Best Data Governance Software for Okta

Find and compare the best Data Governance software for Okta in 2026

Use the comparison tool below to compare the top Data Governance software for Okta on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    DataHub Reviews
    See Software
    Learn More
    Effective data governance is not merely about restricting access to information; it focuses on facilitating responsible and scalable access. DataHub shifts the paradigm of governance from a hindrance to a catalyst by offering precise access controls, automated policy enforcement, and clear audit trails. You can specify who has the ability to discover, view, and alter data assets through role-based permissions tailored to your organizational hierarchy. Every modification is meticulously recorded with unalterable audit logs that meet compliance standards for regulations like GDPR, HIPAA, SOC 2, and others. With DataHub's metadata-centric approach, governance policies adapt seamlessly as your data progresses from development to production. Automate the classification of data through intelligent tagging, detect sensitive information using pattern recognition, and ensure that downstream users are well-informed about data quality and currency.
  • 2
    Carbide Reviews

    Carbide

    Carbide

    $7,500 annually
    88 Ratings
    See Software
    Learn More
    Carbide equips you with the resources needed to establish robust data governance strategies within your cloud infrastructure and internal systems. Our platform facilitates the development of policies, employee education, and enforcement of controls that adhere to privacy regulations such as GDPR, HIPAA, and CCPA. With seamless technical integrations, you can effortlessly monitor access controls, encryption protocols, and data management practices across various platforms. Carbide makes sure that governance is a priority by incorporating best practices into your daily operations and compliance strategy.
  • 3
    StandardFusion Reviews

    StandardFusion

    StandardFusion

    $1800 per month
    4 Ratings
    GRC solution for technology-focused SMBs and Enterprise Information Security Teams. StandardFusion eliminates the need for spreadsheets by using one system of record. You can identify, assess, treat and track risks with confidence. Audit-based activities can be made a standard process. Audits can be conducted with confidence and easy access to evidence. Manage compliance to multiple standards: ISO, SOC and NIST, HIPAA. GDPR, PCI–DSS, FedRAMP, HIPAA. All vendor and third party risk and security questionnaires can be managed in one place. StandardFusion, a Cloud-Based SaaS platform or on-premise GRC platform, is designed to make InfoSec compliance easy, accessible and scalable. Connect what you do with what your company needs.
  • 4
    OneTrust Privacy Automation Reviews
    Transparency, choice and control are key to trust. Organizations have the opportunity to leverage these moments to build trust, and provide more valuable experiences. People expect greater control over their data. We offer privacy and data governance automation to help organizations better understand and comply with regulatory requirements. We also operationalize risk mitigation to ensure transparency and choice for individuals. Your organization will be able to achieve data privacy compliance quicker and build trust. Our platform helps to break down silos between processes, workflows, teams, and people to operationalize regulatory compliance. It also allows for trusted data use. Building proactive privacy programs that are rooted in global best practice and not just reacting to individual regulations is possible. To drive mitigation and risk-based decision-making, gain visibility into unknown risks. Respect individual choice and integrate privacy and security by default in the data lifecycle.
  • 5
    SailPoint Reviews

    SailPoint

    SailPoint Technologies

    1 Rating
    Technology is essential for business. Without it, technology can't be trusted. Today's "work from anywhere" era means that managing and controlling access to every digital identity is crucial for the protection of your business as well as the data it runs on. Only SailPoint Identity security can help you empower your business and manage cyber risk from the explosion in technology access in the cloud enterprise. This will ensure that every worker has the right access to their job, no more, no lesser. Unmatched visibility and intelligence is achieved while automating and speeding the management of all user identities and entitlements. With AI-enhanced visibility, you can automate, manage, and govern access in real time. Allow business to operate in a cloud-critical and threat-intensive environment with speed, security, and scale.
  • 6
    Tricent Reviews

    Tricent

    Tricent

    €18/year/user
    Tricent is the #1 file-sharing governance SaaS platform that enables more secure and compliant file sharing within Microsoft 365 (Teams, OneDrives & Sharepoint drives) and Google Workspace (MyDrives & Shared Drives) so you can keep collaborating responsibly. Tricent puts the responsibility of proper file-sharing management in the hands of administrators as well as every member of the organization who shares files: 🚀 Onboard in less than 30 Minutes. ricent gets you up and running swiftly so you can focus on what matters most. 🔍 Get Insights: From day one, gain a comprehensive overview of all files shared and permissions granted—across both personal drives and shared drives. ⭕️ Do Bulk Remediation: Our admin-friendly cleanup tools allow you to tackle file sprawl efficiently. 😇 Empowering End-Users Responsibly: We use automation to involve your employees in the cleanup process. They can continue collaborating while maintaining compliance. 💪🏼 Customizable Governance Policies: Set different cycles for different user groups. Tricent adapts to your unique needs, ensuring flexibility without compromising control. 🔮 Stay Ahead with Abnormality Detection.
  • 7
    Dasera Reviews

