Data Security GET THE
IN-DEPTH REPORT

categories > Security

SelectHub Leaderboard
27 RESULTS / Data Security
Sort:
CommVault® Simpana®

Simpana software is one product that contains individually licensable modules—all built on a single unifying code base and platform—to Protect, Manage and Access your data and information. It delivers the unparalleled advantages and benefits of a truly holistic approach to data and information management.

57
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Symantec Norton Protection Center

The next generation of Symantec's security management solution for IT security leaders. A new security integration package that provides a unified graphical interface to interact with other Symantec consumer products. Norton Security and Norton Security with Backup are the latest offerings from Norton to protect you and your devices. The Norton Security offerings are not currently available in all locations. This article provides details on the current availability.

20
COMMUNITY RATING
PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Trend Micro Endpoint Security

Trend Micro endpoint security gives you the threat protection and data security you need to protect your users and your corporate information across every device and application. And we do it with unprecedented depth and breadth. You get multiple layers of advanced threat protection, including anti-malware, packer variant protection, encryption, device control, data loss prevention, vulnerability shielding, command and control blocking, browser exploit protection, application whitelisting, behavior monitoring, web threat protection, and more. All this is delivered via a light, lean client built for speed so neither the user experience nor your network is impacted.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
McAfee Complete Data Protection Advance Suite

The McAfee Complete Data Protection — Advanced suite protects your data from risk of loss, theft, and exposure using a combination of powerful enterprise-grade endpoint encryption, access control, and user-behavior monitoring. The suite helps you establish and enforce a data protection policy and centralizes data security management using the McAfee ePolicy Orchestrator (ePO) management console.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
SafeGuard Encryption

Sophos SafeGuard Enterprise Encryption 7 introduces the most complete data protection solution on the market today, protecting data on multiple devices and operating systems. Whether your data resides on a laptop, a mobile device, or being collaborated upon via the cloud or other file sharing method, SafeGuard Encryption is built to match your organizational workflow and processes without slowing down productivity.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Kaspersky Internet Security 2015

In 2013, AV-Comparatives – the independent testing lab – gave its ‘Product of the Year’ award to Kaspersky Internet Security 2014. The latest version of Kaspersky Internet Security builds on this success and delivers even more innovative technologies to protect your privacy, identity, money and children – without slowing down your PC.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Internet Security Complete

SecureAnywhere Internet Security Complete runs on most supported systems, even slow or older computers.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
SecureSphere Database Activity Monitor

SecureSphere Database Activity Monitor helps you efficiently demonstrate database compliance through automated processes, audit analysis, and customizable reports across heterogeneous database platforms. In addition, SecureSphere accelerates incident response and forensic investigation with centralized management and advanced analytics. Database Activity Monitor helps you pass your database audits and avoid hefty non-compliance fines.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
SecureDoc

SecureDoc Enterprise Server (SES) places all security-related management under on centralized enterprise server including policies, password rules and the management of encryption ranging from SecureDoc’s software encryption for PCs or embedded OS encryption for Windows (BitLocker) and OS X (FileVault 2) to the management of hardware based encryption with SEDs and Enterprise Drives.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Data Security Software

You want to nurture your marketing leads to sales-readiness. But how do you streamline your efforts when every lead is different? With HubSpot’s interconnected tools, you can use real-time marketing data to provide relevant, contextual marketing experiences to every contact in your database.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Safenet

SafeNet offers the only complete portfolio of encryption, multi-factor authentication, and key management solutions that extend protection and ownership across the lifecycle of sensitive data, as it is created, accessed, shared, stored and moved. From the datacenter to the cloud, enterprises can remain protected, compliant and in control, no matter where their business takes them.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Eset Mobile Security

The online world awaits, and it's increasingly mobile. With protection from ESET, there's no reason to hold back. Dive in, using your Android™ smartphone or tablet, and know that we've got you covered.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Bitfinder Mobile Security

Protect your device from electronic threats and save your battery with Bitdefender Mobile Security. With Phone Alert, your smart watch will let you know whenever you step too far away from your phone. When you can’t remember where you left your phone around the house, you can use your smart watch to find it. Ping your phone using your Android Wear device, and it will scream for you even if you left it on silent.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Wave Data Protection Suite

