
Austin, TX
Twitter
@Forcepointsec
66,473 Twitter followers
LinkedIn® Page
www.linkedin.com
1,784 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Guardium Data Security Center features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    328,966 employees on LinkedIn®
    Ownership
    SWX:IBM
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
IBM Guardium Data Security Center features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
328,966 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Integral focuses on compliantly connecting health data in a secure and efficient manner, serving as the only end-to-end regulated insights platform transforming compliance barriers into competitive ad

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Integral features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
Product Description
How are these determined?Information
This description is provided by the seller.

Integral focuses on compliantly connecting health data in a secure and efficient manner, serving as the only end-to-end regulated insights platform transforming compliance barriers into competitive ad

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Integral features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    At NextLabs, we empower intelligent enterprises by providing industry-leading zero trust security solutions to protect business-critical data and applications everywhere. While traditional methods foc

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Nextlabs CloudAz features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    NextLabs
    Year Founded
    2004
    HQ Location
    San Mateo, CA
    Twitter
    @nextlabs
    399 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    181 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

At NextLabs, we empower intelligent enterprises by providing industry-leading zero trust security solutions to protect business-critical data and applications everywhere. While traditional methods foc

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Nextlabs CloudAz features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
NextLabs
Year Founded
2004
HQ Location
San Mateo, CA
Twitter
@nextlabs
399 Twitter followers
LinkedIn® Page
www.linkedin.com
181 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PHEMI Health DataLab Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Data Privacy
    1
    Data Security
    1
    Deployment Flexibility
    1
    Ease of Management
    1
    Cons
    Connector Issues
    1
    Data Management Issues
    1
    Data Privacy
    1
    Data Security
    1
    Dependency Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PHEMI Health DataLab features and usability ratings that predict user satisfaction
    9.6
    Ease of Use
    Average: 8.9
    6.7
    Has the product been a good partner in doing business?
    Average: 9.4
    6.7
    Ease of Admin
    Average: 8.9
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Vancouver, British Columbia
    Twitter
    @PHEMIsystems
    759 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
PHEMI Health DataLab Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Data Privacy
1
Data Security
1
Deployment Flexibility
1
Ease of Management
1
Cons
Connector Issues
1
Data Management Issues
1
Data Privacy
1
Data Security
1
Dependency Issues
1
PHEMI Health DataLab features and usability ratings that predict user satisfaction
9.6
Ease of Use
Average: 8.9
6.7
Has the product been a good partner in doing business?
Average: 9.4
6.7
Ease of Admin
Average: 8.9
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Vancouver, British Columbia
Twitter
@PHEMIsystems
759 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Sertainty features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Sertainty
    Year Founded
    2010
    HQ Location
    Nashville, US
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Sertainty features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Sertainty
Year Founded
2010
HQ Location
Nashville, US
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®

Learn More About Data-Centric Security Software

In the modern digital realm, safeguarding sensitive data has become an essential task. With the ever-increasing amount and variety of data, along with the constant evolution of cybersecurity threats and strict privacy regulations, organizations face significant hurdles in maintaining the confidentiality and integrity of their information assets.

In response to these challenges, data-centric security software has become a key solution. Let's explore its importance and how it addresses the complexities organizations face today.

What is data-centric security software?

Unlike traditional approaches that focus on fortifying network boundaries, data-centric security software prioritizes protecting data itself, regardless of its location or transmission mode.

It employs advanced techniques such as encryption, access controls, data masking, and tokenization to embed security directly into the data. By doing so, organizations mitigate the risks of data breaches, unauthorized access, and insider threats. Data encryption, one key feature of this software, makes sure that data remains unreadable and unusable to unauthorized users by encrypting it both at rest and in transit. 

Access controls enable organizations to enforce granular permissions and restrictions with regard to who can use sensitive data and which actions they can perform. Moreover, data-centric security software helps businesses remain current with various regulations like the General Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act (HIPAA) by implementing robust encryption.

What are the common features of data-centric security software?

