Best IT Security Software for Apache HBase

Find and compare the best IT Security software for Apache HBase in 2025

Use the comparison tool below to compare the top IT Security software for Apache HBase on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Sematext Cloud Reviews
    Top Pick
    Sematext Cloud provides all-in-one observability solutions for modern software-based businesses. It provides key insights into both front-end and back-end performance. Sematext includes infrastructure, synthetic monitoring, transaction tracking, log management, and real user & synthetic monitoring. Sematext provides full-stack visibility for businesses by quickly and easily exposing key performance issues through a single Cloud solution or On-Premise.
  • 2
    IRI DarkShield Reviews

    IRI DarkShield

    IRI, The CoSort Company

    $5000
    IRI DarkShield uses several search techniques to find, and multiple data masking functions to de-identify, sensitive data in semi- and unstructured data sources enterprise-wide. You can use the search results to provide, remove, or fix PII simultaneously or separately to comply with GDPR data portability and erasure provisions. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it discovers in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF using pattern or dictionary matches, fuzzy search, named entity recognition, path filters, or image area bounding boxes. DarkShield search data can display in its own interactive dashboard, or in SIEM software analytic and visualization platforms like Datadog or Splunk ES. A Splunk Adaptive Response Framework or Phantom Playbook can also act on it. IRI DarkShield is a breakthrough in unstructured data hiding technology, speed, usability and affordability. DarkShield consolidates, multi-threads, the search, extraction and remediation of PII in multiple formats and folders on your network and in the cloud, on Windows, Linux, and macOS.
  • 3
    Mage Static Data Masking Reviews
    You have the freedom to choose the anonymization method that best suits your needs - including tokenization, encryption, and masking techniques. This will ensure that sensitive data is protected in a delicate balance between security and performance. You can choose from over 60 different anonymization methods to protect sensitive data. Anonymization methods that provide consistent results across datastores and applications will help you maintain referential integrity. Anonymization methods that provide both performance and protection. You can choose to encrypt, tokenize or mask data depending on the use case. There are many ways to anonymize sensitive data. Each method provides adequate security and data usability. Protect sensitive data across data storage and applications, and maintain referential integrity. You can choose from a range of NIST-approved encryption or tokenization algorithms.
  • 4
    Mage Dynamic Data Masking Reviews
    iMask protects sensitive data at the Application Layer as well as the Database Layer. It offers flexible solutions that can be used for all types of use and all users, small, medium and large. Mask sensitive data at both the application and database levels to ensure your data's protection in production. You can set up rules in the product UI to allow role-based and user-based access controls that control who can access your sensitive information. You have the option to choose from more than 40 anonymization methods to maintain data consistency between production and nonproduction instances. You can set authorization rules to restrict who can see sensitive data based on geography, roles, departments, and other factors. Secure anonymization protocols can be enabled without affecting performance. Database embedded approach allows data to be deidentified without any changes in the application architecture or security protocols.
  • 5
    Mage Platform Reviews
    Protect, Monitor, and Discover enterprise sensitive data across multiple platforms and environments. Automate your subject rights response and demonstrate regulatory compliance - all in one solution
  • Previous
  • You're on page 1
  • Next