Best Data Security Software for Kubernetes

Find and compare the best Data Security software for Kubernetes in 2024

Use the comparison tool below to compare the top Data Security software for Kubernetes on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Tyk Reviews

    Tyk

    Tyk Technologies

    $600/month
    1 Rating
    Tyk is an Open Source API Gateway and Management Platform that is leading in Open Source API Gateways and Management. It features an API gateway, analytics portal, dashboard, and a developer portal. Supporting REST, GraphQL, TCP and gRPC protocols We facilitate billions of transactions for thousands of innovative organisations. Tyk can be installed on-premises (Self-managed), Hybrid or fully SaaS.
  • 2
    Jit Reviews
    Jit's DevSecOps Orchestration Platform allows high-velocity Engineering teams to own product security while increasing dev velocity. With a unified and friendly developer experience, we envision a world where every cloud application is born with Minimal Viable Security (MVS) embedded and iteratively improves by adding Continuous Security into CI/CD/CS.
  • 3
    Protegrity Reviews
    Our platform allows businesses to use data, including its application in advanced analysis, machine learning and AI, to do great things without worrying that customers, employees or intellectual property are at risk. The Protegrity Data Protection Platform does more than just protect data. It also classifies and discovers data, while protecting it. It is impossible to protect data you don't already know about. Our platform first categorizes data, allowing users the ability to classify the type of data that is most commonly in the public domain. Once those classifications are established, the platform uses machine learning algorithms to find that type of data. The platform uses classification and discovery to find the data that must be protected. The platform protects data behind many operational systems that are essential to business operations. It also provides privacy options such as tokenizing, encryption, and privacy methods.
  • 4
    Metallic Reviews
    As a service, you get simple, smart, and secure data protection. Metallic is the best choice for hybrid cloud services, whether you need it on-premises or SaaS. You can trust Metallic to provide data protection that matches your hybrid cloud strategy. Only SaaS data protection service that covers all hybrid workloads. Your containers are protected at all times. Protect what is most important against corruption and deletion across all of Microsoft Office 365. This integrated protection solution is simple, flexible and comprehensive. It covers all your structured data needs. Endpoint protection has never been easier or more simple. With automated backups and flexible, granular restoration, it's now possible to protect your data. What would you think if you could reduce storage costs on-premises, maintain compliance, and do it all quickly? Customers of Commvault and Metallic get fully-managed cloud storage that can be used for a wide range of workloads through a single interface.
  • 5
    Doppler Reviews

    Doppler

    Doppler

    $6 per seat per month
    Stop wasting time attempting to find API keys scattered around, or hacking together configuration tools that you don't know how to use, and stop avoiding access control. Doppler gives your team a single source for truth. The best developers automate all the work. Doppler will make it easy to find frequently-used secrets. You only need to update them once if they change. Your team's single source for truth. Your variables can be organized across projects and environments. You can no longer share secrets via email, Slack, email and git. Your team and their apps will instantly have the secret once you add it. The Doppler CLI, just like git, intelligently determines which secrets to fetch based upon the project directory you're in. No more trying to keep ENV files synchronized! Use granular access controls to ensure that you have the least privilege. Reduce exposure by using read-only tokens for service deployment. Access to only development for contractor? It's easy!
  • 6
    STRM Reviews
    It is difficult to create and manage data policies. With PACE, you can ensure that data is used in a secure manner. You can apply data policies to code, no matter where it is located. Say goodbye to costly meetings and long waits, and hello to your new open-source data security engine. Data policies aren't only about controlling access, they are also about extracting value from the data with the correct guardrails. PACE allows you to collaborate on the why, and when automating the code. With PACE, you can programmatically apply data policies across multiple platforms. Integrate into your data platform or catalog (optional) and leverage the native capabilities that you already have. PACE automates the application of policies across major data platforms and catalogs, easing your governance processes. Centralize control and decentralize the execution of policies. Auditing obligations can be met by demonstrating how controls are implemented.
  • 7
    Sonrai Security Reviews
    Identity and Data Protection for AWS and Azure, Google Cloud, and Kubernetes. Sonrai's cloud security platform offers a complete risk model that includes activity and movement across cloud accounts and cloud providers. Discover all data and identity relationships between administrators, roles and compute instances. Our critical resource monitor monitors your critical data stored in object stores (e.g. AWS S3, Azure Blob), and database services (e.g. CosmosDB, Dynamo DB, RDS). Privacy and compliance controls are maintained across multiple cloud providers and third-party data stores. All resolutions are coordinated with the relevant DevSecOps groups.
  • 8
    HashiCorp Vault Reviews
    Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API.
  • 9
    Commvault Intelligent Data Services Reviews
    A family of integrated solutions that provide actionable insights. It includes Commvault Data Governance and Commvault File Optimization. We are creating more data than ever before. It is important to know everything about it. Automated and proactive actions can be taken to speed up response times, prevent data theft or breaches, eliminate data sprawl, as well as make data-driven decisions in your organization. You can increase storage efficiency and enable faster responses to compliance inquiries. Your data risks are reduced with analytics, reporting and search across backup and production data sources. Advanced "4D" technology delivers a centralized, dynamic, multi-dimensional index of metadata and content, classifications, as well as AI applied insights. A single index that is consistent across all data sources, including remote, cloud, on-premises, and backup, gives you visibility into production and backup data. You can search, filter, drill down and create custom dashboards.
  • 10
    Calamu Protect Reviews
    Calamu Protect automatically splits data across multiple storage locations while at rest. This environment is called a "data harbor" and instantly negates the impact of ransomware attacks or data breaches. Protects against data theft and extortion. Cyber attackers cannot use fragmented data. Cyber attacks automatically self-heal. Data is still available as though nothing happened. Meets data privacy regulations. Geo-fragmented storage allows compliance with international laws. Calamu Drive integrates seamlessly with employee data and document workflows using Windows File Explorer and macOS Finder. Users are able to see that files are being protected in a virtual storage area, free from ransomware or other evolving threats. Calamu Connectors allow for almost unlimited access to a data harbour, regardless of whether data is being protected in an Amazon S3 bucket or on local servers.
  • Previous
  • You're on page 1
  • Next