Data-centric security software has various functions that vary by tool and use case. Some valuable features of data-centric security software include the following.

  • Data discovery refers to identifying and locating sensitive data across infrastructure. It teaches organizations how to understand the scope of their data assets and potential vulnerabilities.
  • Data classification categorizes data based on sensitivity levels so organizations can prioritize their security efforts and apply appropriate protection measures.
  • Encryption transforms data into an unreadable format. It prevents unauthorized parties from understanding the data, even if they somehow gain access.
  • Access controls restrict unauthorized access to sensitive data. This includes using role-based access control (RBAC), permissions, and multi-factor authentication (MFA).
  • Tokenization shields sensitive data while preserving format and integrity. It’s useful for testing, analytics, or outsourcing without the risk of exposing sensitive information.
  • Data loss prevention (DLP) stops unauthorized access, transmission, or storage of sensitive data. This not only protects the organization's reputation and financial assets but also ensures compliance with regulatory requirements, such as GDPR or HIPAA.
  • Data monitoring tracks data access, usage patterns, and security events. Real-time data monitoring helps Organizations rely on it to optimize resource allocation, improve operational efficiency, and enhance their overall security posture.
  • Audit trails and reporting records data access, modifications, and system events for compliance and analysis. By analyzing audit trail data, organizations identify security gaps, interpret user behavior, and detect anomalies or potential threats.
  • Risk management assesses and mitigates potential security risks. By using risk assessment solutions organizations can find vulnerabilities, threats, and potential negative impacts to their data assets. 

What types of data-centric security software exist?

Each of the various data-centric security software options presents both distinct advantages and disadvantages. Exploring them will allow an organization to tailor their choices based on specific preferences and requirements.

  • Firewall solutions monitor and control incoming and outgoing network traffic based on predetermined security rules. It’s possible to set them up at network boundaries to prevent unauthorized access and protect against malicious activities.
  • Authentication and authorization systems verify the identity of users who access data. They determine the level of access granted based on their credentials and permissions.
  • Encryption secures data by converting it into a ciphertext format that can only be solved with the appropriate decryption key. This means that even if hackers intercept data, they won’t be able to understand it.  
  • Data masking hides sensitive information in non-production environments to protect privacy by replacing sensitive data with realistic but fake data or with a masked format.
  • Hardware-based security solutions use specialized hardware components or devices to protect data. Examples include hardware security modules (HSMs) for managing encryption keys and secure enclaves for processing sensitive data in a protected environment.
  • Data backup automatically creates copies of important data to guarantee its availability in case of data loss or system failure. This process helps organizations recover quickly from disruptions by providing redundancy and failover mechanisms.
  • Data erasure securely deletes data from storage devices so unauthorized parties can’t recover it. This is crucial when retiring or replacing storage devices.

What are the benefits of data-centric security software?

The benefits of using a data-centric security software include:

  • Enhanced protection for sensitive data. Data-centric security software employs encryption, tokenization, and other advanced techniques to protect sensitive data. By focusing on securing the data itself rather than just the perimeter, the data remains encrypted and unreadable, which provides enhanced protection against breaches.
  • Regulatory compliance. Many industries are subject to strict regulations regarding protecting sensitive data, such as GDPR and HIPAA. Data-centric security software helps organizations achieve compliance by establishing robust data protection measures, including encryption, access controls, and audit trails to shrink the risk of non-compliance penalties.
  • Persistent security. Data-centric security protects data throughout the entire lifecycle, from creation and storage to transmission and disposal. By embedding security controls directly into the data, organizations maintain persistent protection regardless of where the data resides or how users access it, whether on-premises, in the cloud, or on mobile devices.
  • Access control. Businesses use data-centric security to enable granular access control. This makes it easier to define and enforce policies regarding the terms of access. RBAC, attribute-based access control (ABAC), and other access control mechanisms prevent unauthorized access.
  • Reduced operational complexity. Implementing data-centric security simplifies security management by centralizing control over data protection policies. Rather than relying on a patchwork of disparate security solutions, organizations refine their security infrastructure, reducing complexity, lower administrative overhead, and greater operational efficiency.
  • Enhanced data governance. Data-centric security facilitates better data governance by providing visibility into how users access and share sensitive data across their organizations. By monitoring data usage patterns and enforcing compliance with data policies, businesses maintain control over their data assets, reduce the risk of misuse or leakage, and demonstrate accountability to stakeholders.
  • Deterrence of insider threats. Insider threats, whether intentional or unintentional, pose a significant risk. Data-centric security software deters insider threats by limiting access to sensitive data based on the principle of least privilege, monitoring user behavior for suspicious activity, and applying data loss prevention (DLP) to prevent unauthorized exfiltration.

