Alternatives to Lepide Data Security Platform

Compare Lepide Data Security Platform alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Lepide Data Security Platform in 2026. Compare features, ratings, user reviews, pricing, and more from Lepide Data Security Platform competitors and alternatives in order to make an informed decision for your business.

  • 1
    Safetica

    Safetica

    Safetica

    Safetica’s Intelligent Data Security protects sensitive data where teams work, using powerful AI to deliver contextual awareness, reduce false positives, and stop real threats without disrupting productivity. With Safetica, security teams can maintain visibility and control over sensitive data, stay ahead of insider risks, maintain compliance, and secure sensitive cloud-based data. ✔️ Data Protection: Classify, monitor and control sensitive data across devices and clouds in real time. ✔️ Insider Risk and User Behavior: Spot risky behavior, detect intent, and stop insider threats to stay ahead of the careless handling of sensitive data, compromised user accounts and malicious user activity. ✔️ Compliance and Data Discovery: Prove compliance with audit-ready reporting for data in use, in motion, and at rest. ✔️ Cloud Security: Protect Microsoft 365, cloud, and file-sharing platforms to secure sensitive cloud-based data.
    Leader badge
    Partner badge
    Compare vs. Lepide Data Security Platform View Software
    Visit Website
  • 2
    ManageEngine Log360
    Detect, investigate, and resolve security incidents and threats using a single, scalable SIEM solution. Log360 provides you with actionable insights and analytics-driven intelligence for real-time security monitoring, advanced threat detection, incident management, and behavioral analytics-based anomaly detection. Built as the bedrock for your SOC, ManageEngine Log360 comes with out-of-the-box correlation and workflow rules, dashboards, reports, and alert profiles to help you address vital security issues with little manual intervention.
    Compare vs. Lepide Data Security Platform View Software
    Visit Website
  • 3
    Varonis Data Security Platform
    The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities.
  • 4
    Egnyte

    Egnyte

    Egnyte

    Egnyte provides a unified content security and governance solution for collaboration, data security, compliance, and threat detection for multicloud businesses. More than 16,000 organizations trust Egnyte to reduce risks and IT complexity, prevent ransomware and IP theft, and boost employee productivity on any app, any cloud, anywhere.
  • 5
    PK Protect
    PK Protect is a data protection platform designed to help organizations safeguard sensitive information across diverse environments. It provides robust tools for data discovery, classification, encryption, and monitoring, ensuring that critical data is protected both at rest and in transit. With automated policies and compliance controls, PK Protect enables businesses to meet regulatory requirements like GDPR and HIPAA while minimizing the risk of data breaches. The platform integrates with various systems to provide a unified approach to managing data security across cloud, on-premises, and hybrid environments. By offering real-time visibility and proactive threat detection, PK Protect helps organizations maintain control over their sensitive data and reduce security vulnerabilities.
  • 6
    SISA Radar

    SISA Radar

    SISA Information Security

    Helping organizations improve data protection with data discovery, file analysis and classification. Secure your entire data ecosystem with SISA Radar data discovery and data classification. Organize and classify sensitive data based on the criticality and business needs. Gain contextual information to improve sensitive data management. Gain visibility into structured, semi-structured and unstructured sensitive data. Protect data from unauthorized access. Meet compliance standards of PCI DSS, GDPR, CCPA, POPIA, PDPA, APRA and other privacy regulations Create and customize your own data classification scheme. Embrace a scalable and future-proof approach to next-gen data security. A single platform to discover, identify and contextualize sensitive data. A proprietary data discovery algorithm for faster detection and lower false positives.
  • 7
    Verosint

    Verosint

    Verosint

    Verosint's Threat Detection, Investigation and Response platform provides real-time, intelligent ITDR for both workforce and customer identities. -Fastest MTTD & MTTR: Detect and respond to Identity based threats faster than anyone else in the industry -Detect Advanced Threats: Spot session hijacking, credential stuffing, account takeovers and more -Investigate Efficiently: Our customers say investigating incidents has gone from days to minutes with our AI Insights, unparalleled visibility and intelligence -Remediate Quickly: Automatically resolve identity threats with our integrated remediation playbooks -Easy to Deploy: Deploys in 60 minutes or less
  • 8
    Seclore Data-Centric Security Platform
    Integrate and automate best-of-breed data security solutions. Take control of your destiny. With Seclore’s Data-Centric Security Platform you can unify best-of-breed Data-Centric Security solutions into a cohesive, automated framework without added integration costs. While DLP, Classification, and Rights Management each have their strengths, together they ensure documents are properly protected and tracked wherever they travel. And let’s not forget your existing Enterprise systems! EFSS, eMail, ECM, Directories, and SIEM can be easily added to the framework to further automate the process. Seamlessly unite best-in-class DLP, Data Classification, Rights Management and SIEM systems into an automated process for superior information security without added integration costs. The Seclore Unified Policy Manager enables you to orchestrate identity management, policy management, connectivity, encryption, and the collection of document usage insights.
  • 9
    Cyberhaven

