Best Data Security Software for Amazon Web Services (AWS)

Find and compare the best Data Security software for Amazon Web Services (AWS) in 2024

Use the comparison tool below to compare the top Data Security software for Amazon Web Services (AWS) on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Satori Reviews
    See Software
    Learn More
    Satori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements.
  • 2
    Jit Reviews
    Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 3
    IRI FieldShield Reviews

    IRI FieldShield

    IRI, The CoSort Company

    Varies by component/scope
    IRI FieldShield® is a powerful and affordable data discovery and de-identification package for masking PII, PHI, PAN and other sensitive data in structured and semi-structured sources. Front-ended in a free Eclipse-based design environment, FieldShield jobs classify, profile, scan, and de-identify data at rest (static masking). Use the FieldShield SDK or proxy-based application to secure data in motion (dynamic data masking). The usual method for masking RDB and other flat files (CSV, Excel, LDIF, COBOL, etc.) is to classify it centrally, search for it globally, and automatically mask it in a consistent way using encryption, pseudonymization, redaction or other functions to preserve realism and referential integrity in production or test environments. Use FieldShield to make test data, nullify breaches, or comply with GDPR. HIPAA. PCI, PDPA, PCI-DSS and other laws. Audit through machine- and human-readable search reports, job logs and re-ID risks scores. Optionally mask data when you map it; FieldShield functions can also run in IRI Voracity ETL and federation, migration, replication, subsetting, and analytic jobs. To mask DB clones run FieldShield in Windocks, Actifio or Commvault. Call it from CI/CD pipelines and apps.
  • 4
    Dasera Reviews

    Dasera

    Dasera

    3 data stores at $20,000
    Dasera is a Data Security Posture Management (DSPM) solution that provides comprehensive security and governance for structured and unstructured data across cloud and on-premises environments. It uniquely monitors data-in-use, offering continuous visibility and automated remediation to prevent data breaches at every data lifecycle stage. Dasera facilitates continuous risk detection and mitigation, ensuring seamless integration and regulation compliance. With a deep understanding of data infrastructure, attributes, users, and usage, Dasera empowers organizations to pursue a secure, data-driven growth strategy, minimizing risks and maximizing value in the digital era.
  • 5
    Ping Identity Reviews

    Ping Identity

    Ping Identity

    $5 per user per month
    Ping Identity provides global enterprise identity security with an intelligent identity platform. It offers comprehensive capabilities such as single sign-on (SSO), multifactor authentication (MFA), directory and many more. Ping helps enterprises balance security and user experience for workforce, customer, and partner identity types with a variety of cloud deployment options including identity-as-a-service (IDaaS), containerized software, and more. Ping offers solutions for both developers and IT teams. Allow digital collaboration through simple integrations to these popular tools. These integrations allow you to support your employees wherever they may be using these popular tools. You can deploy quickly and have interoperability throughout the entire identity ecosystem. You can choose to have a single sign-on (SSO), or an adaptive, risk-based authentication authority. A PingOne package allows you to only pay for what is necessary and allows you to grow.
  • 6
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 7
    Metallic Reviews
    As a service, you get simple, smart, and secure data protection. Metallic is the best choice for hybrid cloud services, whether you need it on-premises or SaaS. You can trust Metallic to provide data protection that matches your hybrid cloud strategy. Only SaaS data protection service that covers all hybrid workloads. Your containers are protected at all times. Protect what is most important against corruption and deletion across all of Microsoft Office 365. This integrated protection solution is simple, flexible and comprehensive. It covers all your structured data needs. Endpoint protection has never been easier or more simple. With automated backups and flexible, granular restoration, it's now possible to protect your data. What would you think if you could reduce storage costs on-premises, maintain compliance, and do it all quickly? Customers of Commvault and Metallic get fully-managed cloud storage that can be used for a wide range of workloads through a single interface.
  • 8
    Tenable Cloud Security Reviews
    The cloud security platform that is actionable. Reduce risk by quickly exposing and closing security gaps caused by misconfigurations. CNAPP solutions replace a patchwork product that can cause more problems than it solves, such as false positives or excessive alerts. These products are often only partially covered and create friction and overhead with the products that they're meant to work with. CNAPPs are the best way to monitor cloud native applications. They allow businesses to monitor cloud infrastructure and application security as a group, rather than monitoring each one individually.
  • 9
    Fasoo Data Radar Reviews
    - Data Discovery and Classification : FDR efficiently detects sensitive data across databases, servers, cloud platforms, and endpoint devices using patterns, keywords, file types, and attributes within customizable rule templates. It can classify, label, encrypt, quarantine, or apply adaptive access control to data, ensuring comprehensive security and management. - Centralized Monitoring of Sensitive Documents : FDR offers real-time monitoring from a centralized console, allowing users to view detected PII files and understand the type of sensitive personal identifiable information they possess. It provides various post-processing options such as classification, encryption, and isolation, enhancing data management and security. - Data Visualization and Analysis : The centralized console includes data visualization graphs that help users understand data location, file types, and detected patterns. This feature aids in identifying files that may need to be deleted, archived, or immediately encrypted based on their sensitivity. - Comprehensive Protection of Unstructured Data : FDR allows users to insert tags, move, encrypt, or delete unwanted or obsolete files based on their sensitive content, ensuring robust data protection
  • 10
    PHEMI Health DataLab Reviews
    Unlike most data management systems, PHEMI Health DataLab is built with Privacy-by-Design principles, not as an add-on. This means privacy and data governance are built-in from the ground up, providing you with distinct advantages: Lets analysts work with data without breaching privacy guidelines Includes a comprehensive, extensible library of de-identification algorithms to hide, mask, truncate, group, and anonymize data. Creates dataset-specific or system-wide pseudonyms enabling linking and sharing of data without risking data leakage. Collects audit logs concerning not only what changes were made to the PHEMI system, but also data access patterns. Automatically generates human and machine-readable de- identification reports to meet your enterprise governance risk and compliance guidelines. Rather than a policy per data access point, PHEMI gives you the advantage of one central policy for all access patterns, whether Spark, ODBC, REST, export, and more
  • 11
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 12
    IRI Voracity Reviews

