1.
Insider Risk Detection, Threat Management and Response - Code42
https://www.code4
.com/

Code42 Insider Risk software solutions provide the right balance of transparency, technology and training to detect and appropriately respond to data risk.

3.
Safetica | Data Loss Prevention and Insider Risk Management | Safetica
https://www.safetic
.com/

Safetica protects companies against insider threats, offers data loss protection, and supports regulatory compliance.

4.
Insider Threat Management - ITM Security | Proofpoint AU
https://www.proofpoin
.com/au/products/information-protection/insider-threat-management/

Discover how Proofpoint’s Insider Threat Management (ITM) solutions can help you detect threats from inside your organisation. Add ITM security solutions to your defence.

5.
Insider Threat Solutions | Forcepoint
https://www.forcepoin
.com/security/insider-threat/

Protect your organization from insider threats with Forcepoint insider threat solutions. Learn how to identify, investigate and respond to insider threats.

6.
Qohash - No Compromise Data Security and Monitoring
https://qohas
.com/

Track and secure high-risk files to reduce oversharing and accelerate GenAI adoption with Qohash

7.
Home - GTB Technologies
https://gtt
.com/

GTB Enterprise Data Protection / DLP platform that Works is the superior alternative! Protect Cloud, Network & Mobile Data Now

8.
Digital Guardian | Enterprise IP & DLP Software
https://www.fortr
.com/product-lines/digital-guardian/

Today’s most successful businesses are digitizing virtually every aspect of their operation. That sensitive data needs to be protected by organizations. Fortra's Digital Guardian gives you immediate visibility into your organization’s assets, delivering enterprise-wide data protection to safeguard your sensitive data and IP, wherever it lives.

9.
Lookout | The Data-Centric Defense-in-Depth Solution
https://www.lookou
.com/

Lookout is the cybersecurity platform built to stop modern breaches as swiftly as they unfold, from the first phishing text to the final data grab.

10.
Enterprise Data Classification & Security | Seclore
https://www.seclor
.com/platform/data-classification/

Discover, tag, and secure your enterprise’s most sensitive data with our set of data classification tools so you can. Know, Protect, and Control your digital assets!

11.
Insider Threat Detection & Employee Monitoring | Teramind
https://www.teramin
.co/

Comprehensive user behavior analytics software for insider threat management, data loss prevention, workplace productivity, employee monitoring & more

12.
Enterprise Data Loss Prevention (DLP) Solution | Forcepoint
https://www.forcepoin
.com/product/dlp-data-loss-prevention/

Forcepoint Data Loss Prevention (DLP) is an enterprise solution that prevents data exfiltration across all channels, including cloud, email and endpoint. Learn more here.

13.
Endpoint Protector - Industry-Leading Data Loss Prevention (DLP)
https://www.endpointprotecto
.com/

More than a decade in the DLP landscape. Recognized for its Endpoint Protector Solutions in Gartner Magic Quadrant for Enterprise Data Loss Prevention.

14.
Insider Risk Management & Employee Monitoring - Veriato
https://veriat
.com/

Veriato offers AI-based user behavior analytics (UEBA) to help organizations manage insider risk and monitor employee activity.

15.
InterGuard: Remote Employee Monitoring & Productivity Tracking Software
https://www.interguardsoftwar
.com/

Monitor user activity, enforce web content filtering, improve employee productivity & investigate insider threats. Invisible mode. Employee Monitoring.

16.
Security Awareness Training: Human Risk Management | Proofpoint US
https://www.proofpoin
.com/us/products/mitigate-human-risk/

Discover Proofpoint Security Awareness Training. Empower your employees with a human risk management program that drives behavior change and builds sustainable security habits.

17.
Ekran System | Insider Threat Protection Software
https://www.ekransyste
.com/en/

Ekran System | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!

18.
Proofpoint Enterprise Archive | Proofpoint US
https://www.proofpoin
.com/us/resources/data-sheets/information-archiving/

Proofpoint Enterprise Archive™ is a cloud-based archiving solution that simplifies three key information management challenges—legal discovery, regulatory compliance and end user information access...

19.
Data Security Software for Enterprises | Seclore
https://www.seclor
.com/

Secure your business with Seclore, the data security software that protects your digital assets wherever they go. Trusted by industry-leading enterprises.