    Cyberhaven

    Cyberhaven

    Cyberhaven’s Dynamic Data Tracing technology is a transformative approach to preventing IP theft and other insider threats. Automatically track and analyze the entire journey of your data from its creation through every user interaction. Continuous risk assessment proactively finds unsafe behaviors and practices before they lead to a breach. Full-context data tracing makes policies simpler and more effective with far fewer false positives and user disruptions. In-context user education and coaching drives better behavior and adherence to security best practices. Whether due to malicious actions or a moment of carelessness, data loss can have devastating financial and reputational impacts. Automatically classify sensitive data based on data origin, its creator, and content. Find data even if you didn’t know where to look. Proactively find and mitigate risks whether due to malicious insiders, unsafe behavior, or simple user mistakes.
  • 10
    ManageEngine DataSecurity Plus
    ManageEngine DataSecurity Plus enables organizations to gain deep visibility and control into how sensitive data is stored and shared across the enterprise. It monitors file integrity, detects insider threats, tracks and controls file movement across USBs, email, and cloud apps, etc. The solution also supports automated incident response, file permission analysis, ransomware detection, and regulatory compliance, helping businesses maintain a resilient and secure data environment.
  • 11
    Amazon GuardDuty
    Amazon GuardDuty is a threat detection service that continuously monitors for malicious activity and unauthorized behavior to protect your AWS accounts, workloads, and data stored in Amazon S3. With the cloud, the collection and aggregation of account and network activities is simplified, but it can be time consuming for security teams to continuously analyze event log data for potential threats. With GuardDuty, you now have an intelligent and cost-effective option for continuous threat detection in AWS. The service uses machine learning, anomaly detection, and integrated threat intelligence to identify and prioritize potential threats. GuardDuty analyzes tens of billions of events across multiple AWS data sources, such as AWS CloudTrail event logs, Amazon VPC Flow Logs, and DNS logs. With a few clicks in the AWS Management Console, GuardDuty can be enabled with no software or hardware to deploy or maintain.
  • 12
    QOMPLX

    QOMPLX

    QOMPLX

    QOMPLX Identity Threat Detection and Response (ITDR) continuously validates to prevent network takeovers. QOMPLX ITDR uncovers existing Active Directory (AD) misconfigurations and detects attacks in real time. Identity security is essential to network operations. Verify identity in real-time. We verify everyone to prevent privilege escalation and lateral movement. We integrate with your current security stack and use it to augment our analytics resulting in comprehensive visibility. Understand the priority and severity of threats so resources can spend time where it matters most. Real-time detection and prevention stop attackers from bypassing security measures. From Active Directory (AD) security to red teaming and more, our experts are here to support your needs. QOMPLX enables clients to holistically manage and reduce cybersecurity risks. Our analysts will implement our SaaS solutions and monitor your environment.
  • 13
    Splunk User Behavior Analytics
    Securing against unknown threats through user and entity behavior analytics. Discover abnormalities and unknown threats that traditional security tools miss. Automate stitching of hundreds of anomalies into a single threat to simplify a security analyst’s life. Use deep investigative capabilities and powerful behavior baselines on any entity, anomaly or threat. Automate threat detection using machine learning so you can spend more time hunting with higher fidelity behavior-based alerts for quick review and resolution. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types (65+) and threat classifications (25+) across users, accounts, devices and applications. Rapidly identify anomalous entities without human analysis. Rich set of anomaly types and threat classifications (25+) across users, accounts, devices and applications. Organizations gain maximum value to detect and resolve threats and anomalies via the power of human and machine-driven solutions.
  • 14
    Quest Security Guardian
    Quest Security Guardian is an Active Directory (AD) security tool designed to enhance identity threat detection and response and improve your AD security posture. Operating from a streamlined, unified workspace, it alleviates alert fatigue by prioritizing vulnerabilities and configurations, making it easier to maximize hybrid AD security. Powered by Azure AI and deep machine learning, and seamlessly integrated with Microsoft Security Copilot, Security Guardian quickly identifies what happened, if you're exposed, and how to remediate. It allows you to benchmark your AD and Entra ID configurations against industry best practices, lock down critical objects such as Group Policy Objects (GPOs) from misconfiguration and compromise, and continuously monitor for anomalous user activities and emerging hacker tactics. By leveraging cross-product AI insights from Microsoft Security Copilot, it simplifies and accelerates threat detection and response.
  • 15
    Falcon Identity Threat Detection
    Falcon Identity Threat Detection lets you see all Service and Privileged accounts on your network and cloud with full credential profiles and weak authentication discovery across every domain. Analyze every domain in your organization for potential vulnerability from stale credentials, and weak or stale passwords, see all service connections and weak authentication protocols in use. Falcon Identity Threat Detection monitors the domain controllers on-premises or in the cloud (via API) to see all authentication traffic. It creates a baseline for all entities and compares behavior against unusual lateral movement, Golden Ticket attacks, Mimikatz traffic patterns and other related threats. It can help you see Escalation of Privilege and anomalous Service Account activity. Falcon Identity Threat Detection reduces the time to detect by viewing live authentication traffic, which expedites finding and resolving incidents.
  • 16
    SmartFlow