Data-Centric Security vs. Zero Trust

Data-centric security and Zero Trust both approach cybersecurity with a focus on enhancing protection in the digital landscape. 

Data-centric security places the utmost importance on safeguarding sensitive data, regardless of its location within the network or cloud. By employing techniques like encryption, access controls, and data classification, it protects data even if perimeter defenses are compromised. 

On the other hand, Zero Trust takes a proactive stance by assuming that threats exist inside and outside the network perimeter. It continuously verifies each user and device that wants access to resources by relying on strict access controls and least privilege principles to mitigate the risk of unauthorized access and lateral movement of threats.

Incorporating both data-centric security and Zero Trust principles work hand in hand rather than separately. 

Who uses data-centric security software?

Data-centric security software finds use with a variety of professionals and roles. Here's how:

  • Chief information security officers (CISOs) oversee the implementation and management of data-centric security measures meant to protect sensitive data.
  • Security analysts and engineers analyze security threats and vulnerabilities, configure and maintain security software, and investigate security incidents related to data breaches.
  • Data protection officers (DPOs) ensure compliance with data protection regulations and implement data-centric security measures to safeguard personal data.
  • IT and security managers handle the deployment and maintenance of data-centric security solutions to protect information assets.
  • Database administrators (DBAs) implement security controls within databases, manage access permissions, and monitor database activity to prevent unauthorized access or data breaches.
  • Compliance officers align data-centric security practices with relevant industry regulations and standards.
  • Risk management professionals assess potential harm related to data security, develop mitigation strategies, and implement security measures to reduce the likelihood of data breaches.
  • Network administrators set up network-level security controls to protect data in transit and configure firewalls or intrusion detection systems.
  • Chief data officers (CDOs) develop data governance policies and strategies to ensure the confidentiality, integrity, and availability of data assets.
  • DevOps engineers integrate data-centric security measures into software development lifecycles to identify and remediate application security vulnerabilities.
  • Systems administrators configure and maintain operating systems and server-level security controls to protect data stored on servers and endpoints within an organization's infrastructure.

Data-centric security software pricing

Each pricing model has its advantages and suitable customer scenarios. The choice of pricing model depends on factors such as budget, usage patterns, scalability requirements, and preferences for payment structure.

  • Subscription-based models have customers pay a recurring fee at regular intervals (monthly, annually) to access data-centric security solutions.
  • Perpetual licenses ask for a one-time fee for the software license, allowing buyers to use the platform indefinitely.
  • Usage-based pricing is based on the volume or usage of the tool.
  • Tiered pricing lets customers choose from different tiers or packages according to their needs and budget.
  • Freemium models are basic versions of data-centric security solutions offered for free, with advanced features or additional functionality available for a fee.
  • Volume licensing or enterprise agreements: are best for large organizations with the means to negotiate customized pricing and licensing terms.
  • Feature-based pricing is determined by the specific features or modules of the data-centric security solution that customers choose to use.
  • Pay-as-you-grow allows customers to start with a basic package and pay for additional capacity or features as their needs grow.