20.
Email Encryption | Proofpoint US
https://www.proofpoin
.com/us/resources/data-sheets/email-encryption/

As email is the preferred medium for business communications, preventing confidential information from being leaked in outbound email messages must be a top priority in order to lower the risk of a...

21.
Strac: SaaS, Cloud Data Discovery, DSPM, DLP (Data Loss Prevention): Protect Data
https://stra
.io/

Data Discovery, DSPM and DLP (Data Loss Prevention) to protect sensitive PII, PHI, PCI data across apps like Slack, Zendesk, GDrive, ChatGPT, Google, M365.

22.
User Activity Monitoring, DLP & Web Filtering Tools | CurrentWare
https://www.currentwar
.com/

Employee computer monitoring software with web monitoring, content filtering, and device control. Track computer activity & Internet usage

23.
Proofpoint Targeted Attack Protection | Proofpoint US
https://www.proofpoin
.com/us/resources/data-sheets/targeted-attack-protection/

Proofpoint Targeted Attack Protection (TAP) provides an innovative approach to detect, analyze and block advanced threats targeting your people. It also offers unique visibility into these threats...

24.
IBM Security Guardium Data Risk Manager
https://www.ib
.com/products/data-risk-manager/

IBM Data Risk Manager, formerly known as Agile 3 Solutions, empowers C-suite executives to assess risks through a dynamic data risk control center.

25.
Cyberhaven
https://www.cyberhave
.com/

Cyberhaven protects data other tools can’t see, from threats they can’t detect, across technologies they can’t control.

26.
EmpMonitor | Employee Monitoring and Time Tracking Software
http://www.empmonito
.com/

Next-gen's workforce management system that helps employers with Employee Monitoring, Time Tracking, Attendance Management, Productivity Boost, & more.

27.
Data breach and dark web monitoring tool | Breachsense
https://breachsens
.io/

Use Breachsense to monitor your company's data for breaches in real time. Data breach protection for your organization.

28.
Enterprise Mobility Management & Security Solutions | WeGuard
https://weguar
.com/

WeGuard Provides Enterprise Mobility Management and Security Solutions for businesses of all sizes. Learn More about our products today.

29.
Digital Compliance Risk Solutions | Proofpoint US
https://www.proofpoin
.com/us/solutions/digital-risk/digital-compliance-risk/

Learn how Proofpoint solutions eliminate compliance risks as organizations engage customers on digital channels, desktop, mobile, and social media.

30.
uberAgent: DEX & endpoint security analytics for Windows, macOS, Citrix, VMware on Splunk
https://uberagen
.com/

Innovative UX monitoring & endpoint security analytics. PCs, Macs, SBC, VDI, or RDS: uberAgent covers it all, in a single light-weight agent.

31.
Next Generation Managed Security Services | ThreatSpike
https://www.threatspik
.com/

Stay on top of security issues with our cloud-based managed cybersecurity system. With forensics, data loss prevention and more, your devices are fully protected.

32.
Guardz: Unified Cybersecurity Platform Built for MSP
https://guard
.com/

Discover the platform that secures and insures small businesses using AI and a multilayered approach.

33.
InsightIDR | Cloud-Based, Next-Gen SIEM Solution | Rapid7
https://www.rapid
.com/products/insightidr/

Explore InsightIDR - Rapid7's next-gen security information and event management (SIEM) solution for a cloud-first era. Start your free trial today!

36.
Varonis: Automated Data Security | DSPM | AI
https://www.varoni
.com/

The world's only fully automated DSPM. Continuously discover and classify critical data, remove exposures, and stop threats in real-time with AI-powered automation.

37.
De-risk your data | Immuta
https://www.immut
.com/

De-risk your data and deliver new value with Immuta's sensitive data discovery, security and access control, and activity monitoring.

38.
Deter and Investigate Insider Threats with LeaksID Data Room
https://leaksi
.com/

Safeguard your confidential documents from insider threats using LeaksID Data Room with the invisible fingerprint feature for added document protection.

39.
Workforce Analytics for Productivity Management | ActivTrak
https://activtra
.com/

Empower teams with workforce analytics driven driven productivity insights. Collect and analyze user activity data to boost team productivity and ensure operational compliance.

40.
Singularity Identity Detection & Response | Active Directory Defense
https://www.sentinelon
.com/platform/singularity-identity/

Singularityâ„¢ Identity Detection & Response for Active Directory and Entra ID provides real-time infrastructure defense against identity-based attacks.