    IRI Voracity

    IRI, The CoSort Company

    IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.
  • 13
    Normalyze Reviews

    Normalyze

    Normalyze

    $14,995 per year
    Our cloud account connections (AWS, Azure, and GCP) are easy to establish with our agentless data discovery platform and scanning platform. There is nothing to install or manage. All native cloud data stores are supported, whether they are structured or unstructured. Normalyze scans your cloud accounts for both structured and unstructured data. It only collects metadata to be added to the Normalyze graph. During scanning, no sensitive data is collected. A graph of trust and access relationships is displayed in real-time. It includes fine-grained context, process names, data store fingerprints, IAM role and policies. Locate all sensitive data stores, identify all access paths, and score possible breach paths based upon sensitivity, volume, or permissions. This will allow you to quickly show all breaches that are waiting to happen. Identify sensitive data-based industry profiles like PCI, HIPAA and GDPR.
  • 14
    Own Data Reviews

    Own Data

    Own Data

    $2.90 per month
    Owning your SaaS-data is easy with the Own Data platform. It allows you to ensure availability, compliance and security of mission critical data, and unlocks new opportunities to transform your business. SaaS applications help make data more secure, accessible, and safer. They have not increased its value for you. It's no secret that your business is more complex than ever, and managing and getting insights out of your data is not easy. You are limited by what your SaaS providers allow you to do with your data. Understanding data exposure risks will help you to strengthen your Salesforce security posture. Protect your data using automated backups, proactive notifications in the event of loss or corruption and easy-to use recovery tools. Seed quality data quickly into any sandbox, sub-prod, or development environment for testing, training, and development purposes. Archive outdated data from production environments in order to avoid overage costs, improve the performance, and ensure compliance.
  • 15
    RunReveal Reviews

    RunReveal

    RunReveal

    $200 per month
    We questioned all assumptions about SIEM, and rebuilt it from scratch. The result is an improved security data platform that is faster, cheaper and more accurate. Attackers do not use sophisticated techniques to compromise systems. They log into legitimate accounts to move around. Even the most sophisticated teams have a hard time detecting these compromises. RunReveal gathers all your logs, filters the noise and tells you what is happening in your system that matters. RunReveal correlates threats across all log sources, whether you have petabytes of data or gigabytes. It can deliver high-quality alarms right out of the box. We've invested heavily in security controls to give us a solid foundational security program. By improving our security posture we can better understand our customers.
  • 16
    Sonrai Security Reviews
    Identity and Data Protection for AWS and Azure, Google Cloud, and Kubernetes. Sonrai's cloud security platform offers a complete risk model that includes activity and movement across cloud accounts and cloud providers. Discover all data and identity relationships between administrators, roles and compute instances. Our critical resource monitor monitors your critical data stored in object stores (e.g. AWS S3, Azure Blob), and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are maintained across multiple cloud providers and third-party data stores. All resolutions are coordinated with the relevant DevSecOps groups.
  • 17
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 18
    Privacera Reviews
    Multi-cloud data security with a single pane of glass Industry's first SaaS access governance solution. Cloud is fragmented and data is scattered across different systems. Sensitive data is difficult to access and control due to limited visibility. Complex data onboarding hinders data scientist productivity. Data governance across services can be manual and fragmented. It can be time-consuming to securely move data to the cloud. Maximize visibility and assess the risk of sensitive data distributed across multiple cloud service providers. One system that enables you to manage multiple cloud services' data policies in a single place. Support RTBF, GDPR and other compliance requests across multiple cloud service providers. Securely move data to the cloud and enable Apache Ranger compliance policies. It is easier and quicker to transform sensitive data across multiple cloud databases and analytical platforms using one integrated system.
  • 19
    Dataguise Reviews
    Data privacy and security should not be a hindrance to your analytics-driven innovation efforts. Dataguise offers flexible encryption and masking options to protect sensitive data. This will ensure that your business is protected. Fast-track delivery of data sets can be achieved for analysis in real time, allowing for better insights and better decisions. Customers of Dataguise have many and changing needs. We know that our customers need more than just the solutions and services we offer. This is why we have built a strong network with carefully selected partners. This executive guide will show you how to maximize data value while protecting data privacy. Dataguise is more reliable than other data discovery tools, has a longer history, supports a wider range of data types, repositories, delivers lower false positive results, and scans data at a larger scale more reliably. Dataguise gives businesses the confidence to act in the best interest of their data.
  • 20
    Google VPC Service Controls Reviews
    VPC Service Controls. Managed networking functionality for Google Cloud resources. In the first 90 days, new customers receive $300 in Google Cloud credits. All customers receive unlimited usage (up to a monthly limit) of selected products, including BigQuery or Compute Engine. Multi-tenant services can be isolated to reduce exfiltration risks. Secure sensitive data only from authorized networks Limit resource access to only authorized IP addresses, identities, or trusted client devices. You can control which Google Cloud services can be accessed from a VPC network. VPC Service Controls can be used to enforce a security perimeter and isolate resources from multi-tenant Google Cloud services. This will reduce the risk of data theft or breach. Private communication between cloud resources can be set up using VPC networks that span cloud and hybrid deployments. Cloud Storage, Bigtable and BigQuery are fully managed tools.
  • 21
    Security Auditor Reviews

