Best Data Security Software

Data security software protects and encrypts data, directories, and systems from threats, hacks, and mechanical failure. Companies will use data security software to protect sensitive information about their business, clients, and customers. Administrators will use data security software to automate tasks such as data backups and threat monitoring. They will often use data security products to perform tests to ensure data, images, and other sensitive information is encrypted when being shared. Firewalls and authentication tools will prevent leaks, while encryption will prevent leaked information from being legible or decipherable. Data security tools can be used with backup software to prevent data losses. Data security products will share features with network security and web security products, as they all aim to secure systems and information.

To qualify for inclusion in the Data Security category, a product must:

  • Encrypt data to prevent theft
  • Store data backups to recover corrupted or lost data
  • Provide authentication requirements for data access
  • Join previously disconnected networks, programs, or databases
  • Alert administrators when data is compromised
G2 Crowd Grid® for Data Security
Leaders
High Performers
Contenders
Niche
Momentum Leaders
Momentum Score
Market Presence
Satisfaction
Filters
Features
Star Rating

Data Security reviews by real, verified users. Find unbiased ratings on user satisfaction, features, and price based on the most reviews available anywhere.

Compare Data Security Software
Results: 185
    G2 Crowd takes pride in showing unbiased ratings on user satisfaction. G2 Crowd does not allow for paid placement in any of our ratings.
    Sort By:

    Symantec’s Data Loss Prevention (DLP) solution discovers, monitors, and protects sensitive data wherever it goes – across cloud apps, endpoints, networks and data centers. With DLP, businesses are able to keep their data safe from accidental, negligent and malicious data loss by company insiders.

    Code42 is the leader in data loss protection, visibility and recovery solutions. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, satisfies regulatory compliance requirements and speeds incident response — all without lengthy deployments, complex policy management or blocks on user collaboration. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak and theft while maintaining an open and collaborative culture for employees. Founded in 2001, more than 50,000 organizations worldwide, including the most recognized brands in business and education, rely on Code42 to safeguard their ideas.

    Code42 Reviews
    Optimized for quick response
    Get a Quote

    AWS Key Management Service (KMS) is a service that help to create and control the encryption keys used to encrypt data, and uses Hardware Security Modules (HSMs) to protect the security of keys.

    STEALTHbits’ StealthAUDIT Management Platform helps organizations collect and analyze the data they need to answer their most difficult questions in the management and security of their critical IT infrastructure, data, and applications. Unlike point-products designed to address only a single need, StealthAUDIT is a true framework. With preconfigured solutions to address your most common requirements, as well as an extensive toolset for you to create solutions of your own, StealthAUDIT remains relevant even when your requirements change. Strict audit regulations like PCI DSS, HIPAA, SOX, and others, require organizations to know who has access to certain types of data, what they’re doing with it, and how users were granted that access. Couple that with the threat of insider theft and data loss, and risky conditions like Open Access in the File System and SharePoint, and today’s IT administrators need help! KEY FEATURES & BENEFITS - Preconfigured Solution Sets – StealthAUDIT contains out-of-the-box, ready to run Solution Sets aligning to Data Access Governance for Unstructured and Structure Data, Active Directory Management and Security, OS-level Auditing and Governance, and more. - Process Automation – StealthAUDIT seamlessly ties together disparate processes, creating fully automated solutions that save time, avoid unnecessary costs, and alleviate burden on IT. - Governance – Not all the data you need can be obtained from a system or application. StealthAUDIT provides both simple and sophisticated methods of retrieving and incorporating end-user feedback into the data analysis and decision-making process, including Entitlement Reviews, Self-Service Access Requests, and more. - Technology Integration – StealthAUDIT can push and pull data to and from dozens of technologies (including home-grown systems) to enhance the value of existing and future technology investments. - Consolidated Reporting – StealthAUDIT can report on any available dataset, enabling organizations to automate a multitude of reporting tasks, as well as view all of their reports in a single pane of glass.

    Netskope is the leader in cloud security — we help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our Cloud XD™ technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.

    Box Zones enables organizations to address data residency obligations across multiple geographies, allowing them to raise the bar for privacy and control in the cloud.

    Real-time Windows Active Directory and File-Server change audit solution

    Software security solutions from Micro Focus Fortify cover your entire software development lifecycle (SDLC) for mobile, third party and website security.

    OpenSSH provides tools that allows you to encrypt all traffic to help manage eavesdropping, connection hijacking, and other attacks to your Internet while providing secure tunneling capabilities and more.

