Data Security Software

SelectHub is real people helping you find the best Data Security Software for your unique business needs while recognizing the true solution leaders who help make your decisions possible.
27 Products found for

Data Security Software

Sort by:

CommVault® Simpana®

User Sentiment:
n/a

Simpana software is one product that contains individually licensable modules—all built on a single unifying code base and platform—to Protect, Manage and Access your data and information. It delivers the unparalleled advantages and benefits of a truly holistic approach to data and information management.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Symantec Norton Protection Center

User Sentiment:
n/a

The next generation of Symantec's security management solution for IT security leaders. A new security integration package that provides a unified graphical interface to interact with other Symantec consumer products. Norton Security and Norton Security with Backup are the latest offerings from Norton to protect you and your devices. The Norton Security offerings are not currently available in all locations. This article provides details on the current availability.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Kaspersky Internet Security

User Sentiment:
n/a

In 2013, AV-Comparatives – the independent testing lab – gave its ‘Product of the Year’ award to Kaspersky Internet Security 2014. The latest version of Kaspersky Internet Security builds on this success and delivers even more innovative technologies to protect your privacy, identity, money and children – without slowing down your PC.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Trend Micro Endpoint

User Sentiment:
88%

Trend Micro Endpoint Security is a solution designed to help businesses protect their user devices. Trend’s offering provides a bevy of software tools and features that result in a complete, multi-layered approach to endpoint security and protection.The app delivers standard endpoint protection features like advanced threat protection, anti-malware, encryption, device control, application whitelisting and more, on top of its unique features, like data-loss protection and instant messaging protection.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Internet Security Complete

User Sentiment:
n/a

SecureAnywhere Internet Security Complete runs on most supported systems, even slow or older computers.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

DeviceLock Endpoint DLP Suite

User Sentiment:
n/a

DeviceLock Endpoint DLP Suite consists of three primary software modules - DeviceLock, NetworkLock and ContentLock for data in motion and data in use. Along with the separate DeviceLock Discovery Module for scanning data at rest, DeviceLock protects any sized organization from endpoint data leak dangers across the widest array of threat vectors.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Eset Mobile Security

User Sentiment:
n/a

The online world awaits, and it's increasingly mobile. With protection from ESET, there's no reason to hold back. Dive in, using your Android™ smartphone or tablet, and know that we've got you covered.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Check Point Data Security

User Sentiment:
n/a

To stop data from getting into the wrong hands, you need a multi-layered data protection strategy. Check Point Data Security solutions encompass all facets of protecting content, from data loss prevention (DLP), encryption, rules-based safe data handling and more.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Realtime Protection

User Sentiment:
n/a

Ad-Aware's real-time protection blocks or suspends malicious processes and infected files that try to start or connect to your system, effectively preventing malware from damaging your PC or accessing your personal files. Real-time process protection: blocks or suspends malicious processes and infected files that try to start or connect to your system

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

SecureDoc

User Sentiment:
n/a

SecureDoc Enterprise Server (SES) places all security-related management under on centralized enterprise server including policies, password rules and the management of encryption ranging from SecureDoc’s software encryption for PCs or embedded OS encryption for Windows (BitLocker) and OS X (FileVault 2) to the management of hardware based encryption with SEDs and Enterprise Drives.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

McAfee Complete Data Protection Advance Suite

User Sentiment:
n/a

The McAfee Complete Data Protection — Advanced suite protects your data from risk of loss, theft, and exposure using a combination of powerful enterprise-grade endpoint encryption, access control, and user-behavior monitoring. The suite helps you establish and enforce a data protection policy and centralizes data security management using the McAfee ePolicy Orchestrator (ePO) management console.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Safenet

User Sentiment:
n/a

SafeNet offers the only complete portfolio of encryption, multi-factor authentication, and key management solutions that extend protection and ownership across the lifecycle of sensitive data, as it is created, accessed, shared, stored and moved. From the datacenter to the cloud, enterprises can remain protected, compliant and in control, no matter where their business takes them.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Data Security Software

User Sentiment:
n/a

You want to nurture your marketing leads to sales-readiness. But how do you streamline your efforts when every lead is different? With HubSpot’s interconnected tools, you can use real-time marketing data to provide relevant, contextual marketing experiences to every contact in your database.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Bitfinder Mobile Security

User Sentiment:
n/a

Protect your device from electronic threats and save your battery with Bitdefender Mobile Security. With Phone Alert, your smart watch will let you know whenever you step too far away from your phone. When you can’t remember where you left your phone around the house, you can use your smart watch to find it. Ping your phone using your Android Wear device, and it will scream for you even if you left it on silent.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Data Masking and Subsetting Pack