    SmartFlow

    Solana Networks

    SmartFlow is an IT cyber security monitoring tool that uses Anomaly Detection to pinpoint hard-to-detect security threats. SmartFlow complements existing signature based security monitoring tools. It analyzes network flow traffic to detect zero-day security attacks. Smartflow is an appliance based solution and targeted for medium and large enterprises. SmartFlow utilizes patent-pending anomaly detection techniques and network behaviour analysis to identify security threats in a network. It applies Solana algorithms on flow data such as Netflow to detect address scans, DDoS attacks, Botnets, port scans, malware etc. Zero day threats and encrypted malicious traffic (such as Botnet Command & Control) may escape detection by signature-based security monitoring tools. However, they will not escape detection by SmartFlow. SmartFlow distills network traffic and flow data into more than 20 different statistical measures which it continuously analyzes for early warnings of cyber threats.
  • 17
    ClearVector

    ClearVector

    ClearVector

    ClearVector is an identity-driven security platform designed to provide real-time detection, investigation, and containment of threats across cloud-native environments. It offers instant notifications of risky activity with the ability to stop and isolate incidents with a single click, enabling rapid decision-making and accountability. ClearVector allows users to investigate incidents by identifying who made changes and why, applying existing incident response knowledge to AWS or GCP environments. ClearVector extends its identity-driven security framework into AWS S3 buckets through its bucket intelligence capability, offering real-time identity attribution for all bucket operations, detailed metrics, and rapid detection of suspicious activities. It also supports deployment directly within AWS environments via ClearVector Private SaaS, ensuring complete data isolation and compliance with data sovereignty requirements.
  • 18
    Kogni

    Kogni

    Kogni

    Kogni's Discover feature enables enterprises to locate and detect all sensitive and critical information. Discover sensitive data from any source, in any format and in any type. Employ Kogni’s expert sensitive data discovery software to automate data discovery and classification. Our ease of implementation allows for seamless integration with your enterprise’s data warehouse. Accelerate compliance with international data regulations and industry standards with Kogni’s sensitive data discovery tool. Minimize the risk of data leak and the cost of non-compliance with data protection and privacy regulations like HIPAA, GDPR, CCPA, PCI, and PII amongst others. Scans and pin-points sensitive data from 10+ data sources. Produces a comprehensive sensitive information dashboard with an array of special features. Custom-build your sensitive data classification groups as per your company’s needs. Supports a wide range of data types and formats.
  • 19
    Bedrock Security

