Best Data Security Software for Docker

Find and compare the best Data Security software for Docker in 2025

Use the comparison tool below to compare the top Data Security software for Docker on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    GitGuardian Reviews
    Top Pick
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 2
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 3
    IRI Voracity Reviews

    IRI Voracity

    IRI, The CoSort Company

    IRI Voracity is an end-to-end software platform for fast, affordable, and ergonomic data lifecycle management. Voracity speeds, consolidates, and often combines the key activities of data discovery, integration, migration, governance, and analytics in a single pane of glass, built on Eclipse™. Through its revolutionary convergence of capability and its wide range of job design and runtime options, Voracity bends the multi-tool cost, difficulty, and risk curves away from megavendor ETL packages, disjointed Apache projects, and specialized software. Voracity uniquely delivers the ability to perform data: * profiling and classification * searching and risk-scoring * integration and federation * migration and replication * cleansing and enrichment * validation and unification * masking and encryption * reporting and wrangling * subsetting and testing Voracity runs on-premise, or in the cloud, on physical or virtual machines, and its runtimes can also be containerized or called from real-time applications or batch jobs.
  • 4
    STRM Reviews
    It is difficult to create and manage data policies. With PACE, you can ensure that data is used in a secure manner. You can apply data policies to code, no matter where it is located. Say goodbye to costly meetings and long waits, and hello to your new open-source data security engine. Data policies aren't only about controlling access, they are also about extracting value from the data with the correct guardrails. PACE allows you to collaborate on the why, and when automating the code. With PACE, you can programmatically apply data policies across multiple platforms. Integrate into your data platform or catalog (optional) and leverage the native capabilities that you already have. PACE automates the application of policies across major data platforms and catalogs, easing your governance processes. Centralize control and decentralize the execution of policies. Auditing obligations can be met by demonstrating how controls are implemented.
  • 5
    Commvault Cloud Reviews
    Commvault Cloud is an all-in-one cyber resilience platform designed to secure, manage, and recover data across hybrid, multi-cloud, and SaaS environments. Leveraging Metallic AI, it provides intelligent threat detection, automated compliance enforcement, and rapid disaster recovery solutions such as Cleanroom Recovery and Cloudburst Recovery. The platform enhances data security with proactive risk assessments, cyber deception techniques, and real-time threat hunting to prevent breaches. With infrastructure-as-code automation, organizations can ensure seamless data recovery, business continuity, and minimal downtime. Commvault Cloud simplifies data protection through a unified interface, empowering businesses to safeguard critical assets and quickly respond to cyber incidents.
  • 6
    TruffleHog Reviews

    TruffleHog

    Truffle Security

    TruffleHog scans your environment for secrets such as credentials and private keys. This allows you to protect your data from being compromised. Secrets can be found everywhere, so TruffleHog scans all code repositories. You can protect your secrets across all your environments with the support for custom integrations. TruffleHog was developed by a team of career security specialists. Security is our primary concern and passion. All features are designed with the best practices in mind. TruffleHog allows you to track and manage secrets through our intuitive management interface. It also provides links to where secrets were found. Secure OAuth workflows allow users to authenticate and you won't have to worry about password and username breaches.
  • 7
    Calamu Protect Reviews
    Calamu Protect automatically splits data across multiple storage locations while at rest. This environment is called a "data harbor" and instantly negates the impact of ransomware attacks or data breaches. Protects against data theft and extortion. Cyber attackers cannot use fragmented data. Cyber attacks automatically self-heal. Data is still available as though nothing happened. Meets data privacy regulations. Geo-fragmented storage allows compliance with international laws. Calamu Drive integrates seamlessly with employee data and document workflows using Windows File Explorer and macOS Finder. Users are able to see that files are being protected in a virtual storage area, free from ransomware or other evolving threats. Calamu Connectors allow for almost unlimited access to a data harbour, regardless of whether data is being protected in an Amazon S3 bucket or on local servers.
  • Previous
  • You're on page 1
  • Next