    Dasera

    Dasera

    3 data stores at $20,000
    Dasera is a Data Security Posture Management (DSPM) solution that provides comprehensive security and governance for structured and unstructured data across cloud and on-premises environments. It uniquely monitors data-in-use, offering continuous visibility and automated remediation to prevent data breaches at every data lifecycle stage. Dasera facilitates continuous risk detection and mitigation, ensuring seamless integration and regulation compliance. With a deep understanding of data infrastructure, attributes, users, and usage, Dasera empowers organizations to pursue a secure, data-driven growth strategy, minimizing risks and maximizing value in the digital era.
  • 8
    Satori Reviews
    Satori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements.
  • 9
    Collate Reviews
    Collate is a metadata platform powered by AI that equips data teams with automated tools for discovery, observability, quality, and governance, utilizing agent-based workflows for efficiency. It is constructed on the foundation of OpenMetadata and features a cohesive metadata graph, providing over 90 seamless connectors for gathering metadata from various sources like databases, data warehouses, BI tools, and data pipelines. This platform not only offers detailed column-level lineage and data profiling but also implements no-code quality tests to ensure data integrity. The AI agents play a crucial role in streamlining processes such as data discovery, permission-sensitive querying, alert notifications, and incident management workflows on a large scale. Furthermore, the platform includes real-time dashboards, interactive analyses, and a shared business glossary that cater to both technical and non-technical users, facilitating the management of high-quality data assets. Additionally, its continuous monitoring and governance automation help uphold compliance with regulations such as GDPR and CCPA, which significantly minimizes the time taken to resolve data-related issues and reduces the overall cost of ownership. This comprehensive approach to data management not only enhances operational efficiency but also fosters a culture of data stewardship across the organization.
  • 10
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 11
    Lenses Reviews