    Bedrock Security

    Bedrock Security

    At Bedrock Security, frictionless data security means freedom to embrace cloud and AI data growth safely, without slowing your business down. Start your data security journey, and confidently move beyond just visibility. Understand your material data with AI reasoning and ensure cloud and GenAI compliance controls are enforced with out-of-the-box compliance frameworks. Your data isn’t static, it’s growing, changing, and moving, making it critical for you to perform security assessments continuously. Efficiently manage remediation and response, integrating behavior-based anomaly detection, SIEM/SOAR integration, policy enforcement, and prioritization based on data context. Mature security programs can frictionlessly enable business operations while effectively managing risk to the brand, revenue, and reputation of the organization. Bedrock’s AIR helps organizations with data minimization, identity and access minimization, and data hardening.
  • 20
    SearchInform FileAuditor
    SearchInform FileAuditor is a DCAP solution (data-centric audit and protection) for automated audit of information storages, search for access violations and tracking changes made to critical data. The system protects confidential documents from careless and deliberate malicious actions of employees and puts things in order in file storages. The system performs: •Classification of vulnerable data Finds files in a document flow that contain critical information, and adds a special mark to each file, indicating the type of info it contains: personal data, trade secret, credit card numbers, etc. •Access rights audit Controls access rights to information (full access, editing, reading, writing, reading and changing, etc.). Finds confidential files stored in violation of established security rules . •Monitoring and blocking user actions Audits user operations with the file system. •Critical documents archiving Makes shadow copies of critical files.
  • 21
    Ingalls MDR

    Ingalls MDR

    Ingalls Information Security

    Our Managed Detection and Response (MDR) service is designed for advanced detection, threat hunting, anomaly detection and response guidance utilizing a defense-in-depth approach which monitors and correlates network activity with endpoints, logs and everything in between. Unlike a traditional Managed Security Service Provider (MSSP), our service is geared toward proactive prevention. We do this by utilizing the very latest in cloud, big data analytics technology, and machine learning along with the cybersecurity industry’s leading incident response team, to identify threats to your environment. We leverage the best of the commercial, open source, and internally-developed tools and methods to provide the highest fidelity of monitoring possible. We have partnered with Cylance to provide the best endpoint threat detection and prevention capability available on the market today, CylancePROTECT(™).
  • 22
    Trellix Security Platform
    Trellix provides a comprehensive, AI-powered security platform designed to help organizations build resilience and reduce risk across multiple domains, including endpoint, email, network, data, cloud, and security operations. The platform integrates generative and predictive AI to enhance threat detection, guided investigations, and threat landscape contextualization, ensuring the highest efficacy in responding to cyber threats. With a resilient architecture capable of supporting on-premises, hybrid, and cloud environments, Trellix enables businesses to stay ahead of evolving threats while saving significant time and resources in security operations.
  • 23
    Wraith

    Wraith

    NetCentrics

    Rapid cloud adoption coupled with the complexities of multi-cloud environments and siloed security teams creates a critical visibility gap for many organizations. Wraith addresses this challenge by offering unparalleled visibility and threat-hunting capabilities across on-premise, hybrid, and multi-cloud architectures. These capabilities are enhanced by AI-enabled anomaly detection, making Wraith an essential tool for neutralizing hidden threats to secure and defend cloud environments. Wraith provides comprehensive multi-terrain visibility, allowing security teams to monitor assets and activities across different Cloud Service Providers (CSPs) with a single tool set. This ensures a unified security posture and faster threat response across diverse and complex cloud environments.
  • 24
    Revelock

    Revelock

    Revelock

    We build a digital fingerprint for each user based on biometric, behavioral, device, IP and network data, then continuously verify users across the user journey. In addition to detection, we empower you to configure policies that automatically respond to malware, phishing, and RATs with Revelock Active Defense. We build the BionicID™ from thousands of parameters collected from behavioral biometrics, behavioral analytics, device, network and threat data. The BionicID™ is trained and ready to verify users in just two interactions, reducing false positives and false negatives that trip up users and flood your call center. No matter what type of attack - malware, RATs or phishing, IDTheft, ID impersonation or ID manipulation - the BionicID™ changes the game. Our anomaly detection and classification engine delivers a continual risk assessment that protects your users and stops fraud.
  • 25
    ALTR

    ALTR

    ALTR

    Easily and simply control your sensitive data in Snowflake today so you can get more value from it in minutes instead of months. With ALTR you can automatically discover and classify sensitive data with a checkbox on import. Add controls like data masking with a drop-down menu. Set alerts and limits on data access by user, amount, and IP address from a single screen. No on-prem hassles or added costs, no proxies to break with a platform change and no managed services disguised as SaaS. ALTR was born in the cloud and natively integrates with platforms like Snowflake. With ALTR’s complete data control, you can visualize data usage, detect anomalies and alert on them, block threats in real time, and tokenize critical data. Safeguarding all your data. Because ALTR is built for the cloud, there’s no large up-front commitment—you can start for free and only upgrade as needed.
    Starting Price: $10 per user per month
  • 26
    Baits

    Baits

    MokN

    Baits is an innovative deception-based security solution designed to detect and neutralize credential theft before attackers can exploit stolen identities. By deploying realistic decoy authentication portals (e.g., VPN SSL, webmail), Baits tricks attackers into revealing compromised credentials, providing organizations with real-time threat intelligence and enabling them to act before a breach occurs. Unlike traditional monitoring solutions, Baits intercepts credentials that aren’t found on the dark web, as attackers often use them directly. The platform integrates seamlessly into security operations, helping organizations detect, track, and neutralize credential-based threats. Baits is ideal for enterprises looking to enhance proactive threat detection, strengthen identity security, and stay ahead of attackers.
  • 27
    Darktrace

    Darktrace

    Darktrace

    Darktrace is a cybersecurity platform powered by AI, providing a proactive approach to cyber resilience. Its ActiveAI Security Platform delivers real-time threat detection, autonomous responses to both known and novel threats, and comprehensive visibility into an organization’s security posture. By ingesting enterprise data from native and third-party sources, Darktrace correlates security incidents across business operations and detects previously unseen threats. This complete visibility and automation reduce containment time, eliminate alert fatigue, and significantly enhance the efficiency of security operations.
  • 28
    Pivot.GG

    Pivot.GG

    Pivot.GG

    Pivot.GG is a cybersecurity investigation platform that helps security analysts go from a single indicator of compromise (IOC) to actionable answers faster and with less guesswork. It provides guided, context-aware investigation workflows that automate IOC triage, threat analysis, scoping, and detection engineering. Pivot.GG is delivered as a browser-based Software-as-a-Service (SaaS) product for SOC analysts, incident responders, and threat hunters.
  • 29
    Protegrity

    Protegrity

    Protegrity

    Our platform allows businesses to use data—including its application in advanced analytics, machine learning, and AI—to do great things without worrying about putting customers, employees, or intellectual property at risk. The Protegrity Data Protection Platform doesn't just secure data—it simultaneously classifies and discovers data while protecting it. You can't protect what you don't know you have. Our platform first classifies data, allowing users to categorize the type of data that can mostly be in the public domain. With those classifications established, the platform then leverages machine learning algorithms to discover that type of data. Classification and discovery finds the data that needs to be protected. Whether encrypting, tokenizing, or applying privacy methods, the platform secures the data behind the many operational systems that drive the day-to-day functions of business, as well as the analytical systems behind decision-making.
  • 30
    IBM Guardium Data Protection
    IBM Guardium Data Protection supports a zero trust approach to security. It discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data. Guardium Data Protection is built on a scalable architecture, which provides full visibility into structured, semi-structured and unstructured data activity across all major data repositories—stored on-premises, in private and public cloud and in containers. Using a single interface, you can set access policies, monitor user access to protected data and discover, investigate and remediate vulnerabilities and threats as they occur in real time across your data environment.
  • 31
    e-Safe Compliance

    e-Safe Compliance

    e-Safe Systems

    We offer a quick, yet comprehensive assessment to identify and measure risky user actions and offer suggestions on how they can be plugged before they cause damage. e-Safe Compliance is a purpose-built compliance solution that covers all the criteria of major regulations to make sure that your company is completely safe. Traditional DLP relies rigid blocking schemes, which hinder productivity. e-Safe’s People-Centric DLP implements a protection regime based on education, trust, and verification, while ensuring key information remains secure using multi-level encryption. Malicious user actions are detected using machine learning user behaviour analytics, and detection time is greatly reduced by empowering the information owners themselves to be part of the monitoring process. It has been shown time and time again that the biggest threat to the security of sensitive data is human error.
  • 32
    ESET Inspect
    ESET Inspect is an advanced endpoint detection and response (EDR) tool designed by ESET to provide comprehensive visibility, threat detection, and incident response capabilities for businesses. It helps organizations identify, investigate, and mitigate sophisticated cyber threats that bypass traditional security measures. ESET Inspect monitors endpoint activities in real time, using behavioral analysis, machine learning, and threat intelligence to detect suspicious behavior, anomalies, and potential security breaches. It integrates seamlessly with ESET’s endpoint protection platform, providing a unified view of network security and enabling security teams to respond quickly to threats through automated or manual actions. With features like threat hunting, detailed reporting, and customizable alerts, ESET Inspect empowers businesses to enhance their cybersecurity defenses and proactively address potential vulnerabilities.
  • 33
    Wazuh