User Sentiment:
n/a

Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Lookout Premium

User Sentiment:
n/a

Lookout Premium is available on Android and iOS, and gives you the ability to manage multiple devices, all from one account. Lookout Premium features differ by platform. Lookout is a cybersecurity company focused on mobile. Protecting individuals and enterprises alike, Lookout fights cybercriminals by predicting and stopping mobile attacks before they do harm.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

SecureSphere Database Activity Monitor

User Sentiment:
n/a

SecureSphere Database Activity Monitor helps you efficiently demonstrate database compliance through automated processes, audit analysis, and customizable reports across heterogeneous database platforms. In addition, SecureSphere accelerates incident response and forensic investigation with centralized management and advanced analytics. Database Activity Monitor helps you pass your database audits and avoid hefty non-compliance fines.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Wave Data Protection Suite

User Sentiment:
n/a

The Wave Data Protection Suite goes wherever your devices go, on or off your network, online or offline. Which means it protects your data from the full range of modern risks: device theft, missent emails, flash drives, portable hot spots, hardware keyloggers. All the stuff your nightmares are made of. And it’s managed with a single console.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Credant

User Sentiment:
n/a

Dell Data Protection solutions are designed to help you protect end-user data wherever it goes and make it easy to centrally manage endpoint security and compliance. Your users can work with the tools they know and love without interruption or compromised performance.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

BullGuard Mobile security

User Sentiment:
n/a

BullGuard Mobile Security app for Android gives you peace of mind-- the app which gives you total protection for your mobile device and personal data: Complete protection with antitheft controls, block unwanted calls and SMS spam can customise, fast and immediate antivirus scanning, and parental controls to keep your kids safe .

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

SafeGuard Encryption

User Sentiment:
n/a

Sophos SafeGuard Enterprise Encryption 7 introduces the most complete data protection solution on the market today, protecting data on multiple devices and operating systems. Whether your data resides on a laptop, a mobile device, or being collaborated upon via the cloud or other file sharing method, SafeGuard Encryption is built to match your organizational workflow and processes without slowing down productivity.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Quantivate Unified Solutions

User Sentiment:
n/a

Quantivate features a suite of integrated GRC software modules for Business Continuity, Vendor Management, Enterprise Risk Management, IT GRC, Internal Audit, and Regulatory Compliance Manager. Using multiple and disparate solutions can lead to redundant activities, processes, and documentation or even produce contradictory data. Using multiple systems does not provide clear visibility into compliance, risk management, or continuity activities. In addition, multiple systems, processes, and providers can reduce efficiency, escalate costs, or even increase risk.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

modusCloud

User Sentiment:
n/a

Today’s email threats on businesses has become ever more prominent. With advanced targeted threats, malicious attachments, data loss and drive by URLs, we understand that IT administrators need a simple, yet complete and effective email security solution. modusCloud provides you that peace of mind.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

eSentire

User Sentiment:
94%

eSentire provides organizations with dedicated threat detection and response, safeguarding businesses from known and hidden threats across their attack surface. It leverages a proprietary AI methodology for threat hunting and advanced automation, eSentire’s innovation in the MDR industry solves some of cybersecurity’s biggest challenges. Security is not only a data volume but also a technology problem that requires a modern approach to AI and expert analysts. eSentire helps process massive amounts of data, providing full threat visibility and response to protect the business’s assets.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Quatrix

User Sentiment:
n/a

Quatrix by Maytech provides simple one step web based file sharing for end users with enterprise-level controls, empowering IT to enforce compliance, data protection and information security policies through granular administrative controls and a full audit trial.Quatrix is also white labelled to fully integrate with your brand and corporate identity.Files are securely shared over HTTPS and protected at rest using AES-256 encryption which is suitable for most business workflows.Free trial is available for 14 days.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

NexusTek IT Security

User Sentiment:
n/a

Managing IT security is an ongoing process. Data is the heart of any business, and compromises are unacceptable. NexusTek’s security solutions rely on best-practices, years of experience, and monitoring that works 24 hours a day, 7 days a week, 365 days a year. To ensure data is free from compromise, NexusTek’s experts know what to do in case of a security breach, and more importantly, how to prevent one.NexusTek offers an array of security services with multiple layers of protection to keep data secure. Starting with a Vulnerability Assessment, we are able to diagnose how secure a network is, and what should be done to improve the security posture.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Marshal

User Sentiment:
n/a

Quickly scan your cloud services to uncover exposed sensitive data. Run a free scan right now and receive a secure report in minutes.

PRICE
$
$
$
$
$
DEPLOYMENT
COMPANY SIZE
S
M
L
PLATFORMS

Real People... with Data

We know selecting software can be overwhelming. You have a lot on the line and we want you to make your project a success, avoiding the pitfalls we see far too often.

As you get started with us, whether it be with Software Requirements templates, Comparing, Shortlisting Vendors or obtaining that elusive Pricing you need; know that we are here for you.

Our Market Research Analysts will take calls, and in 10 minutes, take your basic requirements and recommend you a shortlist to start with.