    AWS CloudHSM is a cloud-based hardware security module (HSM) that enables you to easily generate and use your own encryption keys on the AWS Cloud.

    WhiteSource helps business to develop better software by harnessing the power of open source. WhiteSource becomes part of your software development lifecycle (SDLC) and automates the entire process of open source components selection, approval, and management, including finding and fixing vulnerable components. We provide software development and security teams full control and visibility over their open source usage and helps them drive open source adoption

    Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities or deviations from best practices.

    GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories.

    The IBM Security Guardium portfolio empowers organizations to meet critical data protection needs by delivering complete visibility, actionable insights, real-time controls, and automated compliance throughout the data protection journey. With IBM Guardium your organization can achieve smarter data protection by leveraging discovery & classification, vulnerability & risk assessments, real-time monitoring & alerting, encryption, and advanced analytics.

    Sophos SafeGuard Encryption provides data protection across multiple platforms and devices allowing you to have secure data without slowing down your workflow.

    Trend Micro develops server security, cloud security, and small business content security solutions.

    Online security threats are serious business. Hackers and malware can sneak in and disrupt your operations, costing you time and money. Worse still, hackers and malware can take down your business completely. AVG File Server Edition helps keep your customer and business data safe from hackers and malware: hassle and worry you just don't need. Features include * File Server Security * Smart Scanner * Remote management

    Netwrix Auditor is a visibility platform for user behavior analysis and risk mitigation that enables control over changes, configurations and access in hybrid IT environments to protect data regardless of its location. The platform provides security intelligence to identify security holes, detect anomalies in user behavior and investigate threat patterns in time to prevent real damage. Netwrix Auditor includes applications for Active Directory, Azure AD, Exchange, Office 365, Windows file servers, EMC storage devices, NetApp filer appliances, SharePoint, Oracle Database, SQL Server, VMware, Windows Server and network devices. Empowered with a RESTful API and user activity video recording, the platform delivers visibility and control across all of your on-premises and cloud-based IT systems in a unified way.

    Azure Key Vault enables users to store and use cryptographic keys within the Microsoft Azure environment. Azure Key Vault supports multiple key types and algorithms and enables the use of Hardware Security Modules (HSM) for high value customer keys.

    Management and Reporting solution for Google Apps

    Bitdefender GravityZone combines all the security services organizations need into a single delivery platform to reduce their cost of building a trusted environment for all endpoints.

    Data backup is the best way to protect your business from accidents including equipment failure and human error. But now that’s only half the battle. Today, you need equal protection from deliberate attacks to be safe. You need security against your equipment breaking and criminal break–ins. And that’s exactly what you get with Jungle Disk: the integrated security suite for ‘Main Street’ businesses from 2-250 employees. Our Data Threat Protection platform is double threat protection: a complete security suite that protects from both of kinds of threats: accidents and attacks in one simple, affordable package.

    McAfee Complete Data Protection secures critical data on endpoints with encryption.

    McAfee Data Loss Prevention solution suite protects your data using a combination of powerful encryption, access control, and user-behavior monitoring.

    Spirion Data Platform is an enterprise data management software that helps businesses reduce their sensitive data footprint and proactively minimize the risks, costs and reputational damage of successful cyber attacks.

    Scalable, high-performance malware detection and prevention for cloud services, NAS devices, AWS S3 buckets, and SharePoint servers

    IBM Tivoli Storage Manager (TSM), which serves as the engine for STORServer Appliances Powered by TSM, gives you centralized, automated data protection for physical, virtual, and cloud environments.

    Micro Focus ArcSight Data Platform is designed to enhance data collection with security context to lay the foundation for intelligent security operations.

    DatAdvantage uses machine learning and bi-directional cluster analysis to pinpoint users that have access to files they don’t need to do their job. It’s your single interface for managing permissions and security groups.

    CREDANT is the trusted expert in data protection, enabling organizations to control, manage and protect data wherever it resides.

    Egress helps enterprises protect unstructured data to meet compliance requirements and drive business productivity. The company’s AI-powered platform enables users to control and secure the data they share. The award-winning platform provides email and document classification, accidental send prevention, email and file protection, secure online collaboration and audit and compliance reporting. Trusted by enterprise organisations and governments around the globe, Egress offers a seamless user experience, powerful real-time auditing and patented information rights management, all accessible via a single global identity.