    Wazuh

    Wazuh

    Wazuh is a free, open source and enterprise-ready security monitoring solution for threat detection, integrity monitoring, incident response and compliance. Wazuh is used to collect, aggregate, index and analyze security data, helping organizations detect intrusions, threats and behavioral anomalies. As cyber threats are becoming more sophisticated, real-time monitoring and security analysis are needed for fast threat detection and remediation. That is why our light-weight agent provides the necessary monitoring and response capabilities, while our server component provides the security intelligence and performs data analysis. Wazuh addresses the need for continuous monitoring and response to advanced threats. It is focused on providing the right visibility, with the insights to help security analysts discover, investigate and response to threats and attack campaigns across multiple endpoints.
  • 34
    Carbon Black EDR
    Carbon Black Endpoint Detection and Response (EDR) by Broadcom offers a comprehensive solution for detecting, investigating, and responding to cybersecurity threats on endpoints. It utilizes advanced behavioral analysis and machine learning to identify suspicious activities in real time, providing security teams with actionable insights to prevent data breaches and mitigate risks. With its cloud-based architecture, Carbon Black EDR enables continuous monitoring, visibility into endpoint activity, and automated threat response. It’s designed to support organizations of all sizes by improving threat detection, reducing investigation time, and enhancing overall endpoint security.
  • 35
    Proofpoint Identity Threat Defense
    In an ever-changing hybrid world, your organization depends on its employees, their virtual identities, and the endpoints they operate on to build and protect its assets. Threat actors have found unique ways to move laterally across your cloud environments by exploiting such identities. You need an innovative and agentless identity threat detection and response solution to discover and remediate modern identity vulnerabilities—a key part of today’s attack chain. Proofpoint Identity Threat Defense, previously Illusive, gives you comprehensive prevention and visibility across all your identities so you can remediate identity vulnerabilities before they become real risks. You can also detect any lateral movements in your environments and activate deception to ensure threat actors are stopped in action before they gain access to your corporate assets. It doesn’t get better than knowing you can prevent modern identity risks and stop real-time identity threats in action, all in one place.
  • 36
    Commvault Cloud
    Commvault Cloud is a comprehensive cyber resilience platform designed to protect, manage, and recover data across diverse IT environments, including on-premises, cloud, and SaaS applications. Powered by Metallic AI, it offers advanced features such as AI-driven threat detection, automated compliance tools, and rapid recovery capabilities like Cleanroom Recovery and Cloudburst Recovery. The platform ensures continuous data security through proactive risk scanning, threat hunting, and cyber deception, while facilitating seamless recovery and business continuity with infrastructure-as-code automation. With a unified management interface, Commvault Cloud enables organizations to safeguard their critical data assets, maintain compliance, and swiftly respond to cyber threats, thereby minimizing downtime and operational disruptions.
  • 37
    Polar Security

    Polar Security

    Polar Security

    Automate data discovery, protection & governance in your cloud workload and SaaS applications. Automatically pinpoint all your exposed sensitive data in cloud workloads and SaaS applications, allowing you to shrink the data attack surface. Identify and classify sensitive data such as PII, PHI, PCI, and custom company IP to prevent sensitive data exposure. Get actionable insights on how to protect your cloud data and ensure compliance, in real-time. Enforce data access policies to achieve least privileged access, maintain a strong security posture, and remain resilient to cyber-threats.
  • 38
    Falcon Insight

    Falcon Insight

    CrowdStrike

    Continuous monitoring captures endpoint activity so you know exactly what’s happening - from a threat on a single endpoint to the threat level of the organization. Falcon Insight delivers visibility and in-depth analysis to automatically detect suspicious activity and ensure stealthy attacks - and breaches - are stopped. Falcon Insight accelerates security operations, allowing users to minimize efforts spent handling alerts and reduce time to investigate and respond to attacks. Unravels entire attack in the easy-to-use Incident Workbench enriched with context and threat intelligence data. CrowdScore delivers situational awareness on the current threat level of the organization, and how it’s changing over time. Powerful response actions allow you to contain and investigate compromised systems, including on-the-fly remote access to take immediate action.
  • 39
    Secuvy AI
    Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via AI-driven workflows. Best in class data intelligence especially for unstructured data. Secuvy is a next-generation cloud platform to automate data security, privacy compliance and governance via ai-driven workflows. Best in class data intelligence especially for unstructured data. Automated data discovery, customizable subject access requests, user validations, data maps & workflows for privacy regulations such as ccpa, gdpr, lgpd, pipeda and other global privacy laws. Data intelligence to find sensitive and privacy information across multiple data stores at rest and in motion. In a world where data is growing exponentially, our mission is to help organizations to protect their brand, automate processes, and improve trust with customers. With ever-expanding data sprawls we wish to reduce human efforts, costs & errors for handling Sensitive Data.
  • 40
    Booz Allen MDR