    Lenses

    Lenses.io

    $49 per month
    Empower individuals to explore and analyze streaming data effectively. By sharing, documenting, and organizing your data, you can boost productivity by as much as 95%. Once you have your data, you can create applications tailored for real-world use cases. Implement a security model focused on data to address the vulnerabilities associated with open source technologies, ensuring data privacy is prioritized. Additionally, offer secure and low-code data pipeline functionalities that enhance usability. Illuminate all hidden aspects and provide unmatched visibility into data and applications. Integrate your data mesh and technological assets, ensuring you can confidently utilize open-source solutions in production environments. Lenses has been recognized as the premier product for real-time stream analytics, based on independent third-party evaluations. With insights gathered from our community and countless hours of engineering, we have developed features that allow you to concentrate on what generates value from your real-time data. Moreover, you can deploy and operate SQL-based real-time applications seamlessly over any Kafka Connect or Kubernetes infrastructure, including AWS EKS, making it easier than ever to harness the power of your data. By doing so, you will not only streamline operations but also unlock new opportunities for innovation.
  • 12
    Whistic Reviews
    The optimal approach to evaluate, disseminate, and exchange vendor security information is to leverage the Whistic Vendor Security Network for streamlined automation. With Whistic, organizations can conduct vendor assessments, distribute security documents, and forge reliable relationships seamlessly. Once businesses start utilizing Whistic, they find it hard to recall how they previously navigated vendor security assessments or handled questionnaire requests. Move away from the opaque security evaluations of yesteryears by transparently communicating vendor security expectations and sharing profiles. Prioritize building trust instead of sifting through endless spreadsheets. You can initiate assessments, assign levels of inherent risk, interact with vendors, compute risk scores, and automate reassessments effortlessly. In today’s rapid-paced business world, the sluggish and antiquated security review methods are no longer viable. Gain immediate insights into the security status of thousands of organizations with Whistic, ensuring that security management is both efficient and effective. This innovative solution empowers companies to stay ahead of potential vulnerabilities while fostering collaboration among vendors.
  • 13
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 14
    Okera Reviews
    Complexity is the enemy of security. Simplify and scale fine-grained data access control. Dynamically authorize and audit every query to comply with data security and privacy regulations. Okera integrates seamlessly into your infrastructure – in the cloud, on premise, and with cloud-native and legacy tools. With Okera, data users can use data responsibly, while protecting them from inappropriately accessing data that is confidential, personally identifiable, or regulated. Okera’s robust audit capabilities and data usage intelligence deliver the real-time and historical information that data security, compliance, and data delivery teams need to respond quickly to incidents, optimize processes, and analyze the performance of enterprise data initiatives.
  • 15
    Brainwave GRC Reviews
    Brainwave is transforming how you evaluate user access! With an innovative user interface, enhanced predictive controls, and comprehensive risk-scoring features, you can now conduct in-depth access risk analyses. The Autonomous Identity solution allows your teams to operate more effectively with a user-friendly, industry-recognized tool that speeds up your identity management initiatives (IGA). This empowers organizations to assess and make informed decisions regarding access to shared files and folders. You can inventory, categorize, review access, and ensure compliance irrespective of the environment, whether it be file servers, NAS, Sharepoint, Office 365, and beyond. Our flagship offering, Brainwave Identity GRC, is packed with analytical tools that make the most of your access inventory. Enjoy constant visibility across all resources at any given moment. Furthermore, Brainwave’s extensive inventory serves as an entitlement catalog that spans across various infrastructure, business applications, and data access points, ensuring a comprehensive overview of user permissions. This holistic approach promotes better security and informed decision-making.
  • 16
    QueryPie Reviews
    QueryPie serves as a unified platform that consolidates diverse data sources and security protocols into a single interface. Accelerate your company's journey toward achievement without altering your current data infrastructure. In an era driven by data, effective data governance has become essential. Make certain that you adhere to data governance regulations while simultaneously granting multiple users access to an increasing volume of essential data. Formulate data access policies by incorporating crucial factors such as IP addresses and time of access. You can create various privilege types based on SQL commands categorized into DML, DCL, and DDL, allowing for secure data analysis and modifications. Effortlessly monitor SQL event details and analyze user behavior along with potential security threats by examining logs filtered by permissions. Furthermore, all historical data can be exported for comprehensive reporting, ensuring that you have a clear view of your data usage and security practices. This holistic approach not only enhances oversight but also supports informed decision-making for future strategies.
  • 17
    Acryl Data Reviews
    Bid farewell to abandoned data catalogs. Acryl Cloud accelerates time-to-value by implementing Shift Left methodologies for data producers and providing an easy-to-navigate interface for data consumers. It enables the continuous monitoring of data quality incidents in real-time, automating anomaly detection to avert disruptions and facilitating swift resolutions when issues arise. With support for both push-based and pull-based metadata ingestion, Acryl Cloud simplifies maintenance, ensuring that information remains reliable, current, and authoritative. Data should be actionable and operational. Move past mere visibility and leverage automated Metadata Tests to consistently reveal data insights and identify new opportunities for enhancement. Additionally, enhance clarity and speed up resolutions with defined asset ownership, automatic detection, streamlined notifications, and temporal lineage for tracing the origins of issues while fostering a culture of proactive data management.
  • 18
    Proofpoint Intelligent Classification and Protection Reviews
    AI-powered classification can enhance your DLP cross-channel. Proofpoint Intelligent Classification & Protection is an AI-powered solution for classifying your critical business data. It accelerates your enterprise DLP program by recommending actions based on the risk. Our Intelligent Classification and Protection Solution helps you understand unstructured data at a fraction of what it takes with traditional approaches. It categorizes your files using an AI-model that has been pre-trained. It does this for both cloud-based and on-premises file repositories. Our two-dimensional classification gives you the business context and level of confidentiality you need to protect your data better in today's hybrid environment.
  • 19
    Skyflow Reviews
    Skyflow allows you to run workflows, logic, and analytics on encrypted data. Skyflow uses multiple encryption and tokenization methods to ensure maximum security. With auditable logs, provenance, and data residency, you can manage access to your data and policy enforcement. Compliance is possible in minutes, not weeks. It's easy with our trusted infrastructure and simple REST or SQL APIs. Tokenization is required for compliance. An encrypted data store allows you to search, analyze, and make use of secure data. Skyflow can be run in any virtual private cloud you prefer. It can be used as a secure gateway, zero trust storage, and many other purposes. Replace a difficult-to-maintain patchwork of point solutions with a single cost-effective data vault. You can use your sensitive data in any application or workflow without ever having to decrypt it.
  • 20
    Codified Reviews
    Codified makes governance as simple as writing, "support engineers may only access customer data when they are assigned a support ticket". Codified includes a data catalog, a policy engine, and a workflow manager. Customers receive a streamlined, agile data governance solution which reduces operational costs and increases productivity while improving security. Data access controls are often written as ACLs, or JSON policies. These are difficult to read and write. They are also incomplete. You can't describe your organization's policies in ACLs. Codified allows you to write your policies in plain English, and provides steps to verify their accuracy and completeness.
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB