Best Data Security Software

Data security software protects and encrypts data, directories, and systems from threats, hacks, and mechanical failure. Companies will use data security software to protect sensitive information about their business, clients, and customers. Administrators will use data security software to automate tasks such as data backups and threat monitoring. They will often use data security products to perform tests to ensure data, images, and other sensitive information is encrypted when being shared. Firewalls and authentication tools will prevent leaks, while encryption will prevent leaked information from being legible or decipherable. Data security tools can be used with with backup software to prevent data losses. Data security products will share features with network security and web security products, as they all aim to secure systems and information.

To qualify for inclusion in the Data Security category, a product must:

  • Encrypt data to prevent theft
  • Store data backups to recover corrupted or lost data
  • Provide authentication requirements for data access
  • Join previously disconnected networks, programs, or databases
  • Alert administrators when data is compromised
G2 Crowd Grid® for Data Security
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction
Compare Data Security Software
    Results: 157

    Filters
    Features
    Star Rating

    Data Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

    Symantec’s Data Loss Prevention (DLP) solution discovers, monitors, and protects sensitive data wherever it goes – across cloud apps, endpoints, networks and data centers. With DLP, businesses are able to keep their data safe from accidental, negligent and malicious data loss by company insiders.


    Code42 is the leader in data loss protection, visibility and recovery solutions. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, satisfies regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user collaboration. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak and theft while maintaining an open and collaborative culture for employees. Founded in 2001, more than 50,000 organizations worldwide, including the most recognized brands in business and education, rely on Code42 to safeguard their ideas.

    Code42 Reviews
    Optimized for quick response
    Get a Quote

    IBM Security® Guardium® helps ensure the security, privacy and integrity of your critical data across a full range of environments, from databases to big data, cloud, file systems and more.


    BitLocker helps keep everything from documents to passwords safer by encrypting the entire drive that Windows and your data reside on.


    Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities or deviations from best practices.


    McAfee Data Loss Prevention solution suite protects your data using a combination of powerful encryption, access control, and user-behavior monitoring.


    Bitdefender GravityZone combines all the security services organizations need into a single delivery platform to reduce their cost of building a trusted environment for all endpoints.


    Paubox is the easiest way to send and receive HIPAA compliant email. No other solution makes secure email so simple to use. Paubox is the only provider with Zero-Step Encryption on ALL sent email. Senders can just write and send emails as normal from any device and Paubox seamlessly encrypts the message from end-to-end, without the need for portals, plug-ins, or keywords. It's just as easy for recipients to view secure email sent to them. No keys to exchange, no passwords to remember, apps to download, or portals to login to. This is done through Paubox's patent-pending process that includes encrypting all outbound email through our servers with industry-standard Transport Layer Security (TLS) and up to 256-bit AES encryption. Paubox Encrypted Email can be deployed using existing domains and email platforms like Office 365, Exchange, and G Suite, or can be hosted by Paubox. Works with a variety of email clients including Apple Mail and Thunderbird All accounts include FREE inbound encryption and protection against SPAM, malware, virus and phishing attacks. Business Associate Agreements are included for no additional charge.


    Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.


    OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.


    Trend Micro develops server security, cloud security, and small business content security solutions.


    Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.


    Online security threats are serious business. Hackers and malware can sneak in and disrupt your operations, costing you time and money. Worse still, hackers and malware can take down your business completely. AVG File Server Edition helps keep your customer and business data safe from hackers and malware: hassle and worry you just don't need. Features include * File Server Security * Smart Scanner * Remote management


    Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage. Netwrix Auditor includes applications for Active Directory, Azure AD, Exchange, Office 365, Windows file servers, EMC storage devices, NetApp filer appliances, SharePoint, Oracle Database, SQL Server, VMware, Windows Server and network devices. Empowered with a RESTful API and user activity video recording, the platform delivers visibility and control across all of your on-premises and cloud-based IT systems in a unified way.


    AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.


    Software security solutions from Micro Focus Fortify cover your entire software development lifecycle (SDLC) for mobile, third party and website security.


    WhiteSource helps business to develop better software by harnessing the power of open source. WhiteSource becomes part of your software development lifecycle (SDLC) and automates the entire process of open source components selection, approval, and management, including finding and fixing vulnerable components. We provide software development and security teams full control and visibility over their open source usage and helps them drive open source adoption


    Data backup is the best way to protect your business from accidents including equipment failure and human error. But now that’s only half the battle. Today, you need equal protection from deliberate attacks to be safe. You need security against your equipment breaking and criminal break–ins. And that’s exactly what you get with Jungle Disk: the integrated security suite for ‘Main Street’ businesses from 2-250 employees. Our Data Threat Protection platform is double threat protection: a complete security suite that protects from both of kinds of threats: accidents and attacks in one simple, affordable package.


    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.


    Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.


    Leader in JavaScript Application Integrity and the only to make your app self-defensive and resilient to tampering and reverse-engineering. Jscrambler is a Web startup that works on highly innovative security products to protect Web and Mobile Applications. Its flagship product, Jscrambler, is the leader in JavaScript Application Security and the only client-side RASP solution to make apps self-defensive and resilient to tampering and reverse-engineering. Recently, a new Webpage Integrity module was introduced that enables the detection and removal of code injections, MITB attacks, DOM-tampering and data exfiltration on the client-side in real-time. Jscrambler is used in more than 150 countries and has so far been trusted by more than 35k companies and individuals, including Fortune 500 businesses, in a number of sectors including Finance, Advertising, Media, and Gaming. Check our free trial and find out more: https://jscrambler.com/


    Real-time Windows Active Directory and File-Server change audit solution


    ShieldSquare helps online businesses filter non-human (bot) traffic on websites and mobile applications through a non-intrusive API based approach. With ShieldSquare's real-time protection, online businesses can protect themselves against account takeover, ad fraud, web scraping, carding, skewed analytics, and other forms of bot abuse. ShieldSquare processes tens of billions of page requests every month. We protect 80,000+ internet properties of global online brands spread across 70+ countries. Our clientele includes leading businesses from several industry verticals, e.g., E-commerce, Media, Classifieds, Real Estate, Travel, Gaming, Auction, and Healthcare.


    AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.


    BetterCloud empowers IT to define, remediate, and enforce management and security policies across SaaS applications. With BetterCloud, IT can take control of their environment by setting up custom monitors, auditing activity, quickly taking action, and fully automating policy remediation.


    Management and Reporting solution for Google Apps


    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.


    Box Zones enables organizations to address data residency obligations across multiple geographies, allowing them to raise the bar for privacy and control in the cloud.


    Application Centric Infrastructure (ACI) simplifies, optimizes, and accelerates the application deployment lifecycle in next-generation data centers and clouds.


    With Cloak and Dagger, its as easy as 1,2,3! Right click, Select Cloak and Dagger, Enter a Password. Done.


    Spirion Data Platform is an enterprise data management software that helps businesses reduce their sensitive data footprint and proactively minimize the risks, costs and reputational damage of successful cyber attacks.


    Symantec Data Center Security is a software that secures, hardens, and monitors the compliance posture of server systems for on-premise, public, and private cloud data centers.


    VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.


    BackBox is the leading provider of Intelligent Automation for all Network and Security devices. Spanning across the diverse network and security landscape, BackBox will ensure that all supported device configuration files are verified and stored securely in one central location to ensure a speedy recovery, when required. BackBox provides the ability to schedule automated backup and storing of device configurations, single-click recovery, real-time inventory management, custom task automation, and pre-emptive health checks for all your critical devices on the network. BackBox is ideal for any organization, multi-tenant sites and service providers. Backbox is offered by a wide range of Channel Partners globally and local points of presence in numerous countries, and supports over 150 network and security device vendors.


    DatAdvantage uses machine learning and bi-directional cluster analysis to pinpoint users that have access to files they don’t need to do their job. It’s your single interface for managing permissions and security groups.


    Folder Lock lets you password-protect files, folders and drives; encrypt your important files on-the-fly; backup them in real-time; protect portable drives; shred files & drives and clean history.


    IBM Data Risk Manager provides executives and their teams a business-consumable data risk control center that helps to uncover, analyze, and visualize data-related business risks so they can take action to protect their business.


    Operationalize data governance programs through data policy management.


    By simplifying data security, SecureDoc can help save time and reduce costs associated with security management.


    Cloud Data Protection & Security is a platform that focused on cloud data security and compliance, it integrates directly with the Symantec Blue Coat ProxySG allowing user to encrypt or tokenize information that do not want exposed in public cloud SaaS applications like ServiceNow, Salesforce, and Oracle


    Extend visibility and control to cloud apps with a cloud security solution that combines best-in-class DLP and CASB technologies from Symantec.


    IBM Tivoli Storage Manager (TSM), which serves as the engine for STORServer Appliances Powered by TSM, gives you centralized, automated data protection for physical, virtual, and cloud environments.


    Worry-Free Services infuses high-fidelity machine learning with other detection techniques for the broadest protection against ransomware and advanced attacks.


    Apache Metron provides a scalable advanced security analytics framework built with the Hadoop Community evolving from the Cisco OpenSOC Project.


    Apache Ranger is a framework designed to enable, monitor and manage comprehensive data security across the Hadoop platform.


    Micro Focus ArcSight Data Platform is designed to enhance data collection with security context to lay the foundation for intelligent security operations.


    Avanan connects leading security technologies to the most widely used enterprise cloud applications, improving protection of sensitive corporate data and IP. Avanans one-click deployment allows customers to deploy a new security solution in seconds. Because it requires no appliance, agent or gateway proxy, Avanan can begin protecting any cloud application immediately, with no effect on users.


    Control and help secure email, documents, and sensitive data that you share outside your company. From easy classification to embedded labels and permissions, enhance data protection at all times with Azure Information Protection—no matter where it’s stored or who it's shared with.


    CloudPassage is a security and compliance automation platform designed to provide instant visibility and continuous protection for servers in any combination of data centers, private clouds and public clouds.


    ControlScan is a Managed Security Service Provider with a difference: We take a proactive approach to protecting businesses from cyber threats while helping ensure their compliance with security and privacy standards like PCI DSS and HIPAA/HITECH. Our unified security and compliance services deliver confidence to millions of businesses as well as the IT professionals who serve them. Merchant service providers and web hosting companies also partner with us to reduce cybercrime-related business risk. Based in Atlanta, ControlScan is venture backed and supported by a worldwide base of customers, partners and strategic alliances. For more information, please visit ControlScan.com or call 800-825-3301.