    Booz Allen MDR

    Booz Allen Hamilton

    Protect your network with complete visibility and layered detection. Our customized managed detection and response (MDR) service gives you advanced threat detection, investigation, and response delivered via out-of-band network sensors which provide full visibility to network communications. We focus on malicious activity happening inside and around your environment to protect you from known and unknown threats. Receive instant detection using full packet capture, blended detection tools, SSL decryption, and the advantages of Booz Allen’s Cyber Threat Intelligence service. Industry-leading threat analysts will investigate and contain your network’s security events, giving you more accurate and applicable intelligence. The Booz Allen team provides threat investigation services, contextual intelligence, reverse engineering, and the ability to write rules and custom signatures to stop attacks in real time.
  • 41
    NetWitness

    NetWitness

    NetWitness

    NetWitness Platform brings together evolved SIEM and threat defense solutions that deliver unsurpassed visibility, analytics and automated response capabilities. These combined capabilities help security teams work more efficiently and effectively, up-leveling their threat hunting skills and enabling them to investigate and respond to threats faster, across their organization’s entire infrastructure—whether in the cloud, on premises or virtual. Gives security teams the visibility they need to detect sophisticated threats hiding in today’s complex, hybrid IT infrastructures. Analytics, machine learning, and orchestration and automation capabilities make it easier for analysts to prioritize and investigate threats faster. Detects attacks in a fraction of the time of other platforms and connects incidents to expose the full attack scope. NetWitness Platform accelerates threat detection and response by collecting and analyzing data across more capture points.
  • 42
    Cisco Secure Cloud Analytics
    Unified threat detection across on-premises and cloud environments. Detects early indicators of compromise in the cloud or on-premises, including insider threat activity and malware, as well as policy violations, misconfigured cloud assets, and user misuse. Receives a wide variety of network telemetry and logs. Abnormal behavior or signs of malicious activity generate an alert so you can quickly investigate it. SaaS-based network and cloud security solution that is easy to buy and simple to use. No specialized hardware to purchase, no software agents to deploy, and no special expertise required.​ Extends your visibility to detect threats across your cloud as well as on-premises environments, all from a single interface.​
  • 43
    PHEMI Health DataLab
    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data by simplifying the ingestion and de-identification of data with NSA/military-grade governance, privacy, and security built-in. Conventional products simply lock down data, PHEMI goes further, solving privacy and security challenges and addressing the urgent need to secure, govern, curate, and control access to privacy-sensitive personal healthcare information (PHI). This improves data sharing and collaboration inside and outside of an enterprise—without compromising the privacy of sensitive information or increasing administrative burden. PHEMI Trustworthy Health DataLab can scale to any size of organization, is easy to deploy and manage, connects to hundreds of data sources, and integrates with popular data science and business analysis tools.
  • 44
    Sumo Logic

    Sumo Logic

    Sumo Logic

    Sumo Logic, Inc. helps make the digital world secure, fast, and reliable by unifying critical security and operational data through its Intelligent Operations Platform. Built to address the increasing complexity of modern cybersecurity and cloud operations challenges, we empower digital teams to move from reaction to readiness—combining agentic AI-powered SIEM and log analytics into a single platform to detect, investigate, and resolve modern challenges. Customers around the world rely on Sumo Logic for trusted insights to protect against security threats, ensure reliability, and gain powerful insights into their digital environments. Sumo Logic Cloud SIEM helps your team detect, investigate, and respond to threats with faster behavioral analytics and automation—powered by real-time data and logs-first intelligence. Sumo Logic UEBA baselines user and entity behavior in minutes—training models on historical data to reduce false positives and surface high-risk anomalies.
  • 45
    AristotleInsight