The Wave Data Protection Suite goes wherever your devices go, on or off your network, online or offline. Which means it protects your data from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots, hardware keyloggers. All the stuff your nightmares are made of. And it’s managed with a single console.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Lookout Premium

Lookout Premium is available on Android and iOS, and gives you the ability to manage multiple devices, all from one account. Lookout Premium features differ by platform. Lookout is a cybersecurity company focused on mobile. Protecting individuals and enterprises alike, Lookout fights cybercriminals by predicting and stopping mobile attacks before they do harm.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Realtime Protection

Ad-Aware's real-time protection blocks or suspends malicious processes and infected files that try to start or connect to your system, effectively preventing malware from damaging your PC or accessing your personal files. Real-time process protection: blocks or suspends malicious processes and infected files that try to start or connect to your system

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Credant

Dell Data Protection solutions are designed to help you protect end-user data wherever it goes and make it easy to centrally manage endpoint security and compliance. Your users can work with the tools they know and love without interruption or compromised performance.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Check Point Data Security

To stop data from getting into the wrong hands, you need a multi-layered data protection strategy. Check Point Data Security solutions encompass all facets of protecting content, from data loss prevention (DLP), encryption, rules-based safe data handling and more.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
BullGuard Mobile security

BullGuard Mobile Security app for Android gives you peace of mind-- the app which gives you total protection for your mobile device and personal data: Complete protection with antitheft controls, block unwanted calls and SMS spam can customise, fast and immediate antivirus scanning, and parental controls to keep your kids safe .

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Data Masking and Subsetting Pack

Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
SkySignature

SkySignature is an online Digital Signature application. Fast, Easy and straight forward. Free for personal use. Very flexible and intuitive. It is fully loaded with many helpful features and PDF editing tools such as "type anywhere" capability available exclusively only on SkySignature.com. More features such as Sign-Here tags that can be dragged and dropped onto the document. Allows to create a new PDF document out of the individual pages from existing PDF Documents. SkySignature uses a custom, unique advanced encryption algorithm to ensure security. Visit www.skysignature.com to sign up for free and discover how easy it is to sign a document online.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Quantivate Unified Solutions

Quantivate features a suite of integrated GRC software modules for Business Continuity, Vendor Management, Enterprise Risk Management, IT GRC, Internal Audit, and Regulatory Compliance Manager. Using multiple and disparate solutions can lead to redundant activities, processes, and documentation or even produce contradictory data. Using multiple systems does not provide clear visibility into compliance, risk management, or continuity activities. In addition, multiple systems, processes, and providers can reduce efficiency, escalate costs, or even increase risk.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Marshal

Quickly scan your cloud services to uncover exposed sensitive data. Run a free scan right now and receive a secure report in minutes.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
DeviceLock Endpoint DLP Suite

DeviceLock Endpoint DLP Suite consists of three primary software modules - DeviceLock, NetworkLock and ContentLock for data in motion and data in use. Along with the separate DeviceLock Discovery Module for scanning data at rest, DeviceLock protects any sized organization from endpoint data leak dangers across the widest array of threat vectors.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
modusCloud

Today’s email threats on businesses has become ever more prominent. With advanced targeted threats, malicious attachments, data loss and drive by URLs, we understand that IT administrators need a simple, yet complete and effective email security solution. modusCloud provides you that peace of mind.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
Quatrix

Quatrix by Maytech provides simple one step web based file sharing for end users with enterprise-level controls, empowering IT to enforce compliance, data protection and information security policies through granular administrative controls and a full audit trial.Quatrix is also white labelled to fully integrate with your brand and corporate identity.Files are securely shared over HTTPS and protected at rest using AES-256 encryption which is suitable for most business workflows.Free trial is available for 14 days.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
NexusTek IT Security

Managing IT security is an ongoing process. Data is the heart of any business, and compromises are unacceptable. NexusTek’s security solutions rely on best-practices, years of experience, and monitoring that works 24 hours a day, 7 days a week, 365 days a year. To ensure data is free from compromise, NexusTek’s experts know what to do in case of a security breach, and more importantly, how to prevent one.NexusTek offers an array of security services with multiple layers of protection to keep data secure. Starting with a Vulnerability Assessment, we are able to diagnose how secure a network is, and what should be done to improve the security posture.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS
  • 1