41.
Digital Protection - Social Media Threat Protection | Proofpoint AU
https://www.proofpoin
.com/au/products/digital-risk-protection/digital-protection/

Discover how Proofpoint Digital Protection helps protect social media accounts against account hacks, attacks, malicious content and other risks.

43.
Harmony Mobile Protection (Sandblast Mobile) - Check Point Software
https://www.checkpoin
.com/harmony/mobile-security/

Harmony Mobile (Formerly Sandblast Mobile), Check Point’s Mobile Threat Defense solution, is designed to keep corporate data safe by securing mobile devices.

44.
Data Security Fabric | Protect All Data Types | Imperva
https://www.imperv
.com/products/data-security-fabric/

Imperva Data Security Fabric is the first data-centric solution that protects all data types across multi-cloud, hybrid, and on-premises environments.

45.
Top-Rated Endpoint Detection & Response | Advanced Threat Protection | WithSecureâ„¢
https://www.withsecur
.com/en/solutions/software-and-services/elements-endpoint-detection-and-response/

WithSecureâ„¢ Elements Endpoint Detection and Response solution provides enhanced detection capabilities and security against cyber attacks and data breaches.

46.
Odaseva is the leading Salesforce Data Security Platform
https://www.odasev
.com/

Odaseva is the leading enterprise data platform for Salesforce, offering Salesforce Data Recovery, Security, Privacy, and Agility

47.
Security Service Edge (SSE) Platform | Forcepoint ONE
https://www.forcepoin
.com/product/forcepoint-one/

Protect data everywhere and secure access anywhere with the all-in-one, cloud-native security platform - Forcepoint ONE. Explore its features.

48.
X1 - In-Place Data Discovery
https://www.x
.com/

X1's suite of solutions enable organizations to rapidly search, analyze and collect distributed data in-place, across an array of data sources for legal, compliance, investigation, and productivity purposes.

49.
IBM Guardium Insights
https://www.ib
.com/products/guardium-insights/

Strengthen data security with advanced data risk visualization, protection, and remediation capabilities through data compliance automation, audit features, reporting and real-time monitoring.

53.
Splunk User Behavior Analytics (UBA) | Splunk
https://www.splun
.com/en_us/products/user-behavior-analytics.html/

Protect against insider threats using machine learning. Splunk User Behavior Analytics (UBA) delivers the insights you need to find unknown threats and anomalous behavior.

54.
Directory Services Protector - Semperis
https://www.semperi
.com/active-directory-security/

Directory Services Protector (DSP) provides continuous Active Directory threat detection and response, including automated remediation.

55.
Fortra's Data Classification Suite
https://dataclassification.fortr
.com/products/data-classification-suite/

Fortra data classification software is a multi-platform data protection solution that can help your organization protect its sensitive data wherever it lives.

56.
Employee Monitoring Software | Berqun
https://www.berqu
.com/

Know when and what your employees are working on using Berqun Employee monitoring software. Collect screenshots, network usage information from Employee computers. Insider threat detection software.

58.
Endpoint Cloud - VIPRE
https://vipr
.com/products/endpoint-security/end-point-cloud/

Ranked in the top 5 for efficacy in independent testing, VIPRE Endpoint Security Cloud delivers nextgen antivirus protection and convenience.

59.
Data Risk Management - Data Discovery & Privacy Platform | Exterro
https://www.exterr
.com/privacy-software/

Exterro's powerful data risk management platform unifies e-discovery, privacy, data governance, digital forensics, and cybersecurity compliance to…

60.
End-user Endpoint Security
https://www.broadco
.com/products/cybersecurity/endpoint/end-user/

The most integrated endpoint security platform on the planet delivers cloud-based protection with AI-guided security management, all on a single agent/console architecture.

61.
DNIF HYPERCLOUD - SIEM, UEBA and SOAR | DNIF
https://www.dni
.it/

DNIF HYPERCLOUD is a cloud native SIEM, UEBA and SOAR platform that can perform search-analytics at scale.

62.
Metadata Scrubber | Metadact Cleaner Solution by Litera
https://www.liter
.com/products/metadact/

Litera's metadata scrubber solution, Metadact, provides comprehensive metadata management to protect law firms from loss of reputation, financial risk and more.

63.
Enterprise Cybersecurity Solutions | ThreatLocker
https://www.threatlocke
.com/

We are an endpoint protection platform that offers top enterprise security software and solutions. Keep your business safe with zero trust endpoint security!