Return on investment (ROI) for data-centric security platforms 

  • Scalability and flexibility determine how effectively organizations adapt to changing security needs and accommodate growth without significant additional investment.
  • Integration capabilities with existing infrastructure and systems can boost ROI by paring down operations, reducing manual effort, and avoiding duplication of resources.
  • The total cost of ownership (TCO) of the software, including initial implementation costs, ongoing maintenance fees, and any necessary training or support, directly influences ROI.
  • The speed and efficiency of incident detection and response facilitated by the software minimize the impact of security breaches, reducing downtime and associated costs.
  • Automation and analytics enhance operational efficiency, which allows security teams to focus on high-priority tasks and potentially reduces the need for additional personnel.
  • Actionable insights and intelligence empower proactive security measures, mitigating risks.
  • User adoption and ease of use prevent employee resistance.

Challenges with data-centric security software

Some common challenges with data-centric security software are discussed here.

  • Complexity of data discovery and classification: Identifying sensitive data within vast datasets and accurately classifying it overwhelms IT departments across industries. Automated tools may struggle to accurately detect all sensitive data types, leading to potential gaps in protection.
  • Integration with existing systems: Integrating data-centric security solutions with existing IT infrastructure, including databases, file systems, and cloud services, complicates operations. Compatibility issues may arise, requiring careful planning and coordination to guarantee smooth integration without disrupting existing operations.
  • Performance overhead: Implementing robust data-centric security measures can introduce performance overhead, especially in environments with high data throughput requirements. Balancing security needs with performance considerations helps avoid damaging system responsiveness or user experience.
  • Scalability: Data-centric security solutions must scale effectively to accommodate growing demands. Scalability involves designing systems that can handle increasing volumes of data and user activity without sacrificing security or performance.
  • Changes to data structure: Adapting data-centric security software to accommodate changes in data structure, such as schema updates or migrations to new platforms, presents significant burdens. It requires ongoing monitoring and adjustment to keep up with the protection of sensitive information.
  • Costs: Implementing and sustaining data-centric security solutions cost a lot. They involve expenses related to software licensing, hardware infrastructure, training, and ongoing support. Organizations must carefully evaluate the cost-benefit ratio to justify investments.
  • Training and expertise: Effective deployment and management of data-centric security software require specialized knowledge and expertise. Organizations need to invest in training programs to ensure that staff members know how to use and maintain these solutions.

Which companies should buy data-centric security software?

Below are some examples of companies that should consider buying data-centric security software.

  • Financial institutions deal with highly sensitive data, making them prime cyberattack targets. Data-centric security software can help protect customer information, transaction data, and other relevant records.
  • Healthcare organizations handle personal health information (PHI) and medical records. Data-centric security software ensures compliance with regulations like HIPAA and protects against data breaches.
  • Government agencies store a wealth of information that includes citizen data, national security information, and government operations data. It all stays safe thanks to data-centric security software.
  • Technology companies often have access to valuable intellectual property, proprietary information, and customer data. Data-centric security software can protect against data theft, industrial espionage, and unauthorized access.
  • Retail and e-commerce businesses collect and store customer payment information, personal details, and purchase history. The right security software can protect customer trust by preventing breaches.
  • Educational institutions hold onto student records, research data, and proprietary information that require protection against cyber threats. Data-centric software provides this protection and also ensures compliance with student privacy regulations.
  • Corporate enterprises deal with sensitive business data, employee records, and intellectual property. They need data-centric security software to protect against insider threats, external attacks, and data leaks.

How to choose data-centric security software

Choosing data-centric security software depends on specific needs, preferences, and work. Here's a concise guide to help find the right solution:

  • Understand the organization's security requirements, including the types of sensitive data handled and relevant compliance regulations like GDPR or HIPAA.
  • Evaluate data-centric security technologies and prioritize features based on what is needed, such as encryption for PII or data discovery for compliance.
  • Research each vendor's reputation, future product development plans, financial stability, and quality of customer support.
  • Consider deployment options (on-premises, cloud, hybrid) and confirm that the vendor’s pricing structures align with the budget and operational needs.
  • Create a shortlist of solutions, conduct trials, gather feedback, and consider factors like functionality, integration, and user experience to make an informed decision.