    AristotleInsight

    Sergeant Laboratories

    Today’s organizations need immediate and accessible situational awareness to their risk posture. AristotleInsight® is the only dynamic machine learning platform that provides alerts and reports from the process to the user level on all threats. AristotleInsight’s advanced machine learning platform UDAPE® tracks these changes and provides the diagnostics needed to track the threats. From insider threats, APT detection, and Active Directory drift to vulnerability & configuration failures, AristotleInsight is a revolution in cyber diagnostics. Bridging the gap between SecOps and DevOps, AristotleInsight removes all assumptions and guesswork from your risk profile. AristotleInsight’s advanced reporting capabilities provide the functionality that both cybersecurity specialists and sysadmins demand: usability, accessibility, and historical automated reporting.
  • 46
    Enzoic Account Takeover Protection
    Protect your users and business with seamless Account Takeover (ATO) prevention. Enzoic’s REST API integrates effortlessly into your login, account setup, and password reset workflows, providing real-time detection of compromised credentials from third-party breaches. This allows you to take immediate action, like requiring a password reset or enabling step-up authentication, to keep accounts secure. With Enzoic, you gain the benefits of proactive protection without disrupting the user experience. Our solution reduces fraud and unauthorized access by using a constantly updated database of billions of compromised credentials. Whether the threat is from a recent breach or an older one, Enzoic identifies unsafe credentials and neutralizes risks. Designed for flexibility and ease of use, Enzoic empowers your organization to stay ahead of account takeover threats while maintaining smooth operations.
  • 47
    Omnis Cyber Intelligence
    Omnis CyberStream and Omnis Cyber Intelligence form NETSCOUT’s advanced Network Detection and Response (NDR) platform built on deep packet inspection. The platform delivers pervasive, packet-level visibility to eliminate blind spots across data centers, cloud environments, remote users, and network edges. By combining real-time adaptive threat detection with continuous packet capture, it enables faster and more accurate incident response. Omnis Cyber Intelligence identifies and prioritizes threats at the source using layered machine learning, threat intelligence, and deterministic analysis. Always-on packet and metadata collection ensures security teams have full context before, during, and after an incident. Integrated investigation workflows reduce alert noise and shorten the gap between detection and response. The platform empowers SOC teams to investigate, respond, and prevent threats with confidence and precision.
  • 48
    ThreatBook

    ThreatBook

    ThreatBook

    ThreatBook CTI provides high-fidelity intelligence collected from alerts from real customer cases. Our R&D team uses it as a critical indicator to evaluate our intelligence extraction and quality control work. Meanwhile, we continuously assess the data based on any relevant alerts from timely cyber incidents. ThreatBook CTI aggregates data and information with a clear verdict, behavior conclusions, and intruder portraits. It enables the SOC team to spend less time on irrelevant or harmless activities,boosting the operation's efficiency. The core value of threat intelligence is detection and response, that is, enterprises can carry out compromise detection with high-fidelity intelligence, figuring out if a device has been attacked or if a server has been infected and respond based on the investigation to prevent threats, isolate or avoid risks in a timely manner and reduce the likelihood of serious consequences.
  • 49
    Axoflow

    Axoflow

    Axoflow

    Axoflow, the Security Data Layer is the foundation for your SIEM and analytics tools enabling the use of AI, up to 70% faster investigations, and more than 50% reduction in SIEM spend by feeding them with actionable data. Axoflow Platform is built up of the following parts: A pipeline acting as the transportation layer for your security data and also acting as an automated ‘translator’ between data schemas. AI - If you prefer to run your detection content locally - whether it’s an AI or ML model, a threat intel lookup, or another type of enrichment - we’ve got you covered. Storage solutions to facilitate the cost-effective storage of security data and also acting as local storage to run your decentralized detection. Orchestration to weave all of the parts together in an easy-to-use GUI that lets youmonitor and manage, and control and search your data.
  • 50
    pwncheck

    pwncheck

    pwncheck

    Pwncheck is an efficient, offline Active Directory password auditing tool designed to identify compromised, weak, or shared passwords within an organization's network. Utilizing a comprehensive collection of breached passwords, including data from the HaveIBeenPwned (HIBP) database by Troy Hunt, Pwncheck enables administrators to quickly detect users employing compromised credentials. The tool operates without installation, requiring only a machine with connectivity to a domain controller, and delivers comprehensive results in under three minutes. Key features include the detection of blank passwords, identification of shared passwords among users, and the ability to generate detailed reports suitable for presentation to senior management and auditors. By operating entirely offline, Pwncheck mitigates legal and security concerns associated with storing breached database data on corporate networks, ensuring user hashes and passwords remain secure.