64.
ManageEngine ADAudit Plus | A UBA-driven change auditor
https://www.manageengin
.com/products/active-directory-audit/

ADAudit Plus helps keep your Active Directory, file servers, Windows servers and workstations secure and compliant. Download a 30-day trial now.

65.
Data Risk Analytics | Proactive Threat Detection | Imperva DSF
https://www.imperv
.com/products/data-security/data-risk-management/

Imperva's Data Risk Analytics leverages AI-driven analytics to provide actionable insights, ensuring swift risk mitigation and reducing false positives.

66.
DataSunrise - Database Security, Data Masking, Compliance
https://www.datasunris
.com/

DataSunrise Database Security offers comprehensive protection with advanced firewall, database activity monitoring, masking, and compliance.

67.
Cybersecurity Software | Cybereason
https://www.cybereaso
.com/platform/

Cybereason AI-Driven XDR Platform provides predictive prevention, detection and response that is undefeated against modern ransomware and advanced attack techniques.

68.
Unified SIEM tool & SOAR solution | ManageEngine Log360
https://www.manageengin
.com/log-management/

ManageEngine's Log360 is a unified SIEM tool with integrated DLP and CASB capabilities that helps security operations centers to detect, respond, triage, and mitigate cyberattacks with advanced security & threat analytics.

69.
Digital Rights Management (DRM) Solutions & Software | Seclore
https://www.seclor
.com/rights-management/

Seclore Enterprise Digital Rights Management (EDRM) software offers persistent, granular usage controls to protect & track information everywhere it travels, and while it is at work. Find out more DRM Solutions.

70.
Heimdal® - One Platform. Total Cyber Security.
https://heimdalsecurit
.com/

From endpoints and networks to emails, identities, and beyond, Heimdal has you covered with advanced detection and response capabilities.

71.
PK Privacy Datasheet - PKWARE®
https://www.pkwar
.com/resources/datasheets/pk-privacy/

Using PKWARE technology to establish and manage your organization's Data Privacy Operations puts you in full control.

72.
MDR | Cybereason Services
https://www.cybereaso
.com/services/managed-detection-response-mdr/

Cybereason Managed Detection and Response (MDR) enhances security operations and maximizes prevention, detection and response capabilities to uncover the most sophisticated and pervasive threats.

73.
IronNet | Cybersecurity Solutions | Collective Defense
https://www.ironne
.com/

Collective Defense for advanced cybersecurity, including behavioral analytics, network detection and response (NDR), and network traffic analysis.

74.
Data Discovery and Data Classification | Fasoo Data Radar
https://en.faso
.com/products/fasoo-data-radar/

Fasoo Data Radar supports data discovery, classification, and protection meeting data privacy regulations: GDPR, HIPPA, CPRA, NYDFS, and PCI

75.
Resolver | Discover The Value Of Risk Intelligence
https://www.resolve
.com/

Resolver's Risk Intelligence platform gathers all risk data and analyzes it in context revealing the true business impact within every risk.

76.
Threat Response Solutions | Proofpoint US
https://www.proofpoin
.com/us/products/advanced-threat-protection/threat-response/

Find out how Proofpoint Threat Response solutions enables security teams to respond to threats that are targeting people in their organization.

77.
eDiscovery & Legal Search Software Solutions
https://www.relativit
.com//

Organizations around the globe use Relativity's secure, end-to-end legal software for their biggest data challenges.

78.
End-to-end Incident Management and Response Orchestration | Zenduty
https://zendut
.com/

Resolve critical product and downtime issues before your customers are impacted. Zenduty integrates with all your monitoring tools and alerts your engineers via Phone, Slack, Push notifications, Email, SMS, and Microsoft Teams. You can organize all your incident communications, manage your on-call, brings in all your playbooks, and analytics in one place, and resolve incidents blazingly fast.

79.
DataLakeHouse.io (DLH.io)
https://datalakehous
.io/

DataLakeHouse.io (DLH.io) is a Data Orchestration and Data Security Platform built for People and Customer Insights. As an advanced end-to-end analytics platform it offers a suite of data tools including ELT and PII Data Security scanning, industry-specific pre-built Models using DBT and Google DataForm, combining analytics with Machine Learning to offer actionable insights and predictions for extremely effective business decision-making.