    Security Auditor

    Core Security (Fortra)

    Simplified security policy management, file integrity monitoring software. Security Auditor centralizes security administration in your cloud, hybrid, or on-premise environment. Our agentless technology makes it easy to enforce security policies quickly and reduce the risk of security misconfigurations, which are a major cause of data breaches. Security Auditor automatically protects all new systems as they are created and monitors them continuously to identify any configuration settings that do not meet your requirements. An easy-to-use web-based console allows you to make changes and receive notifications about any policy exceptions. This simplifies compliance reporting requirements and simplifies tasks. You can also run the FixIt function to automate the process and let Security Auditor handle the rest. Security Auditor makes it easy to identify and configure security settings for your elastic cloud infrastructure.
  • 22
    Secuvy AI Reviews
    Secuvy, a next-generation cloud platform, automates data security, privacy compliance, and governance via AI-driven workflows. Unstructured data is treated with the best data intelligence. Secuvy, a next-generation cloud platform that automates data security, privacy compliance, and governance via AI-driven workflows is called Secuvy. Unstructured data is treated with the best data intelligence. Automated data discovery, customizable subjects access requests, user validations and data maps & workflows to comply with privacy regulations such as the ccpa or gdpr. Data intelligence is used to locate sensitive and private information in multiple data stores, both in motion and at rest. Our mission is to assist organizations in protecting their brand, automating processes, and improving customer trust in a world that is rapidly changing. We want to reduce human effort, costs and errors in handling sensitive data.
  • 23
    Enveil Reviews
    We change the way organizations use data to unlock value. Data is the backbone for the digital economy. Enveil's award winning ZeroReveal®, solutions allow enterprises to securely and privately access data across organizational boundaries, jurisdictions and third parties. The interaction and results are never revealed. Our homomorphic encryption-powered capabilities and PETs provide a decentralized and efficient data collaboration framework that addresses business challenges such as data sharing, monetization and regulatory compliance. We offer the most advanced encrypted search, analytic and machine learning products in the market to protect data while it is being used or processed. This is the 'holy-grail' of secure data use. Enveil is a pioneering privacy-enhancing technology company that protects data for secure data sharing, usage, and monetization.
  • 24
    TruffleHog Reviews

    TruffleHog

    Truffle Security

    TruffleHog scans your environment for secrets such as credentials and private keys. This allows you to protect your data from being compromised. Secrets can be found everywhere, so TruffleHog scans all code repositories. You can protect your secrets across all your environments with the support for custom integrations. TruffleHog was developed by a team of career security specialists. Security is our primary concern and passion. All features are designed with the best practices in mind. TruffleHog allows you to track and manage secrets through our intuitive management interface. It also provides links to where secrets were found. Secure OAuth workflows allow users to authenticate and you won't have to worry about password and username breaches.
  • 25
    Symmetry DataGuard DSPM Reviews
    Modern businesses base their decisions on data. Modern privacy legislation focuses on the security and privacy data. Some businesses are built around data. As businesses move to the cloud and become more digital, it is even more important to secure data. Cloud computing offers many benefits, including flexibility and scalability. However, it also poses new challenges in terms of data protection. The sheer volume of data an organization must protect is one of the biggest challenges. Cloud computing allows enterprises to store and generate vast amounts of data with greater ease than ever before. This data is often scattered across multiple platforms and locations making it difficult to protect and track. DataGuard DSPM extends zero-trust to your hybrid cloud data stores. It develops a full understanding of the data types, where they are stored, who has access and how they're secured.
  • Previous
  • You're on page 1
  • 2
  • Next