Best Data Discovery Software for Elasticsearch

Find and compare the best Data Discovery software for Elasticsearch in 2025

Use the comparison tool below to compare the top Data Discovery software for Elasticsearch on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Satori Reviews
    See Software
    Learn More
    Satori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements.
  • 2
    Omniscope Evo Reviews
    Visokio creates Omniscope Evo, a complete and extensible BI tool for data processing, analysis, and reporting. Smart experience on any device. You can start with any data, any format, load, edit, combine, transform it while visually exploring it. You can extract insights through ML algorithms and automate your data workflows. Omniscope is a powerful BI tool that can be used on any device. It also has a responsive UX and is mobile-friendly. You can also augment data workflows using Python / R scripts or enhance reports with any JS visualisation. Omniscope is the complete solution for data managers, scientists, analysts, and data managers. It can be used to visualize data, analyze data, and visualise it.
  • 3
    IRI DarkShield Reviews

    IRI DarkShield

    IRI, The CoSort Company

    $5000
    IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS.
  • 4
    Bold BI Reviews

    Bold BI

    Syncfusion

    $495
    Transform your clients into success narratives with integrated intelligence that includes advanced analytics, intuitive dashboards, and beyond. Bold BI is meticulously crafted as an embedded platform, ensuring that there are no trade-offs or shortcuts in its functionality. Traditional requirements, such as the need to consolidate all your data into a specific data store or cube, can complicate your application unnecessarily in today’s environment. Some solutions necessitate the creation of intricate systems for data integration while also ensuring that the embedded BI data store remains aligned with your data sources. However, with Bold BI, you can seamlessly connect to a multitude of data sources as well as any data warehouse that suits your needs. Choose single-tenant mode for a shared data model or opt for multi-tenant mode to keep a unified source for dashboards while distributing them across various tenants. Bold BI is built to handle both conventional and unique situations effortlessly. You can embed Bold BI directly within your application code through its robust JavaScript APIs, making it a versatile choice for developers. This flexibility ensures that whatever your data requirements may be, Bold BI is equipped to meet them effectively.
  • 5
    Normalyze Reviews

    Normalyze

    Normalyze

    $14,995 per year
    Our platform for data discovery and scanning operates without the need for agents, making it simple to integrate with any cloud accounts, including AWS, Azure, and GCP. You won't have to handle any deployments or management tasks. We are compatible with all native cloud data repositories, whether structured or unstructured, across these three major cloud providers. Normalyze efficiently scans both types of data within your cloud environments, collecting only metadata to enhance the Normalyze graph, ensuring that no sensitive information is gathered during the process. The platform visualizes access and trust relationships in real-time, offering detailed context that encompasses fine-grained process names, data store fingerprints, and IAM roles and policies. It enables you to swiftly identify all data stores that may contain sensitive information, uncover every access path, and evaluate potential breach paths according to factors like sensitivity, volume, and permissions, highlighting vulnerabilities that could lead to data breaches. Furthermore, the platform allows for the categorization and identification of sensitive data according to industry standards, including PCI, HIPAA, and GDPR, providing comprehensive compliance support. This holistic approach not only enhances data security but also empowers organizations to maintain regulatory compliance efficiently.
  • 6
    DataHub Reviews
    DataHub is a versatile open-source metadata platform crafted to enhance data discovery, observability, and governance within various data environments. It empowers organizations to easily find reliable data, providing customized experiences for users while avoiding disruptions through precise lineage tracking at both the cross-platform and column levels. By offering a holistic view of business, operational, and technical contexts, DataHub instills trust in your data repository. The platform features automated data quality assessments along with AI-driven anomaly detection, alerting teams to emerging issues and consolidating incident management. With comprehensive lineage information, documentation, and ownership details, DataHub streamlines the resolution of problems. Furthermore, it automates governance processes by classifying evolving assets, significantly reducing manual effort with GenAI documentation, AI-based classification, and intelligent propagation mechanisms. Additionally, DataHub's flexible architecture accommodates more than 70 native integrations, making it a robust choice for organizations seeking to optimize their data ecosystems. This makes it an invaluable tool for any organization looking to enhance their data management capabilities.
  • 7
    IRI Voracity Reviews

    IRI Voracity

    IRI, The CoSort Company

    IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.
  • 8
    TiMi Reviews
    TIMi allows companies to use their corporate data to generate new ideas and make crucial business decisions more quickly and easily than ever before. The heart of TIMi’s Integrated Platform. TIMi's ultimate real time AUTO-ML engine. 3D VR segmentation, visualization. Unlimited self service business Intelligence. TIMi is a faster solution than any other to perform the 2 most critical analytical tasks: data cleaning, feature engineering, creation KPIs, and predictive modeling. TIMi is an ethical solution. There is no lock-in, just excellence. We guarantee you work in complete serenity, without unexpected costs. TIMi's unique software infrastructure allows for maximum flexibility during the exploration phase, and high reliability during the production phase. TIMi allows your analysts to test even the most crazy ideas.
  • 9
    Secuvy AI Reviews
    Secuvy, a next-generation cloud platform, automates data security, privacy compliance, and governance via AI-driven workflows. Unstructured data is treated with the best data intelligence. Secuvy, a next-generation cloud platform that automates data security, privacy compliance, and governance via AI-driven workflows is called Secuvy. Unstructured data is treated with the best data intelligence. Automated data discovery, customizable subjects access requests, user validations and data maps & workflows to comply with privacy regulations such as the ccpa or gdpr. Data intelligence is used to locate sensitive and private information in multiple data stores, both in motion and at rest. Our mission is to assist organizations in protecting their brand, automating processes, and improving customer trust in a world that is rapidly changing. We want to reduce human effort, costs and errors in handling sensitive data.
  • 10
    LightBeam.ai Reviews
    Uncover hidden sensitive information in unexpected locations such as screenshots, logs, messages, tickets, and tables in just a few minutes. With a single click, LightBeam facilitates the creation of detailed executive or delta reports that provide you with essential insights into your sensitive data landscape. By utilizing LightBeam's distinctive PII/PHI graphs, you can automate Data Subject Requests (DSRs) in a comprehensive manner tailored to your data infrastructure. Foster user trust by allowing them to take charge of their own data collection practices. Ensure ongoing oversight of how sensitive data is gathered, utilized, shared, and protected, maintaining suitable safeguards throughout your organization while keeping stakeholders informed. This proactive approach not only enhances compliance but also strengthens the overall data governance framework.
  • 11
    Data Sentinel Reviews
    As a leader in the business arena, it's crucial to have unwavering confidence in your data, ensuring it is thoroughly governed, compliant, and precise. This entails incorporating all data from every source and location without any restrictions. It's important to have a comprehensive grasp of your data resources. Conduct audits to assess risks, compliance, and quality to support your initiatives. Create a detailed inventory of data across all sources and types, fostering a collective understanding of your data resources. Execute a swift, cost-effective, and precise one-time audit of your data assets. Audits for PCI, PII, and PHI are designed to be both fast and thorough. This service approach eliminates the need for any software purchases. Evaluate and audit the quality and duplication of data within all your enterprise data assets, whether they are cloud-native or on-premises. Ensure compliance with global data privacy regulations on a large scale. Actively discover, classify, track, trace, and audit compliance with privacy standards. Additionally, oversee the propagation of PII, PCI, and PHI data while automating the processes for complying with Data Subject Access Requests (DSAR). This comprehensive strategy will effectively safeguard your data integrity and enhance overall business operations.
  • Previous
  • You're on page 1
  • Next