80.
Netwrix | Cybersecurity that works for you.
https://www.netwri
.com/data_classification_software.html/

Easily identify sensitive, regulated and mission-critical information in your data stores and focus on the information that truly requires protection.

81.
GoToAssist is now GoTo Resolve | Unified RMM & Remote Access Software
https://www.got
.com/it-management/resolve/

GoTo Resolve is the new cloud-based remote IT support and RMM software for SMBs from GoTo. Streamline your IT today and try GoTo Resolve for free!

82.
Third-Party Risk and Attack Surface Management Software | UpGuard
https://www.upguar
.com/

Third-party risk and attack surface management software. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day.

83.
Apparity EUC Data Governance Platform
https://apparit
.com/

Apparity helps efficiently manage EUC risk in one powerful platform backed by phenomenal customer support.

84.
Network Detection and Response (NDR) | Verizon
https://www.verizo
.com/business/products/security/threat-detection/network-detection-response/

With Verizon's Network Detection & Response (NDR), gain advanced threat intelligence and expert support to protect your business from suspicious activities and cyber attacks.

85.
Cloud Data Loss Prevention | Google Cloud
https://cloud.googl
.com/security/products/dlp/

Cloud DLP enables enterprises to automatically discover, classify, and protect their most sensitive data elements.

86.
Complete External Attack Surface Management | Detectify
https://detectif
.com/

Use Detectify to get complete coverage of your growing attack surface with Surface Monitoring and Application Scanning.

87.
Security Service Edge SSE Solution - Skyhigh Security
https://www.skyhighsecurit
.com/products/security-service-edge.html/

Industry-leading cloud-native Security Service Edge (SSE) solution enables your workforce and protects your data across web, cloud, email, & private apps.

88.
FTK Enterprise - Leader in Remote Endpoint Investigations | Exterro
https://www.exterr
.com/digital-forensics-software/ftk-enterprise/

FTK Enterprise, industry leader in remote endpoint investigations. Deep visibility to uncover and investigate breaches, data tampering & malicious…

89.
Data Privacy Management Platform | Data Protection Consultancy
https://www.privacyengin
.io/en/

PrivacyEngine is a Data Privacy Management Platform & Data Protection Consultancy for GDPR, CCPA, HIPPAA and SOC 2.

90.
Advanced Data-centric Security | Fasoo Enterprise DRM (EDRM)
https://en.faso
.com/products/fasoo-enterprise-drm/

Fasoo Enterprise DRM (EDRM), information rights management, protect, control, and track sensitive files with its data-centric security

91.
SentinelOne - Advanced Enterprise Cyber Security AI Platform
https://www.sentinelon
.com/

SentinelOne unites endpoint, cloud, identity, and data protection—enriched by our Security Data Lake for a seamless and efficient cybersecurity experience.

93.
EnCase Endpoint Security | OpenText
https://www.opentex
.com/products/encase-endpoint-security/

OpenText EnCase Endpoint Security empowers security analysts with 360-degree endpoint visibility to detect, triage and respond to threats.

94.
OpenText Encase Forensic
https://www.opentex
.com/products/encase-forensic/

Close cases quickly with the powerful digital forensic investigation capabilities of OpenText EnCase Forensic.

95.
Home - SOCRadar® Cyber Intelligence Inc.
https://socrada
.io/

SOCRadar Extended Threat Intelligence is a natively single platform that proactively identifies and analyzes threats with contextual intelligence.

96.
Binalyze - Modern Digital Forensics and Incident Response
https://www.binalyz
.com/

Binalyze enhances all your digital forensics and incident response processes at max speed. Try DFIR platform AIR 14-days for free now!

97.
Email Fraud Defense - Business Email Compromise BEC | Proofpoint US
https://www.proofpoin
.com/us/products/email-protection/email-fraud-defense/

Protect your organization from today’s advanced email threats, business email compromise (BEC), and consumer phishing with Proofpoint's Email Fraud Defense.

98.
Remote Wipe | Data Breach Protection | DriveStrike
https://drivestrik
.com/

Remote Wipe on any operating system in one place using DriveStrike. Data Breach Protection for your laptop, smartphone, and tablet.

99.
EDR Software - Endpoint Detection and Response - N-able
https://www.n-abl
.com/products/endpoint-detection-and-response/

N-able™ Endpoint Detection and Response (EDR) helps MSPs identify and secure customer devices from the latest threats, including those antivirus can’t catch.