    Egress Reviews
    Optimized for quick response
    Get a Quote

    Leader in JavaScript Application Integrity and the only to make your app self-defensive and resilient to tampering and reverse-engineering. Jscrambler is a Web startup that works on highly innovative security products to protect Web and Mobile Applications. Its flagship product, Jscrambler, is the leader in JavaScript Application Security and the only client-side RASP solution to make apps self-defensive and resilient to tampering and reverse-engineering. Recently, a new Webpage Integrity module was introduced that enables the detection and removal of code injections, MITB attacks, DOM-tampering and data exfiltration on the client-side in real-time. Jscrambler is used in more than 150 countries and has so far been trusted by more than 35k companies and individuals, including Fortune 500 businesses, in a number of sectors including Finance, Advertising, Media, and Gaming. Check our free trial and find out more: https://jscrambler.com/

    A new home for your SSH private key

    Proofpoint Mail Routing Agent (MRA) provides secure, scalable, reliable email routing and management for even the most complex email infrastructures.

    Personal Webmail Defense (PWD) protects you and your employees across personal webmail and browsing activities across the broader web.

    By simplifying data security, SecureDoc can help save time and reduce costs associated with security management.

    StealthDEFEND is the real-time threat analytics component of STEALTHbits’ Data Access Governance Suite. Leveraging unsupervised Machine Learning, StealthDEFEND eliminates excessive and undifferentiated warnings to surface truly meaningful trends and alerts on attempts to compromise your sensitive data. TOP FEATURES: - Unsupervised Machine Learning – Analyze a rich set of data with Machine Learning models that evaluate, correlate, and baseline the activity and behavior of users. - Seamless Sensitive Data Integration – Threat and Data Access Governance information is seamlessly integrated, further reducing noise by honing in specifically on the files that matter most. - Preconfigured Threat Models – StealthDEFEND has been purpose-built to detect file system threats associated with Ransomware, Abnormal Behavior, First Time Host Access, First Time Client Use, Unusual Processes, and more. - Response Playbooks – StealthDEFEND's actions engine automates security responses and connects various security applications and processes together with multi-stage actions. Out-of-the-Box or custom "Playbooks" can be leveraged to respond to threats automatically or programatically. - User Behavioral Profiles – Concrete understanding of each individual user’s behavior is incorporated into StealthDEFEND’s threat analytics and Machine Learning models, complemented by visuals that make understanding any user’s normal behavior a trivial task. - Comprehensive Investigations – Create, configure, and save detailed reports, alerts, and threats on User and Group activity. - SIEM Integration – Out-of-the-box SIEM integration and preconfigured dashboards extend ready-to-use functions. - Real-Time Alerting – Real-time security alerts powered by Machine Learning allow you to master your threat data in a continuous way that leads to faster investigations and threat neutralizations. - Interactive, Real-Time Visualizations – Through a unified web presentation layer, threat data is streamed, processed, and visualized as it happens, including modern visualization elements like heat maps that update themselves in real-time to bring data to life. - Incident Detection Response Workflow – Quickly coordinate your team’s efforts so they’re prepared to share information and track who is working on an issue at any given time.

    TokenEx is an enterprise-class tokenization platform that offers virtually unlimited flexibility in how customers can access, store and secure data. TokenEx works with multiple data-acceptance channels while maintaining a processor-agnostic approach, meaning we can tokenize and secure almost any data type – including PCI, PII, PHI and even unstructured data formats – and integrate with nearly any processor or endpoint.

    TokenEx Reviews
    Optimized for quick response
    Get a Quote

    Vormetric is a data security platform that helps companies move and quickly to protect data wherever it resides any database, and application in any server environment.

    Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users.

    Validates each end user using RACF, TOP Secret, or ACF2 security definitions before allowing access to Adabas. Available for Adabas on mainframe. Read more

    Apache Metron provides a scalable advanced security analytics framework built with the Hadoop Community evolving from the Cisco OpenSOC Project.

    Apache Ranger is a framework designed to enable, monitor and manage comprehensive data security across the Hadoop platform.

    A database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to bad outcomes like data loss and DDoS attacks.

    Aptible is a secure, private cloud deployment platform built to automate HIPAA compliance.

    Aquro is a platform for prototyping, developing, launching, and maintaining iOS and Android apps.

    AristotleInsight was built to collect, analyze and store the enormous amounts of UDAPE data necessary to document exactly what occurs at any given moment now or in the past

    Arxan Application Protection offers protection and management solutions for IoT, mobile, and other applications.

    Avanan connects leading security technologies to the most widely used enterprise cloud applications, improving protection of sensitive corporate data and IP. Avanans one-click deployment allows customers to deploy a new security solution in seconds. Because it requires no appliance, agent or gateway proxy, Avanan can begin protecting any cloud application immediately, with no effect on users.